Key Computer Communication
Key Computer Communication
2 points
SMTP
TCP
UDP
IP
2.
Question 2
Which of following requirements are necessary for packet networks to support multiple and diverse
applications?
2 points
3.
Question 3
What was the concern of the telephone system that motivated the ARPANET design?
2 points
Scalability
Vulnerability
Efficiency
4.
Question 4
Which of the following is an application layer protocol?
2 points
DNS
HTTP
UDP
TCP
5.
Question 5
Which of the following are features of ARPANET design?
2 points
1 point
7.
Question 7
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
1 point
Rearranged
Modified
Removed
Added
8.
Question 8
The ________ is the physical path over which a message travels
1 point
Protocol
Path
Medium
Route
9.
Question 9
Three or more devices share a link in ________ connection
1 point
Unipoint
Multipoint
Point to Point
10.
Question 10
Which of the following is true for Transport Control Protocol
1 point
Connection oriented
Process to Process
Connectionless
Course 1 – week2 : Graded Assessment - Layered Architecture
In a LAN, which address is used to transfer frames to appropriate destination?
2 points
IP address
Physical address
Domain name
2.
Question 2
Suppose an application layer entity wants to send an L-byte message to its peer process, using an
existing TCP connection. The TCP segment consists of the message plus 20 bytes of header. The
segment is encapsulated into an IP packet that has an additional 20 bytes of header. The IP packet
in turn goes inside an Ethernet frame that has 18 bytes of header and trailer. What is the bandwidth
utilization in terms of the percentage of the transmitted bits in the physical layer corresponds to
message information if L = 500 bytes?
2 points
80%
100%
90%
70%
3.
Question 3
Of the following services, which service(s) does the IP layer provides?
2 points
Error control
Flow control
4.
Question 4
Which of the following is true about the ways in which the OSI reference model and TCP/IP
reference model differ.
2 points
TCP/IP model does not have session layer, but OSI model has
TCP/IP model does not have presentation layer, but OSI model has
5.
Question 5
Which of following statements is true about how the data link layer and transport layer differ?
2 points
Data link layer is concerned with framing and the transport layer is not
Data link layer is concerned with flow control and the transport layer is not
Data link layer is concerned with multiplexing and the transport layer is not
6.
Question 6
This layer is an addition to OSI model
1 point
Application layer
Presentation layer
Session layer
7.
Question 7
The functionalities of presentation layer includes
1 point
Data compression
Data encryption
Data decryption
Week3
1.
Question 1
Which of the following applications would you select TCP protocol for?
2 points
File transfer
Web browsing
2.
Question 2
In BSD socket API, which type of socket is used to create a TCP socket?
2 points
SOCK_STREAM
SOCK_RAW
SOCK_DGRAM
3.
Question 3
In BSD socket API, which type of socket is used to create a UDP socket?
2 points
SOCK_STREAM
SOCK_DGRAM
SOCK_RAW
4.
Question 4
In BSD socket API, which system call is used to assign a network address to the socket?
2 points
connect()
listen()
bind()
5.
Question 5
In BSD socket API, if a client knows the server name but not server’s network address, what system
call should the client use to get server’s network address?
1 point
Connect()
gethostbyname()
gettimeofday()
6.
Question 6
In a transmission system, which of the following statement is true for a receiver
1 point
7.
Question 7
In digital transmission, long distance digital communications require the use of a generator to
recover original data sequence and re-transmits on next segment
1 point
True
False
8.
Question 8
In twisted pair, a category 5 UTP cable can support a data rate of up to 16MHz
1 point
True
False
9.
Question 9
Which of the following statement is true for optical fiber
1 point
10.
Question 10
Which of the following are advantages of optical fiber
1 point
No corrosion
Wavelength dependency
Noise immunity
Graded Assessment - Socket API & Digital Transmissions
Week3
1.
Question 1
In BSD socket API, which call is usually used for transmitting data in the connectionless mode?
1 point
accept()
connect()
sendto()
2.
Question 2
Which of following statement about TCP/UDP sockets is wrong?
1 point
3.
Question 3
Which of following are commonly used as digital communication medium?
1 point
Twisted pair
Optical fiber
Coaxial cable
4.
Question 4
Consider a network link that has distance of 100 meters, and signal traverses at the speed of light in
cable 2.5 x 10^8 meters per second. The link has transmission bandwidth of 100 megabits/second
(100 x 10^6 bits per second). The packet size is 400 bits. What is the signal propagation delay?
1 point
4 x 10^-7 seconds
4 x 10^-6 seconds
4 x 10^-9 seconds
5.
Question 5
Consider a network link that has distance of 100 meters, and signal traverses at the speed of light in
cable 2.5 x 10^8 meters per second. The link has transmission bandwidth of 100 megabits/second
(100 x 10^6 bits per second). The packet size is 400 bits. What is the packet transmission delay?
1 point
4 x 10^-7 seconds
4 x 10^-6 seconds
6.
Question 6
An API allows application programs to access certain resources through a predefined interface?
1 point
True
False
7.
Question 7
In transport protocol, which of the following statements is true for User Datagram Protocol
1 point
8.
Question 8
Which of the following sentences are true for connectionless stream mode of service
1 point
9.
Question 9
In transmission delay, in order to reduce the number of bits in a message we use data compression
1 point
True
False
10.
Question 10
Which of the following is true of data compression algorithms
1 point
2 points
2.
Question 2
Which of following statements are true for single-bit parity error detection?
2 points
3.
Question 3
Which of following statements are true for two-dimensional parity error detection?
2 points
4.
Question 4
Assume bit errors occur at random. If each bit has 50% probability to be in error by transmission.
What is the probability of a four-bit frame to be in error by transmission?
2 points
1/4
1/8
1/16
5.
Question 5
What is the binary sequence that corresponds to polynomial code X^3 + x^2 + 1?
2 points
111
1110
1101
0111
6.
Question 6
Block codes are generated using _____.
1 point
Generator matrix
Generator polynomial
7.
Question 7
Which of the following is true for two-dimensional parity check
1 point
8.
Question 8
Polynomial codes are implemented using shift register circuits
1 point
True
False
9.
Question 9
What is the binary equivalent of the following polynomial arithmetic
x7 + x6 + x5 + x2 + 1
1 point
11100101
11011101
11101101
11100111
10.
Question 10
Using Euclidean Division, what will be the remainder of 70 by 999 where 70 is the divisor and 999 is
the dividend
1 point
14
17
21
19
Graded Assessment - Error Control
Week4
1.
Question 1
Given an information polynomial code I(x) = X^7 + x^6 + x^1 + 1, which is its corresponding per-bit
information frame?
2 points
01100011
10100010
11000011
2.
Question 2
What is the remainder obtained by dividing x^7 + x^5 + 1 by the generator polynomial x^3 + 1?
2 points
x^2 + x + 1
x^2 + x
x^2 + 1
3.
Question 3
Given a generator polynomial g(x) = x^3 + x + 1. Consider the information sequence 1001. By CRC
method, what is the resulted codeword for transmission?
2 points
1001000
1001110
1001111
1010110
4.
Question 4
Which of following generator polynomial can detect all single bit errors in an information frame?
2 points
g(x) = x
g(x) = x^2
g(x) = x + 1
5.
Question 5
Internet protocols use check bits to detect errors, instead of using CRC polynomial. The primary
rationale is
2 points
6.
Question 6
The two basic approaches in error control are error prevention and detection, and error correction
and re-transmission
1 point
True
False
7.
Question 7
Find parity bit for 1001011
1 point
8.
Question 8
The divisor in a cyclic code is normally called the _________.
1 point
Degree
Redundancy
Generator
9.
Question 9
The checksum of 0000 and 0000 is
1 point
0101
1010
1111
0000
10.
Question 10
In ASCII, a single parity bit code can detect ________ errors.
1 point
An odd number of
Two
An even number of
No errors
2 points
Hop-by-hop approach
End-to-end approach
2.
Question 2
Which of the following statements is true about the stop-and-wait ARQ protocol?
2 points
2 points
4.
Question 4
Consider a bulk data transfer application where a server sends a large file that is segmented in a
number of full-size packets that are to be transferred to the client. Assume the channel has a low
probability of error. Which of following strategies for sending ACK frames in a Go-Back-N is
appropriate for the situation?
2 points
5.
Question 5
Consider Selective Repeat ARQ flow control protocol. In the following scenario, what should be the
value of frame number x at receiver B?
2 points
6.
Question 6
ARQ protocols combine error detection, retransmission and sequence numbering to provide
reliability
1 point
True
False
7.
Question 7
A service model specifies a level of performance that can be expected in the transfer of information.
1 point
True
False
8.
Question 8
A service offered at a given layer can include which of the following feature(s)
1 point
Sequencing
Reliability
Timing
9.
Question 9
Digital communication technologies may introduce errors in communication, which of the following
can be used to provide reliable communication
1 point
DNS
TCP
UDP
HDLC
10.
Question 10
Ensuring that information is not altered during transfer is associated with
1 point
Integrity
Authentication
Availability
Confidentiality
1.
Question 1
Given 3 bits for sequence numbers, what is the maximum sliding window size at the receiver in Go
Back 3 ARQ?
2 points
2.
Question 2
Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already set the sliding
window size to be 4, what is the maximum sliding window size at the receiver?
2 points
3.
Question 3
Consider Selective Repeat ARQ flow control protocol. In the following scenario, what should be the
value of frame number x at receiver B?
2 points
4.
Question 4
In the scenario above, what should be the value of frame number y at receiver B?
2 points
5.
Question 5
If the probability of error is very low in a communication link, which of the following statements is true
about performance of ARQ protocol?
2 points
Go-back-N ARQ and Selective Repeat ARQ protocols have similar performance
6.
Question 6
In peer-to-peer protocol, the purpose of Automatic Repeat Request is
1 point
7.
Question 7
Which of the basic elements of ARQ is associated with negative acknowledgement
1 point
Timeout mechanism
ACKs
NAKs
8.
Question 8
In Go-Back-N ARQ, a procedure where transmission of a new frame is begun before the completion
of time of the previous frame transmission is called
1 point
Transitioning
Pipelining
Channeling
1 point
True
False
10.
Question 10
The disadvantage of Stop-and-Wait protocol
1 point
2 points
2.
Question 2
Which of following services belong to the data link layer?
2 points
Insert framing information into the transmitted stream to indicate the boundaries that define frames
Provide flow control to prevent the transmitter from overrunning the receiver buffer
3.
Question 3
Which ARQ flow control protocol is used by TCP?
2 points
Stop-and-Wait
Selective Repeat
Go-back-N
4.
Question 4
By framing, frame boundaries can be determined using
2 points
Character Counts
Control Characters
Flags
5.
Question 5
Which of following statements are true about framing protocols?
2 points
6.
Question 6
In IP network, which of the following statement is incorrect
1 point
7.
Question 7
Framing involves identifying the beginning and end of a block of information within a digital stream
1 point
True
False
8.
Question 8
Which of the following statements are true for PPP byte stuffing
1 point
1 point
10.
Question 10
In HDLC frame format, flag is used to identify secondary station (1 or more octets)
1 point
True
False
1 point
110111110110111110110101
110111111101111111010100
0010000000100000001010
2.
Question 2
Perform bit de-stuffing for the following sequence: 11101111101111100111110.
1 point
11101111111111011111
00010000010000011000001
11100111111110011111
3.
Question 3
PPP is a data link protocol for point-to-point lines in Internet. Its framing is based on which of the
following?
1 point
Byte stuffing
Bit stuffing
Word stuffing
4.
Question 4
HDLC is another data link control protocol widely in use. Its framing is based on which of the
following?
1 point
Byte stuffing
Bit stuffing
Word stuffing
5.
Question 5
Which of following statements are true for HDLC?
1 point
6.
Question 6
In PPP authentication, which of the following is true for Challenge-Handshake Authentication
Protocol (CHAP)
1 point
7.
Question 7
In error detection and loss recovery, which of the following statement is correct
1 point
8.
Question 8
In multiplexing, Last IN First Out (LIFO) is used to determine the order of packet transmission
1 point
True
False
9.
Question 9
Generic Framing Procedure (GFP) allows the implementation of multiple transport modes that may
coexist within the same transport channel
1 point
True
False
10.
Question 10
In Generic Framing Procedure (GFP), which of the following sentences are correct
1 point
GFP uses an explicit payload length indicator provided in its frame header to accommodate variable
length PDUs
GFP provides flexible encapsulation framework that supports either a fixed or variable length frame
structure
1.
Question 1
What is the primary function of medium access control?
2 points
2.
Question 2
What is the primary benefit provided by the Slotted ALOHA compared to ALOHA?
2 points
3.
Question 3
What is the vulnerable period of collisions in ALOHA?
2 points
4.
Question 4
What is the vulnerable period of collisions in Slotted ALOHA?
Round-trip propagation delay
One frame transmission time
Two frame transmission time
None of the above
5.
Question 5
What is the vulnerable period of collisions in Carrier Sense Multiple Access (CSMA)?
2 points
6.
Question 6
The primary function of Media Access Control is to minimize or eliminate the instance of the
collisions to achieve a reasonable utilization of the medium
1 point
True
False
7.
Question 7
In media sharing techniques, which of the following are channelization approaches
1 point
8.
Question 8
Corresponding box of Carrier Sense Multiple Access/Collision Detection can be replaced by one of
the
1 point
I-persistent process
P-persistent process
Persistent process
Non-persistent process
9.
Question 9
Random access is also called the
1 point
Controlled access
Channelization
Authentication
Contention methods
10.
Question 10
In Carrier Sense Multiple Access (CSMA), possibility of collision still exist because of
1 point
Propagation delay
Collision delay
Transmit delay
2 points
2.
Question 2
2) In a collision-free reservation system that has a large number of light-traffic stations, and the
delay-bandwidth product is larger than 1. Which of following MAC protocol is a good fit for stations to
reserve mini-slots?
2 points
1-persistent CSMA
Slotted ALOHA
CSMA/CD
3.
Question 3
In Carrier Sense Multiple Access with collision detection (CSMA-CD), how long will it take a collision
to be detected and resolved?
2 points
4.
Question 4
Suppose that the ALOHA protocol is used to share a 56 kbps satellite channel. Suppose that frames
are 1000 bits long. What is the maximum throughput of the system in number of frames per second.
2 points
5.
Question 5
Consider building a CSMA/CD network running at 1Gbps over a 1-km cable. The signal speed in the
cable is 200,000 km/sec. What is the minimum frame size?
2 points
64 Bytes
640 Bytes
1250 Bytes
6.
Question 6
In media access control, which of the following statements are true for Channelization
1 point
7.
Question 7
Time-out period is equal to maximum possible propagation delay of
1 point
Square-trip
Triangle-trip
Rectangle-trip
Round-trip
8.
Question 8
In Carrier Sense Multiple Access (CSMA), if station senses medium before trying to use it then
chance of collision can be
1 point
Increased
Reduced
Doubled
Highlighted
9.
Question 9
Carrier Sense Multiple Access (CSMA) is based on medium called
1 point
10.
Question 10
Which of the following is not true for MAC scheduling
1 point
2 points
High speed
2.
Question 2
Use HDLC and Ethernet to identify similarities between medium access control and data link control
protocols. Which of following statements are true?
2 points
Both contains framing information that delineates the beginning and end of each frame.
Both implement error control and flow control for reliable transmission.
3.
Question 3
Use IEEE 802.3 and IEEE 802.11 to discuss differences between wired and wireless LANs. Which
of following statements are true about the differences?
2 points
Error rate
Station mobility
Collision detection
4.
Question 4
Which of following is not a primary responsibility of the MAC sublayer in LANs?
2 points
Channel access
5.
Question 5
In Ethernet, slot time that is at least the round-trip propagation delay, is the critical system parameter
for
2 points
6.
Question 6
Which one of the following event is not possible in wireless LAN.
1 point
Collision avoidance
Collision detection
7.
Question 7
In 802.11 protocol, MAC can alternate between Contention Periods (CPs) and Contention-Free
Periods (CFPs)
1 point
True
False
8.
Question 8
CSMA/CD is not used in DCF because
1 point
9.
Question 9
In infrastructure network supporting voice and data traffic, data traffic is transported through the CP
and voice traffic through the CFP
1 point
True
False
10.
Question 10
In 802.11 protocol, which of the following statements are true for Basic Service Set (BSS)
1 point
2 points
0.0122
0.122
1.22
2.
Question 2
Wireless data communication is compelling, because of
2 points
3.
Question 3
Why not use CSMA/CD in a wireless LAN? The primary reason is
2 points
4.
Question 4
In IEEE 802.11 MAC for wireless LANs, which of following inter-frame space (IFS) is used to
transmit high-priority frames such as ACKs?
2 points
PIFS
DIFS
SIFS
5.
Question 5
Which of following statements identifies the similarity between HDLC (data link control) and Ethernet
(medium access control)
2 points
Both implement error control and flow control functions to provide reliable transmission
Both contain framing information that delineates the beginning and end of each frame
6.
Question 6
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
1 point
CDMA
CSMA/CD
ALOHA
CSMA/CA
7.
Question 7
Which of the following are management services offered by the MAC sublayer in wireless LAN
1 point
Storage management
Network management
Power management
8.
Question 8
In CSMA/CA, An amount of time divided into slots called
1 point
Contention signals
Contention window
Contention procedure
Contention energy
9.
Question 9
In medium access control sublayer, medium usage is mediated by the access control during
contention period
1 point
True
False
10.
Question 10
In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), to continue transmission process
we use a
1 point
Station
Loop
Signal
1.
Question 1
Which layer LAN bridges work on?
1 point
Transport layer
Network layer
2.
Question 2
One can use repeaters, bridges and routers to interconnect two LANs. Which of the following
approaches will make local traffic stay in its own LAN?
1 point
bridges
routers
repeaters
3.
Question 3
Of the following network layer functions, which one is optional?
1 point
Routing
Forwarding
Congestion control
4.
Question 4
Of the following, which is a basic function of transparent bridge?
1 point
5.
Question 5
It is possible for a network layer to provide a choice of services to the user of the network. Which of
following the IP network layer offers
1 point
6.
Question 6
The network layer is considered the most complex layer because of the following reasons
1 point
User scalability
1 point
True
False
8.
Question 8
Which of the following is an essential network function
1 point
Forwarding
Routing
9.
Question 9
In network layer, which of the following statement is true for packet networks
1 point
1 point
True
False
1 point
2.
Question 2
Consider a three hop network from the source to the destination. Let m be the packet transmission
time at each hop. Let n be the propagation delay at each hop. Assume there is no queuing delay and
processing time at each hop. Based on store-and-forward, what is the total time for the packet to be
transmitted to the destination?
1 point
m+n
3m + n
3m + 3n
3.
Question 3
Consider a three hop network from the source to the destination. Let m be the message
transmission time at each hop. Let n be the propagation delay of each hop. Assume there is no
queueing delay and processing time at each hop. Based on store-and-forward, what is the total time
for three packets to be transmitted to the destination by packet pipelining?
1 point
3m + 3n
5m + 3n
9m + 9n
4.
Question 4
Six stations (S1-S6) are connected to an extended LAN through transparent bridges (B1 and B2), as
shown in the following figure. Initially, the forwarding tables are empty. Both bridges use backward
learning to build their tables. Suppose station S2 transmits a frame to S1. Which of following
statements is correct?
1 point
5.
Question 5
Following the above question. Suppose stations S 3 transmits a frame to S5. Which of following
statements is correct?
1 point
1 point
Repeater
Routers
Bridges
7.
Question 7
Packet pipelining can lead to latency in message delivery
1 point
True
False
8.
Question 8
In internet, switching is done by using datagram approach to packet switching at the
1 point
Application layer
Physical layer
Network layer
Data link layer
9.
Question 9
A transparent bridge's duties include
1 point
Forwarding
Blocking
Filtering frame
10.
Question 10
For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is(in
microseconds)
1 point
3.2
320
0.32
32
IP
ATM
2.
Question 2
Consider a three hop network from the source to the destination. Let m be the message
transmission time at each hop. Let n be the propagation delay of each hop. Assume there is no
queueing delay and processing time at each hop. Based on cut-through switching, what is the total
time for three packets to be transmitted to the destination?
1 point
3m + 3n
5m + 3n
9m + 9n
3.
Question 3
Which of following issue exists in virtual-circuit subnet but not in datagram subnet?
1 point
Addressing
State information
Routing
4.
Question 4
Which of following describe general goals in a routing algorithm?
1 point
5.
Question 5
Which of following describe benefits of flooding, a specialized routing approach?
1 point
6.
Question 6
A Virtual-Circuit Network (VCN) is normally implemented in the
1 point
session layer
network layer
Physical layer
7.
Question 7
In routing approaches, which of the following statement is true for deflection routing
1 point
No route synthesis
8.
Question 8
To reduce size of routing table, routers do lookup table on MAC address
1 point
True
False
1 point
2.
Question 2
What are possible metrics for routing?
1 point
Hop count
Delay
Bandwidth
3.
Question 3
Consider the network as shown in the figure. We use the Bellman-Ford algorithm to find the set of
shortest paths from all nodes to the destination node 2. Each node maintains an entry (n, cost) about
the next node along the current shortest path and the current minimum cost from the node to the
destination. Initially, each node has entry (-1, infinity).
In the first algorithm iteration, which nodes will update their entries and inform their neighbors?
1 point
4.
Question 4
Following the above question, in the second algorithm iteration, which nodes will update their entries
and inform their neighbors?
1 point
6
All of the above
5.
Question 5
Following the above question, in the third algorithm iteration, which nodes will update their entries
and inform their neighbors?
1 point
6.
Question 6
In link state routing, after the construction of link state packets new routes are computed using
1 point
Dijkstra's algorithm
7.
Question 7
A subset of a network that includes all the routers but contains no loops is called
1 point
Broadcast structure
spanning tree
8.
Question 8
In a router, which of the following statement is true for creating routing tables
1 point
9.
Question 9
In a virtual-circuit packet network, routing is determined during connection set-up
1 point
True
False
10.
Question 10
In deflection routing, bufferless operation is considered a disadvantage due to packet loss
1 point
True
False
1 point
Counting to infinity
Flooding overhead
Cannot work in IP
2.
Question 2
What is the root problem of link state routing?
1 point
Counting to infinity
Flooding overhead
3.
Question 3
Which of following describe the benefits of link state routing compared to distance vector routing?
1 point
Fast convergence
4.
Question 4
Which of following is the implementation of distance vector approach in the IP routing protocol?
1 point
RIP
OSPF
BGP
5.
Question 5
Which of following is the implementation of link state approach in the IP routing protocol?
1 point
RIP
OSPF
BGP
1 point
True
False
7.
Question 7
In an OSPF network, routers in area only knows complete topology inside area and limits the
flooding of link-state information to area
1 point
True
False
8.
Question 8
In link state routing, which of the following are possible steps taken to resolve the problem of old
update messages
1 point
9.
Question 9
In Asynchronous Transfer Mode (ATM), which of the following is an examples of supported services
1 point
10.
Question 10
In Asynchronous Transfer Mode (ATM), the packet structure attribute simplifies implementation and
ensures high speed transfer
1 point
True
False
1 point
It is connection-oriented
It only supports fixed-length packets
2.
Question 2
Consider the network as shown in the figure. We use the Dijkstra’s algorithm to find the set of
shortest paths from all nodes to the destination node 4. In Dijkstra’s algorithm, each iteration the
next closet node is added to the set with the root node.
1 point
3.
Question 3
Following the question above, at the second iteration, which node will be added to the set N?
1 point
5
3
4.
Question 4
Following the question above, at the third iteration, which node will be added to the set N?
1 point
5.
Question 5
Following the question above, at the fourth iteration, which node will be added to the set N?
1 point
6.
Question 6
In RIP operation, which of the following statement is correct
1 point
To deal with changes in topology such as a link failure, a router expects an update from each of its
neighbors within 180 sec
7.
Question 7
What are the limitations of RIP protocol
1 point
Slow convergence
8.
Question 8
In Open Shortest Path First (OSPF), which of the following statements are correct
1 point
9.
Question 9
Which of the following is a type of router defined in OSPF
1 point
Internal router
Backbone router
10.
Question 10
In a distance vector routing, if a link fails
1 point
All routers immediately update their link database and recalculate their shortest path
Neighboring routers exchange routing tables that may use failed links
Routers set link distance to infinity and floods the network with an update packet
1 point
Byte level
Flow level
Flow-aggregated level
Packet level
2.
Question 2
Which of following statements is true for FIFO queueing?
1 point
3.
Question 3
Which of following is not a packet-level mechanism?
1 point
4.
Question 4
What are typical end-to-end Quality-of-Service factors?
1 point
Packet delay
Jitter
5.
Question 5
By Random Early Detection (RED), when a given source transmits at a higher rate than others, the
source will
1 point
1 point
True
False
7.
Question 7
In FIFO queueing, delay and loss of packets depends on _________ and _________
1 point
8.
Question 8
Which of the following is a feature of fair queueing
1 point
9.
Question 9
In buffer management, drop priorities requires packet to drop when buffer is full
1 point
True
False
10.
Question 10
What are the key mechanisms in Open-Loop Control
1 point
Traffic shaping
Admission control
Re-routing
Policing
1 point
2.
Question 2
To guarantee network performance during the lifetime of admitted flows, open-loop control relies on
the following mechanism except:
1 point
Head-of-Line queueing
Admission control
Traffic shaping
Traffic policing
3.
Question 3
Which of following statements about leaky bucket is wrong?
1 point
In leaky bucket, when the bucket is full, the new arriving packets may be discarded
4.
Question 4
Consider a token bucket approach for traffic shaping. A token is generated every 5 micro-seconds.
Each packet can hold 48 bytes of data. What is the sustainable data transmission rate by the token
bucket?
1 point
7.68 Mbps
76.8 Mbps
768 Mbps
With a token every 5 m sec, 200,000 cells/sec can be sent. Each packet holds 48 data bytes or 384
bits. The net data rate is then 76.8 Mbps.
5.
Question 5
Upon which of the following condition is token bucket and leaky bucket the same?
1 point
6.
Question 6
In Head of Line (HOL) priority queueing, which of the following statement is a feature for this
approach
1 point
Provides differential QoS
High-priority classes can hog all of the bandwidth and starve lower priority classes
7.
Question 7
In buffer management, which feature requires packet to drop when buffer is full
1 point
Aggregation
Drop priorities
Drop strategy
Fairness
8.
Question 8
In buffer management, which of the following statement is correct for Random Early Detection (RED)
technique
1 point
Packets produced by TCP will reduce input rate in response to network congestion
Early drop causes some sources to reduce rate before others, causing gradual reduction in in
aggregate input rate
9.
Question 9
In Closed-Loop flow control, which of the following mechanism is used in congestion control to
regulate the flow from sources into network
1 point
Buffer length
Link utilization
Round-Trip Time
10.
Question 10
In congestion warning, the feedback mechanism can be implicit or explicit. Which of the following is
an example of implicit feedback
1 point
1 point
ICMP
ARP
IGMP
2.
Question 2
Which of the following packet header length cannot be used in an IPv4 packet header?
1 point
20 Bytes
30 Bytes
60 Bytes
64 Bytes
3.
Question 3
How many bits used for header checksum in IPv4 packets?
1 point
8 bits
16 bits
32 bits
4.
Question 4
What is the dotted notation of an IP address of 10000000 10000111 01000100 00000101 ?
1 point
128.133.68.5
128.135.68.5
128.135.65.5
128.135.65.5
5.
Question 5
Given a network address 128.100.0.0, what is its network class type?
1 point
Class A
Class B
Class C
6.
Question 6
Which of the following is provided at the IP layer
1 point
Connectionless
7.
Question 7
You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which will be your
closest choice
1 point
255.255.255.224
255.255.255.192
255.255.255.240
255.255.255.248
8.
Question 8
What is the subnetwork number of a host with an IP address of 172.16.66.0/21
1 point
172.16.48.0
172.16.64.0
172.16.0.0
172.16.36.0
9.
Question 9
What is the first valid host on the subnetwork that the node 172.30.190.198/24 belongs to?
1 point
172.30.190.0
172.30.190.1
172.30.190.100
10.
Question 10
Based on 1.1.1.0/24, the IP address would be:
1 point
Class A
Class B
Class C
Class D
1 point
1.0.0.0 to 127.255.255.255
128.0.0.0 to 191.255.255.255
192.0.0.0 to 223.255.255.255
2.
Question 2
If a subnet needs to accommodate up to 500 hosts. How many bits for HostID would be sufficient?
1 point
3.
Question 3
Consider a Class B network, where the subnet ID takes 9 bits. What will be the subnet mask?
1 point
4.
Question 4
Given a subnet mask 255.255.255.240, how many hosts the subnet can support?
1 point
14
30
62
5.
Question 5
A host in an organization has an IP address 150.32.64.34 and a subnet mask 255.255.240.0. What
is the address of this subnet?
1 point
150.32.64.32
150.32.64.24
150.32.64.16
150.32.64.0
6.
Question 6
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that
uses the 255.255.255.224 subnet mask
1 point
14
15
30
62
7.
Question 7
When calculating usable hosts per subnet, the following formula is used 2^bits - 2. For what reason
is two subtracted? (choose two)
1 point
Network
Broadcast
Multicast
Unicast
8.
Question 8
How many hosts can be addressed on 10.0.0.0/16?
1 point
16
254
65536
65534
9.
Question 9
Which of the following is a valid IP host address given the network ID of 191.254.0.0 while using 11
bits for subnetting?
1 point
191.54.1.64
191.254.1.29
191.254.0.32
191.254.0.96
10.
Question 10
DISCO Corporation has been assigned the Class B network address 165.87.0.0. DISCO needs to
divide the network into eight subnets. What subnet mask should be applied to the network to provide
the most hosts per subnet?
1 point
255.255.192.0
255.255.248.0
255.255.224.0
255.255.240.0
Class B
Class D
Class A
Class C
2.
Question 2
Using a CIDR notation, a prefix 205.100.0.0 of length 22 is written as 205.100.0.0/22. What network
mask that the /22 notation indicates?
1 point
205.255.255.0
255.255.252.0
255.255.22.0
3.
Question 3
Perform CIDR aggregation on the following /24 IP addresses: 128.58.24.0/24, 128.58.25.0/24,
128.58.26.0/24, 128.58.27.0/24. What is the CIDR outcome?
1 point
128.58.28.0/22
128.58.24.0/22
128.58.28.0/24
4.
Question 4
Which protocol provides conversion from an IP address to a physical address?
1 point
ARP
DNS
ICMP
IGRP
5.
Question 5
Which protocol is used to assign temporary IP addresses to hosts?
1 point
ICMP
DHCP
ARP
6.
Question 6
In order to maximize the usage of limited IP addresses, which of the following protocol is commonly
used
1 point
NAT
DHCP
7.
Question 7
The internet protocol allows IP fragmentation so that datagrams can be fragmented into pieces small
enough to pass over a link with a smaller MTU than the original datagram size
1 point
True
False
8.
Question 8
Which of the following statement is correct for IPv6
1 point
9.
Question 9
Bootstrap Protocol (BOOTP) allows a diskless workstation to be remotely booted up in a network
with TCP port designation for both client and server
1 point
True
False
10.
Question 10
In NAT operations, which of the following statements are correct (Select 3)
1 point
NAT maps each private IP address and port number into shared global IP address and available port
number
Hosts inside private networks generate packets with private IP address and TCP/UDP port numbers
Question 1
Packet is to be forwarded to a network with MTU of 592 bytes. The packet has an IP header of 20
bytes and a data part of 1484 bytes. Which of following maximum data length per fragment is
legitimate?
1 point
592
568
562
572
2.
Question 2
What information is used as the entry of the lookup table in a Network Address Translation box?
1 point
IP address
3.
Question 3
IPv6 allows fragmentation at
1 point
Source only
4.
Question 4
Which of following fields that IPv6 dropped from IPv4?
1 point
Header checksum
ID/flags/frag offset
Header length
5.
Question 5
Which of following techniques can be used for transitioning from IPv4 to IPv6?
1 point
IP tunneling
6.
Question 6
Which fields in IP packet provide for fragmentation of datagrams to allow differing MTUs in the
internet
1 point
Fragmentation offset
Flags
Type of service
Identification
7.
Question 7
IPv6 has a much larger space of
1 point
28
216
232
2128
8.
Question 8
Which of these statements are true of IPv6 representation
1 point
9.
Question 9
Which of the following statement is true for DHCP
1 point
10.
Question 10
In Network Address Translation (NAT), which of the following statement is true for a packet with an
associated private IP address at the routers in the global internet
1 point
Create an exception and then forward the packet to the destination address in the header
1 point
x+1
2.
Question 2
TCP header has a field called window size. What value is the value window size set to?
1 point
Round-trip delay
3.
Question 3
In general, there are three phases of congestion behavior, i.e., light traffic, knee, congestion
collapse. Which phase does TCP congestion avoidance maps to?
1 point
Light traffic
Knee
Congestion collapse
4.
Question 4
When three duplicate acknowledgements arrive before timeout expires, what will TCP congestion
control algorithm reset congestion threshold to for fast re-transmission and fast recovery?
1 point
Reset congestion threshold to 1
5.
Question 5
Assume a TCP source writes a 1200-byte message in one write. Which of following is possible for
the destination to receive the message?
1 point
6.
Question 6
The process of combining multiple outgoing protocol streams at the Transport and Network layers in
TCP/IP is called Multiplexing
1 point
True
False
7.
Question 7
TIMELY provides a framework for rate control that depends on transport layer protocol for reliability
1 point
True
False
8.
Question 8
The operation of TCP congestion control can be divided into three phases, which phase requires
that the congestion window size be increased by one segment upon receiving an ACK from receiver
1 point
Congestion avoidance
Slow start
Congestion
9.
Question 9
In a router, the control of the transmission rate at the sender's side such that the router's buffer will
not be over-filled is called _________ if sender is transmitting too fast
1 point
Network under-utilization
Host flooding
Network congestion
1 point
True
False
1 point
Flow control
Error control
Congestion control
2.
Question 2
Which of following information is not used in UDP de-multiplexing?
1 point
Destination IP address
Source IP address
Destination port number
3.
Question 3
TCP adopts selective repeat ARQ protocol for flow control. In TCP flow control implementation, the
window slides at
1 point
Per-packet basis
Per-byte basis
Per-bit basis
4.
Question 4
Which flag bit in TCP header must be set when a TCP client initiates a three-way handshake?
1 point
SYN
ACK
RST
5.
Question 5
Which flag bit in TCP header must be set when a TCP entity wants to terminate a connection?
1 point
ACK
FIN
RST
SYN
6.
Question 6
In Transmission Control Protocol (TCP), When a segment carries a combination of data and control
information, it uses a
1 point
Source Number
Port Number
Sequence Number
Slot Number
7.
Question 7
Transmission Control Protocol (TCP), has same Checksum controlling like
1 point
IP
UDP
TCP/IP
ICMP
8.
Question 8
In TCP connection management, which of the following statements are true
1 point
Select initial sequence numbers (ISN) to protect against segments from prior connections
Time for clock to go through a full cycle should be less than the maximum lifetime of a segment
9.
Question 9
In phases of congestion behavior, when arrival rate is greater than outgoing line bandwidth
1 point
Congestion onset
Light traffic
Congestion collapse
Knee
10.
Question 10
Which of the following services are provided by UDP
1 point
IP
De-multiplexing
Error Checking
1.
Question 1
What is the security requirement in case of Denial of Service?
1 point
Privacy
Availability
Integrity
2.
Question 2
In a software defined network (SDN), which of the architectural layer is responsible for switch
configuration and forwarding instruction?
1 point
Middle layer
Infrastructure layer
Security layer
None of the above
3.
Question 3
What is the security requirement in case of Malicious Code?
1 point
Privacy
Availability
Integrity
4.
Question 4
Which of the following is not a general misconception of SDN?
1 point
SDN is a mechanism
SDN is an open API for that provides standard interface for programming switches
5.
Question 5
Which component of NFV comprises of hardware and software required to deploy, manage and
execute VNFs.
1 point
Network function
Network function modules
NFVI
6.
Question 6
In Reverse-Path Broadcasting (RPB) scenario, assume each router knows current shortest path to
source node. Which of the following statement denotes the router's action
1 point
The router stores the packet in a buffer and wait for an explicit routing request from the source
If shortest path to source is through different port, router drops the packet
Upon receipt of a multicast packet, router records the packet's destination address and the
forwarding port
If shortest path to source is through the same port, router forwards the packet to all other ports
7.
Question 7
A peer with which a mobile node is communicating is called
1 point
Correspondent node
Foreign agent
Mobile node
Home agent
8.
Question 8
Reverse Path Multicasting (RPM) is used to increase
1 point
Efficiency
Performance
Accuracy
Strength
9.
Question 9
In Reverse Path Forwarding, router receives a packet and extracts the
1 point
Source address
Protocol address
IP address
Standard address
10.
Question 10
A network can receive a multicast packet from a particular source only through a
1 point
1 point
ICMP
IGMP
OPSF
2.
Question 2
Which of following statements most accurately describes the reverse-path broadcasting?
1 point
It assumes that the shortest path from the source to a given router should be the same as the
shortest path from the router to the source
3.
Question 3
Which class of IP address does the reverse-path broadcasting uses?
1 point
Class B
Class C
Class A
Class D
4.
Question 4
Attackers attempt to gain unauthorized access to server. What type of network security threat it
imposes?
1 point
Client imposter
Server imposter
Man-in-Middle
5.
Question 5
In mobile IP, when a home agent wants to send a packet to a mobile host in a foreign network, each
IP packet at the home agent will be encapsulated with an outer IP header. What is the destination IP
address in the outer IP header?
1 point
Care-of address
Mobile host’s address
6.
Question 6
An IP address associated with a mobile node while visiting a foreign link
1 point
Handover address
Home address
Care of address
Home link
7.
Question 7
TCP SYN flood attack exploits the TCP three-way handshake
1 point
True
False
8.
Question 8
In multicast communication, relationship is
1 point
one to one
many to one
one to many
one to all