Sunteți pe pagina 1din 7

Which of the following class is the address 10001001 00000111 11110000 11110011

(137.7.240.243) associated with


Select one:
a. Class B
b. Class A
c. Class C
d. Class D

Why do we use network address translator (NAT)?


Select one:
a. NAT is used for error reporting
b. NAT is used to convert the IP address to MAC address.
c. NAT is used to provide the IP address to the newly joined node in the network
d. NAT is used to save network addresses. Only one network address is sufficient
for communication with thousands of nodes in the network.

What is the last address of 167.199.170.82/27 (without considering the reserved


addresses in network)
Select one:
a. 167.199.170.64
b. 167.199.170.82
c. 167.199.170.95
d. 167.199.170.93

What can be said about the robustness of Distance vector and link state routing
algorithms (in situation if a node advertises incorrect link cost)
Select one:
a. The distance vector algorithm is less affected as it uses global knowledge.
b. The effect is propagated throughout the network in Link state algorithm and all
nodes are affected. This affects all the costs in the network.
c. The effect is propagated throughout the network in Distance vector algorithm.
Each node's table is used by other.
d. The link state algorithm is less affected as it is decentralized algorithm.

What is the use of persistece timer?


Select one:
a. The timer is most useful in situation when an acknowledgement is sent by the
receiving side to signal the willingness to accept the segments. If the acknowledgement
is lost, there may be a deadlock. In such situations this timer is most useful.
b. The timer is used to check if the connection is still open or has the client crashed
c. The timer is used check for the lost packet or acknowledgement
d. The timer is used for error correction

Why do we need network layer?


Select one:
a. Network layer is required for Addressing and Routing
b. Network layer is must for congestion control and flow control
c. Network layer is used for error detection and correction
d. Network layer is used for transmission of actual bits from sender to the receiver.

Conver the binary address 10001001 10000011 11110000 11110010 to dotted


decimal notation of IP address.
Select one:
a. 137.7.240.243
b. 143.133.240.242
c. 143.133.240.122
d. 137.131.240.242

What is the use of keep alive timer?


Select one:
a. The timer is used check for the lost packet or acknowledgement
b. The timer is used for error correction
c. The timer is most useful in situation when an acknowledgement is sent by the
receiving side to signal the willingness to accept the segments. If the acknowledgement
is lost, there may be a deadlock. In such situations this timer is most useful.
d. The timer is used to check if the connection is still open or has the client crashed

In which situation Karn's algorithm is applicable


Select one:
a. When the congestion rate exceeds the threshold
b. To calculate the keep alive timer when there is a open connection and client has
crashed
c. In case of calculation of persistence timer for deadlock scenarios
d. To calculate the Retransmission timeout timer value in case of timeouts and
retransmissions

Suppose we are transmitting three 8 bit data over UDP (0 1 0 1 0 1 0 1, 0 1 1 1 0 0 0 0,


and 0 1 0 0 1 1 0 0). Calculate the checksum value for them
Select one:
a. 1 1 1 0 1 1 0 1
b. 1 1 1 0 1 1 0 0
c. 1 1 0 0 1 1 0 1
d. 1 1 1 0 1 0 0 1

Suppose that the UDP receiver computes the Internet checksum for the received
UDP segment and finds that it matches the value carried in the checksum field.
What can you say?
Select one:
a. There is certainly no error
b. There is no two-bit error
c. We can not say anything hence we need to compute the error at layers below
before commenting.
d. There is no one-bit error
What is the motivation behind hierarchical routing?
Select one:
a. Hierarchical routing provides more priviledges to the user
b. We can have better scaling and more automomy if we use hierarchical routing
c. Hierarchical routing is quick and more time sensitive.
d. The hierarchical routing is more robust than other schemes.

How is Retransmission timeout (RTO) timer calculated?


Select one:
a. The persistence timer value is used to calculate the RTO timer value
b. The value of keep alive timer is used to calculate the RTO timer value
c. The round trip time measured to caculate the smoothed RTT and RTT deviation.
The values are used to calculate the RTO timer.
d. The RTO timer value is calculated from the experience of the network
administrator

When we already have TCP, what is the need of having another protocol at
transport layer in the form of UDP?
Select one:
a. We need to have a transport layer protocol that is less reliable
b. TCP provides congestion control and flow control. There is a need of a protocol
that is simple, has small header, and does not provide congestion control so as to
transmit the segments as fast as possible.
c. TCP has high burden on itself, hence a need of UDP was there to share the
burden of TCP
d. UDP is best for applications like HTTP, where TCP fails

Which routing algorithm uses dijkastra'a algorithm?


Select one:
a. Border gateway routing algorithm
b. Distance-Vector routing algorithm
c. Link state routing algorithm
d. Decentralized routing algorithms

What can you say about virtual circuit (VC) connection in computer networks?
Select one:
a. The VC connection is similar to old telephone connections where the reservation
can be done before the start of connection. Each packet follows the same path.
b. VC is generally applied in the Internet because of its ease of communication and
less connection set-up time
c. The VC packets needs to be fragmented at every intermediate router and
reassembled at the destination
d. In the VC connection the data packets can take any path. The packets from same
source-destination pair can follow different paths.

Which of the algorithm suffers from count-to-infinity problem


Select one:
a. Static routing algorithm
b. Link state routing algorithm
c. Border gateway routing algorithm
d. Distance vector algorithm

what is the use of receiver window?


Select one:
a. The window is a signal used for flow control, congestion control, and error
correction
b. It signals the amount of unacknowledged packets at the sending side
c. It is used to signal the sender, the number of packets it can send before the
reciever is overwelmed
d. The number of unacknowledged packets at the intermediate router is determined
by the reciever window

What can be said about the datagram connection in computer networks?


Select one:
a. In the datagram connection the data packets can take any path. The packets from
same source-destination pair can follow different paths.
b. There is rigerous process to initiate the communication in the datagram
connection involving the call setup, deciding the identifier number, and reserving the
resources in the intermediate routers and links.
c. The datagram connection is what makes the modern day HTTP protocol and
other application layer protocols.
d. Datagram connection is similar to the old telephone connections where the
reservation can be done before the start of connection. Each packet follows the same
path.

What is the difference between routing and forwarding?


Select one:
a. Routing is about moving a packet from a router’s input port to the appropriate
output port. Forwarding is about determining the end-to-routes between sources and
destinations.
b. Forwarding is about moving a packet from a router’s input port to the appropriate
output port. Routing is about determining the end-to-routes between sources and
destinations.
c. Both Routing and forwarding are about moving a packet from a router’s input
port to the appropriate output port. The difference is in implementation.
d. Both Routing and forwarding are about determining the end-to-routes between
sources and destinations. The difference is in implementation.

How is time to live field used in IP?


Select one:
a. The field is deprecated and is not used anywhere in the modern day IP
b. The time to live field indicated the remaining time left with the packet. The
remaining time is decremented every second. Once the remaining time reaches zero, the
packet is dropped immediately and communicated to the source.
c. Time to live field is implemented as a hop count. The field indicated how many
hops the packet can move before being dropped.
d. There is a time associated with every packet in IP. As soon as the time elapsed
the packet is dropped.
Why is there ICMP protocol and what is/are its application(s)?
Select one:
a. ICMP protocol is must for flow control and congestion control
b. ICMP protocol is used for fragmentation and reassembly
c. ICMP protocol is used for routing
d. ICMP protocol is used for error reporting

What is distance vector routing algorithm


Select one:
a. It is iterative, asynchronous and distributed algorithm
b. It is cnetralized routing algorithm that uses dijkastra's algorithm
c. It is static routing algorithm and suffers from penetration delay problem
d. It is a link state routing algorithm

What is the size of TCP header and UDP header?


Select one:
a. TCP header is 8 bytes and UDP header is atleast 20 bytes
b. UDP header is 8 bytes and TCP header is atleast 20 bytes
c. Both UDP and TCP headers and atleast 20 bytes
d. Both TCP and UDP headers are 8 bytes

Why is Retransmission time out timer used?


Select one:
a. The timer is used to check if the connection is still open or has the client crashed
b. The timer is used check for the lost packet or acknowledgement
c. The timer is most useful in situation when an acknowledgement is sent by the
receiving side to signal the willingness to accept the segments. If the acknowledgement
is lost, there may be a deadlock. In such situations this timer is most useful.
d. The timer is used for error correction

S-ar putea să vă placă și