Professional Documents
Culture Documents
Ec8552 Computer Architecture and Organization
Ec8552 Computer Architecture and Organization
com
om
NETWORKS d) a process is active and another is inactive
Answer: a
ECE - 5th Semester Explanation: A computer network, or data
network, is a digital telecommunications
network which allows nodes to share
Regulations 2017
.c
resources. In computer networks, computing
devices exchange data with each other using
connections between nodes. The nodes have
certain processes which enable them to share
ul
a specific type of data using a distinct
UNIT I FUNDAMENTALS protocol.
Answer: d
A distributed system is also the same as Explanation: In a computer network, a node
computer network but the main difference is can be anything that is capable of sending
that the whole collection of computers data or receiving data or even routing the data
w
om
Explanation: A protocol stack refers to a
Answer: a group of protocols that are running
Explanation: In a broadcast network, concurrently that are employed for the
information is sent to all stations in a network implementation of network protocol suite.
whereas in a multicast network the data or Each layer in the network model has to use
information is sent to a group of stations in one specific protocol from the protocol stack.
the network. In unicast network, information
.c
is sent to only one specific station. The 9. Network congestion occurs _________
broadcast address of the network is the last a) in case of traffic overloading
assigned address of the network. b) when a system terminates
c) when connection between two nodes
ul
6. Bluetooth is an example of __________ terminates
a) personal area network d) in case of transfer failure
b) local area network
Answer: a
c) virtual private network
d) wide area network
pa Explanation: Network congestion occurs
when traffic in the network is more than the
Answer: a network could handle. To avoid network
Explanation: Bluetooth is a wireless congestion, the network management uses
technology used to create a wireless personal various open-loop and closed-loop congestion
jin
area network for data transfer up to a distance control techniques.
of 10 meters. It operates on 2.45 GHz
frequency band for transmission. 10. Which of the following networks extends
a private network across public networks?
7. A __________ is a device that forwards a) local area network
.re
that forwards data packets between computer as if their computing devices were directly
networks. Routers perform the traffic connected to the private network.VPN
directing functions on the Internet. They provides enhanced security and online
w
make use of routing protocols like RIP to find anonymity to users on the internet. It is also
the cheapest path to the destination. used to unblock websites which are
unavailable in certain regions.
8. A list of protocols used by a system, one
protocol per layer, is called ________
om
a) Topology 4. Data communication system spanning
b) Routing states, countries, or the whole world is
c) Networking ________
d) Control a) LAN
b) WAN
Answer: a c) MAN
Explanation: Topology in networks is the d) PAN
.c
structure or pattern in which each and every
node in the network is connected. There are Answer: b
many topologies in networking like bus, tree, Explanation: WAN is the abbreviation for
ring, star, mesh, and hybrid topology. There is Wide Area Network. This network extends
ul
no particular best topology and a suitable over a large geographical area. WANs are
topology can be chosen based on the kind of used to connect cities, states or even
application of the network . pa countries. A wireless connection is required
to build a WAN. The best example of WAN is
2. Which network topology requires a central the Internet.
controller or hub?
a) Star 5. Data communication system within a
b) Mesh building or campus is________
c) Ring a) LAN
jin
d) Bus b) WAN
c) MAN
Answer: a d) PAN
Explanation: In star topology, no computer is
connected to another computer directly but all Answer: a
.re
the computers are connected to a central hub. Explanation: LAN is an abbreviation for
Every message sent from a source computer Local Area Network. This network
goes through the hub and the hub then interconnects computers in a small area such
forwards the message only to the intended as schools, offices, residence etc. It is the
destination computer. most versatile kind of data communication
w
om
__________ Answer: b
a) Seconds Explanation: Internet is nothing but an
b) Frames interconnected computer network providing a
c) Packets variety of communication facilities,
d) Bits consisting of a huge amount of small
networks using standardized communication
Answer: b protocols.
.c
Explanation: TDM is the abbreviation for
Time division multiplexing. It is technique for 2. To join the internet, the computer has to be
combining several low rate channels to a connected to a _________
single high rate channel. For a certain time a) internet architecture board
ul
slot, the several channels could use the b) internet society
maximum bandwidth. Each channel is c) internet service provider
inactive for a period of time too. Some other
pa d) different computer
multiplexing techniques are Frequency
division multiplexing and Phase division Answer: c
multiplexing. Explanation: The ISPs (Internet Service
Providers) are the main agents through which
8. _____ is the multiplexing technique that every computer is connected to the internet.
shifts each signal to a different carrier They are licensed to allot public IP addresses
jin
frequency. to its customers in order to connect them to
a) FDM the internet.
b) TDM
c) Both FDM & TDM 3. Internet access by transmitting digital data
d) PDM over the wires of a local telephone network is
.re
provided by _______
Answer: a a) leased line
Explanation: FDM is an abbreviation for b) digital subscriber line
Frequency Division Multiplexing. This c) digital signal line
technique is used when the bandwidth of the d) digital leased line
w
trying to use the same frequency. Some other telephone lines to transport high-bandwidth
multiplexing techniques are Time division data to service subscribers. DSL was used to
multiplexing and Phase division multiplexing. allow the early users access to the internet
w
om
Explanation: ISPs exchange internet traffic 8. Which one of the following is not an
between their networks by using Internet application layer protocol used in internet?
Exchange Points. ISPs and CDNs are a) remote procedure call
connected to each other at these physical b) internet relay chat
locations are they help them provide better c) resource reservation protocol
service to their customers. d) local procedure call
.c
5. Which of the following protocols is used in Answer: c
the internet? Explanation: Resource reservation protocol
a) HTTP is a transport layer protocol used on the
b) DHCP internet. It operates over IPv4 and IPv6 and is
ul
c) DNS designed to reserve resources required by the
d) DNS, HTTP and DNS network layer protocols.
om
a) Third level and switches, but it actually creates a logical
b) Fourth level image of the most efficient communication
c) Second level rout and implements it with a physical
d) Fifth layer medium.
.c
level of the open system interconnection b) Switches
model and the layer that provides data routing c) Packets
paths for network communication. d) Bridges
ul
2. Data in network layer is transferred in the Answer: a
form of ____________ Explanation: Network layer protocols exits
a) Layers in every host or router. The router examines
the header fields of all the IP packets that
b) Packets
c) Bytes
d) Bits
pa pass through it.
which layer?
Answer: a a) Transport layer
Explanation: The network layer is b) Data layer
considered as the backbone of the network c) Application layer
w
4. The network layer contains which Explanation: In OSI model, we are having 7
hardware device? layers in which the network layer responds to
a) Routers, Bridges request from the layer above it called
b) Bridges only Transport Layer.
8. The network layer issues request to which 12. ICMP stands for __________
layer? a) Internet Coordinate Message Protocol
a) Transport layer b) Internet Control Message Protocol
b) Data layer c) Interconnect Control Message Protocol
c) Application layer d) Interconnect Coordinate Message Protocol
d) Session layer
om
Answer: b
Answer: b Explanation: The Internet Protocol is the key
Explanation: In OSI model, we are having 7 network layer protocol that implements the
layers in which the network layer issues TCP/IP Protocol suites. Since IP is the
request to the layer below it called Data Link protocol that provides the mechanism for
Layer. delivering datagrams, between devices, it is
designed to be relatively basic, and to
.c
9. IP is connectionless. function with few “bell and whistles”.
a) True
b) False 13. Packets will be transferred in how many
types?
ul
Answer: a a) 5 types
Explanation: IP is connectionless, is that a b) 4 types
data packet can travel from a sender to a c) 2 types
receiver without the recipient having to send
pa
an acknowledgment connection-oriented
protocols exits at other, higher layers of the
d) 3 types
Answer: d
OSI model. Explanation: Routing deals with determining
how packet will routed (transferred) from
10. Does network layer in TCP/IP and OSI source to destination. It can of three types : 1.
jin
Model are same. Static
a) True 2. Dynamic
b) False 3. Semi Dynamic.
Answer: b 14. DDP stands for _________
.re
om
4. In __________________ layer,
TOPIC 1.5 OSI MODEL vulnerabilities are directly associated with
physical access to networks and hardware.
1. The ____________ model is 7-layer a) physical
architecture where each layer is having some b) data-link
specific functionality to perform. c) network
a) TCP/IP d) application
.c
b) Cloud
c) OSI Answer: a
d) OIS Explanation: In the physical layer,
vulnerabilities are directly associated with
ul
Answer: c physical access to networks and hardware
Explanation: The OSI model is 7-layer such as unauthorised network access, damage
architecture where each layer is having some
pa or destruction of data & hardware and
specific functionality to perform. All these keystroke & Other Input Logging.
layers work in collaboration for transmitting
the data from 1 person to another worldwide. 5. Loss of power and unauthorized change in
the functional unit of hardware comes under
2. The full form of OSI is OSI model is problems and issues of the physical layer.
______________ a) True
jin
a) Open Systems Interconnection b) False
b) Open Software Interconnection
c) Open Systems Internet Answer: a
d) Open Software Internet Explanation: Loss of power and
unauthorized change in the functional unit of
.re
forced for flooding traffic to all VLAN ports 10. Which of the following is an example of
are examples of data-link layer vulnerability. physical layer vulnerability?
a) MAC Address Spoofing
7. ____________ is data-link layer b) Physical Theft of Data
vulnerability where stations are forced to c) Route spoofing
make direct communication with another d) Weak or non-existent authentication
om
station by evading logical controls.
a) VLAN attack Answer: b
b) VLAN Circumvention Explanation: Physical theft of data is an
c) VLAN compromisation method example of physical layer vulnerability. Other
d) Data-link evading such issues are unauthorized network access,
damage or destruction of data & hardware
Answer: b and keystroke & Other Input Logging.
.c
Explanation: VLAN Circumvention is data-
link layer vulnerability where stations are 11. Which of the following is an example of
forced to make direct communication with data-link layer vulnerability?
another station by evading logical controls a) MAC Address Spoofing
ul
implemented using subnets and firewalls. b) Physical Theft of Data
c) Route spoofing
8. ________________may be forced for d) Weak or non-existent authentication
flooding traffic to all VLAN ports allowing
connected to a VLAN.
pa
interception of data through any device that is Answer: a
Explanation: MAC Address spoofing is an
a) Switches example of data-link layer vulnerability.
b) Routers VLAN circumvention, as well as switches,
c) Hubs may be forced for flooding traffic to all
jin
d) Repeaters VLAN ports are some other examples of
data-link layer vulnerability.
Answer: a
Explanation: Switches may be forced for 12. Which of the following is an example of
flooding traffic to all VLAN ports allowing network layer vulnerability?
.re
om
vulnerability. Other such physical layer Explanation: Fiber optics is considered to
vulnerabilities are unauthorized network have the highest transmission speed among
access, damage or destruction of data & the all mentioned above. The fiber optics
hardware and keystroke & Other Input transmission runs at 1000Mb/s. It is called as
Logging. 1000Base-Lx whereas IEEE standard for it is
802.3z. It is popularly used for modern day
14. Which of the following is an example of network connections due to its high
.c
data-link layer vulnerability? transmission rate.
a) Physical Theft of Data
b) VLAN circumvention 3. Bits can be sent over guided and unguided
c) Route spoofing media as analog signal by ___________
ul
d) Weak or non-existent authentication a) digital modulation
b) amplitude modulation
Answer: b c) frequency modulation
Explanation: VLAN circumvention is an
pa
example of data-link layer vulnerability.
MAC Address Spoofing, as well as switches,
d) phase modulation
Answer: a
may be forced for flooding traffic to all Explanation: In analog modulation, digital
VLAN ports are some other examples of low frequency baseband signal (digital bit
data-link layer vulnerability. stream) is transmitted over a higher
jin
frequency. Whereas in digital modulation the
only difference is that the base band signal is
TOPIC 1.6 PHYSICAL LAYER of discrete amplitude level. The bits are
represented by only two frequency levels, one
1. The physical layer is concerned with for high and one for low.
.re
___________
a) bit-by-bit delivery 4. The portion of physical layer that interfaces
p) process to process delivery with the media access control sublayer is
c) application to application delivery called ___________
d) port to port delivery a) physical signalling sublayer
w
mediums aid the physical layer in performing control sublayer is Physical Signaling
its functions. Sublayer. The main function of this layer is
character encoding, reception, decoding and
2. Which transmission media provides the performs optional isolation functions. It
highest transmission speed in a network?
handles which media connection the signal responsible for line coding, channel coding
should be forwarded to physically. and modulation that is needed for the
transmission of the information. The physical
5. The physical layer provides __________ configuration including pins, connectors and
a) mechanical specifications of electrical the electric current used is dealt in the
connectors and cables physical layer based on the requirement of the
om
b) electrical specification of transmission line network application.
signal level
c) specification for IR over optical fiber 8. The physical layer translates logical
d) all of the mentioned communication requests from the ______ into
hardware specific operations.
Answer: d a) data link layer
Explanation: Anything dealing with a b) network layer
.c
network cable or the standards in use – c) trasnport layer
including pins, connectors and the electric d) application layer
current used is dealt in the physical layer
(Layer 1). Physical layer deals with bit to bit Answer: a
ul
delivery of the data aided by the various Explanation: Physical layer accepts data or
transmission mediums. information from the data link layer and
converts it into hardware specific operations
6. In asynchronous serial communication the
physical layer provides ___________
a) start and stop signalling
pa so as to transfer the message through physical
cables. Some examples of the cables used are
optical fiber cables, twisted pair cables and
b) flow control co-axial cables.
c) both start & stop signalling and flow
control 9. A single channel is shared by multiple
jin
d) only start signalling signals by ____________
a) analog modulation
Answer: c b) digital modulation
Explanation: In asynchronous serial c) multiplexing
communication, the communication is not d) phase modulation
.re
communication, so the start and stop method multiplexing, where multiple analog or digital
is not really required. signals are combined into one signal over a
shared medium. The multiple kinds of signals
7. The physical layer is responsible for are designated by the transport layer which is
w
c) infrared Answer: d
d) all of the mentioned Explanation: Some of the properties of
Fourier transform are duality property, time
Answer: d scaling property, time shifting property,
Explanation: Wireless transmission is carried modulation property and many more.
out by radio waves, microwaves and IR
om
waves. These waves range from 3 Khz to 4. A base-band signal can be up-converted
above 300 Ghz and are more suitable for using
wireless transmission. Radio waves can a) Sine wave
penetrate through walls and are used in radio b) Cosine wave
communications, microwaves and infrared c) Filtering
(IR) waves cannot penetrate through walls d) None of the mentioned
and are used for satellite communications and
.c
device communications respectively. Answer: b
Explanation: A base-band signal can be up-
converted to band-pass filter by applying
TOPIC 1.7 OVERVIEW OF DATA cosine wave.
ul
AND SIGNALS
5. A band-pass signal can be down-converted
1. In the digital communication system, using
a) Sine wave
a) Orthogonal
b) Non orthogonal
pa
signals in different frequency bands are
b) Cosine wave
c) Time delayed wave
c) Orthogonal & Non orthogonal d) None of the mentioned
d) None of the mentioned
Answer: b
jin
Answer: a Explanation: For down-conversion of a
Explanation: In digital communication band-pass signal also cosine signal is used
system, signals from different frequency and multiplied with it.
bands are orthogonal thus interference won’t
6. In down-conversion multiplication with
.re
occur.
cosine wave is followed by
2. Properties of impulse function are a) Low pass filter
a) Symmetry b) High pass filter
b) Time scaling c) Bandpass filter
c) Shifting d) Bandstop filter
w
impulse function are symmetry, time scaling followed by low pass filtering.
and shifting.
7. ADSL has _____ information channels.
w
Answer: b c) Infinity
Explanation: Asymmetric digital subscriber d) Cannot be determined
line has three information channels – a high
speed downstream channel, ISDN channel Answer: b
and medium speed duplex channel. Explanation: A band-pass signal has a
Fourier transform equal to zero for all value
om
8. Fourier transform of a signal gives the in both frequency and time domain.
a) Frequency content
b) Bandwidth 12. A band-pass signal has
c) Frequency content & Bandwidth a) DC component
d) None of the mentioned b) No DC component
c) No side lobes
Answer: c d) Cannot be determined
.c
Explanation: Fourier transform of a signal
give the frequency content and also Answer: b
determines the bandwidth of the signal. Explanation: A band-pass signal has no DC
components and has Fourier transform equal
ul
9. Random things in a communication system to zero. Outside the band it will not be exactly
are zero. Thus this results in presence of side
a) Timing offset lobes.
b) Device frequency
c) Attenuation
d) All of the mentioned
pa 13. Which are orthonormal signal
representation?
a) Sine and cosine at same frequency
Answer: d b) Wavelets
Explanation: Some of the random things in c) Complex sinusoids at a different frequency
jin
the communication system are noise in the d) All of the mentioned
channel, attenuation, fading, channel filtering,
device frequency, phase and timing offset. Answer: d
Explanation: Some of the common
10. Which can be used for periodic and non orthonormal signal representations are sine
.re
a) Constellation space
Answer: b b) Signal space
Explanation: Fourier series is limited to only c) Orthogonal space
periodic signals where as Fourier transforms d) Boundary space
w
11. A band-pass signal has a Fourier plotted in a space called as signal space.
transform equal to
a) One 15. Cumulative distributive function is
b) Zero a) Non negative
b) Non decreasing
Answer: c Answer: d
Explanation: Cumulative distribution Explanation: Channel coding is the function
function is non negative and non decreasing of physical layer. Data link layer mainly deals
om
function. with framing, error control and flow control.
Data link layer is the layer where the packets
16. Which are non negative functions? are encapsulated into frames.
a) PDF
b) PMF 3. Which sublayer of the data link layer
c) PDF & PMF performs data link functions that depend upon
d) None of the mentioned the type of medium?
.c
a) logical link control sublayer
Answer: c b) media access control sublayer
Explanation: PDF, PMF and CDF are non c) network interface control sublayer
negative functions. d) error control sublayer
ul
Answer: b
TOPIC 1.8 INTRODUCTION TO Explanation: Media access control (MAC)
DATA LINK LAYER deals with transmission of data packets to and
pa
1. The data link layer takes the packets from
from the network-interface card, and also to
and from another remotely shared channel.
_________ and encapsulates them into The MAC sublayer also prevents collision
frames for transmission. using protocols like CSMA/CD.
a) network layer
jin
b) physical layer 4. Header of a frame generally contains
c) transport layer ______________
d) application layer a) synchronization bytes
b) addresses
Answer: a c) frame identifier
.re
packets are then sent to data link layer where information about the transmission of the file.
they are encapsulated into frames. These It contains information like synchronization
frames are then transferred to physical layer bytes, addresses, frame identifier etc. It also
where the frames are converted to bits. Error contains error control information for
w
control and flow control data is inserted in the reducing the errors in the transmitted frames.
frames at the data link layer.
5. Automatic repeat request error
w
Answer: a Answer: d
Explanation: The logical link control is a Explanation: There are many data link layer
sublayer of data link layer whose main protocols. Some of them are SDLC
om
function is to manage traffic, flow and error (synchronous data link protocol), HDLC
control. The automatic repeat request error (High level data link control), SLIP (serial
management mechanism is provided by the line interface protocol), PPP (Point to point
LLC when an error is found in the received protocol) etc. These protocols are used to
frame at the receiver’s end to inform the provide the logical link control function of
sender to re-send the frame. the Data Link Layer.
.c
6. When 2 or more bits in a data unit has been 9. Which of the following is the multiple
changed during the transmission, the error is access protocol for channel access control?
called ____________ a) CSMA/CD
a) random error b) CSMA/CA
ul
b) burst error c) Both CSMA/CD & CSMA/CA
c) inverted error d) HDLC
d) double error
Answer: c
Answer: b
pa
Explanation: When a single bit error occurs
Explanation: In CSMA/CD, it deals with
detection of collision after collision has
in a data, it is called single bit error. When occurred, whereas CSMA/CA deals with
more than a single bit of data is corrupted or preventing collision. CSMA/CD is
has error, it is called burst error. If a single bit abbreviation for Carrier Sensing Multiple
jin
error occurs, the bit can be simply repaired by Access/Collision detection. CSMA/CA is
inverting it, but in case of a burst error, the abbreviation for Carrier Sensing Multiple
sender has to send the frame again. Access/Collision Avoidance. These protocols
are used for efficient multiple channel access.
7. CRC stands for __________
.re
om
frames for transmission. using protocols like CSMA/CD.
a) network layer
b) physical layer 4. Header of a frame generally contains
c) transport layer ______________
d) application layer a) synchronization bytes
b) addresses
Answer: a c) frame identifier
.c
Explanation: In computer networks, the data d) all of the mentioned
from application layer is sent to transport
layer and is converted to segments. These Answer: d
segments are then transferred to the network Explanation: In a frame, the header is a part
ul
layer and these are called packets. These of the data that contains all the required
packets are then sent to data link layer where information about the transmission of the file.
they are encapsulated into frames. These
pa It contains information like synchronization
frames are then transferred to physical layer bytes, addresses, frame identifier etc. It also
where the frames are converted to bits. Error contains error control information for
control and flow control data is inserted in the reducing the errors in the transmitted frames.
frames at the data link layer.
5. Automatic repeat request error
2. Which of the following tasks is not done by management mechanism is provided by
jin
data link layer? ________
a) framing a) logical link control sublayer
b) error control b) media access control sublayer
c) flow control c) network interface control sublayer
d) application access control sublayer
.re
d) channel coding
Answer: d Answer: a
Explanation: Channel coding is the function Explanation: The logical link control is a
of physical layer. Data link layer mainly deals sublayer of data link layer whose main
with framing, error control and flow control. function is to manage traffic, flow and error
w
Data link layer is the layer where the packets control. The automatic repeat request error
are encapsulated into frames. management mechanism is provided by the
LLC when an error is found in the received
3. Which sublayer of the data link layer frame at the receiver’s end to inform the
w
performs data link functions that depend upon sender to re-send the frame.
the type of medium?
a) logical link control sublayer 6. When 2 or more bits in a data unit has been
w
b) media access control sublayer changed during the transmission, the error is
c) network interface control sublayer called ____________
d) error control sublayer a) random error
b) burst error
Answer: b Answer: c
Explanation: When a single bit error occurs Explanation: In CSMA/CD, it deals with
in a data, it is called single bit error. When detection of collision after collision has
om
more than a single bit of data is corrupted or occurred, whereas CSMA/CA deals with
has error, it is called burst error. If a single bit preventing collision. CSMA/CD is
error occurs, the bit can be simply repaired by abbreviation for Carrier Sensing Multiple
inverting it, but in case of a burst error, the Access/Collision detection. CSMA/CA is
sender has to send the frame again. abbreviation for Carrier Sensing Multiple
Access/Collision Avoidance. These protocols
7. CRC stands for __________ are used for efficient multiple channel access.
.c
a) cyclic redundancy check
b) code repeat check 10. The technique of temporarily delaying
c) code redundancy check outgoing acknowledgements so that they can
d) cyclic repeat check be hooked onto the next outgoing data frame
ul
is called ____________
Answer: a a) piggybacking
Explanation: Cyclic redundancy check is a b) cyclic redundancy check
code that is added to a data which helps us to
pa
identify any error that occurred during the
transmission of the data. CRC is only able to
c) fletcher’s checksum
d) parity check
om
d) All of the mentioned Explanation: In synchronous transmission,
receiver must stay synchronous for 9 bits.
Answer: d
Explanation: IP router, microwave router and 7. How error detection and correction is
telephone switch can be used as an done?
intermediate device between communication a) By passing it through equalizer
of two entities. b) By passing it through filter
.c
c) By amplifying it
3. Which has comparatively high frequency d) By adding redundancy bits
component?
a) Sine wave Answer: d
ul
b) Cosine wave Explanation: Error can be detected and
c) Square wave corrected by adding additional information
d) None of the mentioned pa that is by adding redundancy bits.
om
a) logical link control sublayer
UNIT II MEDIA ACCESS b) media access control sublayer
c) network interface control sublayer
& INTERNETWORKING d) error control sublayer
.c
deals with transmission of data packets to and
ACCESS CONTROL from the network-interface card, and also to
and from another remotely shared channel.
1. The data link layer takes the packets from The MAC sublayer also prevents collision
ul
_________ and encapsulates them into using protocols like CSMA/CD.
frames for transmission.
a) network layer 4. Header of a frame generally contains
______________
b) physical layer
c) transport layer
d) application layer
pa a) synchronization bytes
b) addresses
c) frame identifier
Answer: a d) all of the mentioned
Explanation: In computer networks, the data
jin
from application layer is sent to transport Answer: d
layer and is converted to segments. These Explanation: In a frame, the header is a part
segments are then transferred to the network of the data that contains all the required
layer and these are called packets. These information about the transmission of the file.
It contains information like synchronization
.re
Answer: a
Answer: d Explanation: The logical link control is a
Explanation: Channel coding is the function sublayer of data link layer whose main
of physical layer. Data link layer mainly deals function is to manage traffic, flow and error
with framing, error control and flow control. control. The automatic repeat request error
management mechanism is provided by the line interface protocol), PPP (Point to point
LLC when an error is found in the received protocol) etc. These protocols are used to
frame at the receiver’s end to inform the provide the logical link control function of
sender to re-send the frame. the Data Link Layer.
6. When 2 or more bits in a data unit has been 9. Which of the following is the multiple
om
changed during the transmission, the error is access protocol for channel access control?
called ____________ a) CSMA/CD
a) random error b) CSMA/CA
b) burst error c) Both CSMA/CD & CSMA/CA
c) inverted error d) HDLC
d) double error
Answer: c
.c
Answer: b Explanation: In CSMA/CD, it deals with
Explanation: When a single bit error occurs detection of collision after collision has
in a data, it is called single bit error. When occurred, whereas CSMA/CA deals with
more than a single bit of data is corrupted or preventing collision. CSMA/CD is
ul
has error, it is called burst error. If a single bit abbreviation for Carrier Sensing Multiple
error occurs, the bit can be simply repaired by Access/Collision detection. CSMA/CA is
inverting it, but in case of a burst error, the
pa abbreviation for Carrier Sensing Multiple
sender has to send the frame again. Access/Collision Avoidance. These protocols
are used for efficient multiple channel access.
7. CRC stands for __________
a) cyclic redundancy check 10. The technique of temporarily delaying
b) code repeat check outgoing acknowledgements so that they can
c) code redundancy check be hooked onto the next outgoing data frame
jin
d) cyclic repeat check is called ____________
a) piggybacking
Answer: a b) cyclic redundancy check
Explanation: Cyclic redundancy check is a c) fletcher’s checksum
code that is added to a data which helps us to d) parity check
.re
8. Which of the following is a data link outgoing data frame. It saves a lot of channel
protocol? bandwidth as in non-piggybacking system,
a) ethernet some bandwidth is reserved for
b) point to point protocol acknowledgement.
w
c) hdlc
d) all of the mentioned
TOPIC 2.2 ETHERNET (802.3)
w
Answer: d
Explanation: There are many data link layer 1. Ethernet frame consists of ____________
protocols. Some of them are SDLC a) MAC address
(synchronous data link protocol), HDLC b) IP address
(High level data link control), SLIP (serial
om
destination MAC address. Each MAC address
is of 48 bits. Answer: d
Explanation: A metropolitan area network
2. What is start frame delimeter (SFD) in (MAN) that is based on Ethernet standards is
ethernet frame? called an Ethernet MAN. It is commonly used
a) 10101010 to connect nodes to the Internet. Businesses
b) 10101011 also use Ethernet MANs to connect their own
.c
c) 00000000 offices to each other.
d) 11111111
6. A point-to-point protocol over ethernet is a
Answer: b network protocol for __________
ul
Explanation: The start frame delimiter is a 1 a) encapsulating PPP frames inside ethernet
byte field in the Ethernet frame that indicates frames
that the preceding bits are the start of the b) encapsulating ehternet framse inside PPP
frame. It is always set to 10101011.
local Ethernet (or wifi) network function. It is 7. High speed ethernet works on _________
of 48 bits. a) coaxial cable
b) twisted pair cable
4. What is autonegotiation? c) optical fiber
a) a procedure by which two connected d) unshielded twisted pair cable
w
om
payload field is 40 bytes and the maximum wireless devices to a wired network. A router
size is 1500 bytes. If the payload size exceeds is the best example of an Access Point.
1500 bytes, the frame is called a jumbo
frame. 2. In wireless ad-hoc network _________
a) access point is not required
9. What is interframe gap? b) access point is must
a) idle time between frames c) nodes are not required
.c
b) idle time between frame bits d) all nodes are access points
c) idle time between packets
d) idle time between networks Answer: a
Explanation: An ad-hoc wireless network is
ul
Answer: a a decentralized kind of a wireless network.
Explanation: The inter-frame gap is the idle An access point is usually a central device
time for the receiver between the incoming and it would go against the rules of the ad-
frame flow. The inter-frame gap must be as hoc network to use one. Hence it is not
pa
low as possible for idle connections. required.
10. An ethernet frame that is less than the 3. Which multiple access technique is used by
IEEE 802.3 minimum length of 64 octets is IEEE 802.11 standard for wireless LAN?
called _______ a) CDMA
jin
a) short frame b) CSMA/CA
b) runt frame c) ALOHA
c) mini frame d) CSMA/CD
d) man frame
Answer: b
.re
a) device that allows wireless devices to c) only one access point exists
connect to a wired network d) access points are not required
b) wireless devices itself
c) both device that allows wireless devices to Answer: a
connect to a wired network and wireless Explanation: A Wireless Distribution System
om
a) infrastructure mode Explanation: Collision detection is not
b) ad-hoc mode possible in wireless LAN with no extensions.
c) both infrastructure mode and ad-hoc mode Collision detection techniques for multiple
d) WDS mode access like CSMA/CD are used to detect
collisions in Wireless LANs.
Answer: c
Explanation: A wireless network interface 9. What is Wired Equivalent Privacy (WEP)?
.c
controller works on the physical layer and the a) security algorithm for ethernet
data link layer of the OSI model. b) security algorithm for wireless networks
Infrastructure mode WNIC needs access point c) security algorithm for usb communication
but in ad-hoc mode access point is not d) security algorithm for emails
ul
required.
Answer: b
6. In wireless network an extended service set Explanation: WEP is a security algorithm for
is a set of ________ wireless network which intended to provide
a) connected basic service sets
b) all stations
pa data confidentiality comparable to that of
traditional wired networks. It was introduced
c) all access points in 1997.
d) connected access points
10. What is WPA?
jin
Answer: a a) wi-fi protected access
Explanation: The extended service set is a b) wired protected access
part of the IEEE 802.11 WLAN architecture c) wired process access
and is used to expand the range of the basic d) wi-fi process access
service set by allowing connection of multiple
.re
Answer: b
w
om
depends on and virtual circuits are connection oriented.
a) Frame size
b) Channel capacity 7. Which uses UDP?
c) Frame size & Channel capacity a) Echo
d) None of the mentioned b) Time
c) Domain name server
Answer: c d) All of the mentioned
.c
Explanation: The time to transmit frame is
given by the ratio of frame size and channel Answer: d
capacity. Explanation: The protocols using UDP are
echo, time, domain name server, network file
ul
3. Window given the number of system etc.
a) Bytes
b) Frames 8. Which uses TCP?
c) Bytes & Frames a) Simple mail transfer protocol
d) None of the mentioned
pa b) Simple network management protocol
c) Simple mail transfer & network
Answer: c management protocol
Explanation: Window gives the number of d) None of the mentioned
frames or bytes that can be in transit
jin
unacknowledged. Answer: a
Explanation: Some of the protocols using
4. Routing is TCP are http, telnet, file transfer protocol,
a) Static simple mail transfer protocol etc.
b) Dynamic
.re
dynamic. d) Q series
om
c) time division multiplexing
1. An interconnected collection of piconet is d) channel division multiplexing
called ___________
a) scatternet Answer: a
b) micronet Explanation: Frequency hopping spread
c) mininet spectrum is a method of transmitting radio
d) multinet signals by rapidly changing the carrier
.c
frequency and is controlled by the codes
Answer: a known to the sender and receiver only.
Explanation: Piconet is the basic unit of a
bluetooth system having a master node and 5. Unauthorised access of information from a
ul
upto seven active slave nodes. A collection of wireless device through a bluetooth
piconets is called scatternet and a slave node connection is called _________
of a piconet may act as a master in a piconet a) bluemaking
b) bluesnarfing
that is part of the scatternet.
pa
2. In a piconet, there can be up to ________
c) bluestring
d) bluescoping
parked nodes in the network.
a) 63 Answer: b
b) 127 Explanation: Unauthorised access of
jin
c) 255 information from a wireless device through a
d) 511 bluetooth connection is called Bluesnarfing. It
is done through exploiting the vulnerabilities
Answer: c of the Bluetooth device to steal the
Explanation: A slave node in a piconet can transmitted information.
.re
om
one piconet may act as a master in a piconet
that is part of the scatternet. The scatternet
uses this property to connect many piconets TOPIC 2.6 WIFI
together to create a larger network.
1. What is the access point (AP) in a wireless
8. Bluetooth transceiver devices operate in LAN?
______ band. a) device that allows wireless devices to
.c
a) 2.4 GHz ISM connect to a wired network
b) 2.5 GHz ISM b) wireless devices itself
c) 2.6 GHz ISM c) both device that allows wireless devices to
d) 2.7 GHz ISM connect to a wired network and wireless
ul
devices itself
Answer: a d) all the nodes in the network
Explanation: Bluetooth operates on 2.45
GHz frequency ISM band for transmission. It
pa
is used to create a wireless personal area
network for data transfer up to a distance of
Answer: a
Explanation: Access point in a wireless
network is any device that will allow the
10 meters. wireless devices to a wired network. A router
is the best example of an Access Point.
9. Bluetooth supports _______
jin
a) point-to-point connections 2. In wireless ad-hoc network _________
b) point-to-multipoint connection a) access point is not required
c) both point-to-point connections and point- b) access point is must
to-multipoint connection c) nodes are not required
d) multipoint to point connection d) all nodes are access points
.re
Answer: c Answer: a
Explanation: In Bluetooth, each slave node Explanation: An ad-hoc wireless network is
communicates with the master of the piconet a decentralized kind of a wireless network.
independently i.e. each master-slave An access point is usually a central device
w
connection is independent. The slave is not and it would go against the rules of the ad-
allowed to communicate with other slaves hoc network to use one. Hence it is not
directly. required.
w
10. A scatternet can have maximum 3. Which multiple access technique is used by
__________ IEEE 802.11 standard for wireless LAN?
a) 10 piconets a) CDMA
w
b) 20 piconets b) CSMA/CA
c) 30 piconets c) ALOHA
d) 40 piconets d) CSMA/CD
om
using different algorithms to avoid collisions c) space division multiplexing
between channels. d) channel division multiplexing
.c
c) only one access point exists in digital television and audio broadcasting in
d) access points are not required addition to Wireless LANs.
ul
Explanation: A Wireless Distribution System possible in wireless LAN?
allows the connection of multiple access a) collision detection
points together. It is used to expand a wireless b) acknowledgement of data frames
c) multi-mode data transmission
network to a larger network.
pa
5. A wireless network interface controller can
d) connection to wired networks
controller works on the physical layer and the a) security algorithm for ethernet
data link layer of the OSI model. b) security algorithm for wireless networks
Infrastructure mode WNIC needs access point c) security algorithm for usb communication
but in ad-hoc mode access point is not d) security algorithm for emails
required.
w
Answer: b
6. In wireless network an extended service set Explanation: WEP is a security algorithm for
is a set of ________ wireless network which intended to provide
a) connected basic service sets data confidentiality comparable to that of
w
om
users can access their network. b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN
TOPIC 2.7 6LOWPAN–ZIGBEE
Answer: c
1. Which protocol is used to link all the Explanation: RFID/NFC – tags, devices,
devices in the IoT? smart phones useful in product / object
.c
a) TCP/IP identification and gathering associated
b) Network information.
c) UDP
d) HTTP 5. ________ supports low energy radio
ul
operation.
Answer: a a) IETF 6LoWPAN
Explanation: The internet of Thing is the b) IEFT CoAP
c) RFID/NFC
pa
global system of interconnected computer
networks that use the Internet Protocol suite
(TCP/IP) to link billions of devices
d) Bluetooth
worldwide. Answer: d
Explanation: Bluetooth SMART devices
2. ________ enables seamless integration of support low energy radio operations like,
jin
LoWPAN devices with internet leveraging. heart rate monitors, blood glucose monitors
a) IETF 6LoWPAN suitable for health care and fitness etc.
b) IEFT CoAP
c) RFID/NFC 6. ________ specification defining the PHY
d) IEEE 802.15.4.LoWPAN and MAC layer of low power devices.
.re
a) IETF 6LoWPAN
Answer: a b) IEFT CoAP
Explanation: IETF 6LoWPAN enables c) RFID/NFC
seamless integration of LoWPAN devices d) IEEE 802.15.4.LoWPAN
with internet leveraging IPv6 large address
w
a) IETF 6LoWPAN Kb/s data rate, small packet size 127 bytes.
b) IEFT CoAP
c) RFID/NFC 7. 6LoWPAN Adaption layer contains?
w
om
8. ________ is an application layer protocol b) CoAP
for resource constrained devices. c) MQTT
a) CoAP d) TCP/IP
b) HMTP
c) MQTT Answer: b
d) TCP/IP Explanation: CoAP is an application layer
protocol (IETF draft) for resource constrained
.c
Answer: a devices. It is Asynchronous message
Explanation: CoAP is an application layer interactions over UDP, Request/Response
protocol (IETF draft) for resource constrained semantics CoAP resources are identified by
devices. Adheres to the Restful approach for Uniform Resource Identifiers.
ul
managing the resources and support mapping
to HTTP. 12. CoAP messages are short.
a) True
9. Adheres to ________ approach for b) False
HTTP.
pa
managing resources and support mapping to
Answer: a
a) RETful Explanation: CoAP messages are short – 4
b) IoT bytes header followed by options (Typically,
c) Restful 10-20 bytes header).
jin
d) RESTful
13. How many messages types are there in
Answer: d CoAP?
Explanation: CoAP is an application layer a) 2
protocol (IETF draft) for resource constrained b) 5
.re
d) TCP/IP
14. Number of methods in CoAP?
Answer: a a) 2
w
Answer: c Answer: d
Explanation: Four CoAP methods: Explanation: In the OSI model, network
GET layer is the third layer and it provides data
POST routing paths for network communications.
PUT Error control is a function of the data link
DELETE. layer and the transport layer.
om
15. WSN stands for __________ 3. A 4 byte IP address consists of
a) Wired Sensor Network __________
b) Wireless Sensor Network a) only network address
c) Wired Service Network b) only host address
d) Wireless Service Network c) network address & host address
d) network address & MAC address
.c
Answer: b
Explanation: WSN – Wireless Sensor Answer: c
Network comprises of motes running a WSN Explanation: An ip address which is 32 bits
application and a light weight CoAP server. long, that means it is of 4 bytes and is
ul
composed of a network and host portion and
it depends on address class. The size of the
TOPIC 2.8 NETWORK LAYER host address and network address depends
SERVICES
pa
1. The network layer is concerned with
upon the class of the address in classful IP
addressing.
from the application layer is sent to the Explanation: A short VC number also called
transport layer and is converted to segments. as VCID (virtual circuit identifier) is a type of
These segments are then transferred to the identifier which is used to distinguish
network layer and these are called packets. between several virtual circuits in a
These packets are then sent to data link layer connection oriented circuit switched network.
w
where they are encapsulated into frames. Each virtual circuit is used to transfer data
These frames are then transferred to physical over a larger packet switched network.
layer where the frames are converted to bits.
5. Which of the following routing algorithms
w
2. Which one of the following is not a can be used for network layer design?
function of network layer? a) shortest path algorithm
a) routing b) distance vector routing
w
om
the operations of all the routers in the traffic aware routing, admission control and
networks. The routers are the main load shedding to deal with congestion.
participants in these algorithms.
9. The network layer protocol for internet is
6. Which of the following is not correct in __________
relation to multi-destination routing? a) ethernet
a) is same as broadcast routing b) internet protocol
.c
b) contains the list of all destinations c) hypertext transfer protocol
c) data is not sent by packets d) file transfer protocol
d) there are multiple receivers
Answer: b
ul
Answer: c Explanation: There are several protocols
Explanation: In multi-destination routing, used in Network layer. Some of them are IP,
there is more than one receiver and the route
pa ICMP, CLNP, ARP, IPX, HRSP etc.
for each destination which is contained in a Hypertext transfer protocol is for application
list of destinations is to be found by the layer and ethernet protocol is for data link
routing algorithm. Multi-destination routing layer.
is also used in broadcasting.
10. ICMP is primarily used for __________
7. A subset of a network that includes all the a) error and diagnostic functions
jin
routers but contains no loops is called b) addressing
________ c) forwarding
a) spanning tree d) routing
b) spider structure
c) spider tree Answer: a
.re
logical topology for ethernet networks. It is a over the IP packet to provide error reporting
layer 2 protocol that runs on bridges and functionality as IP by itself cannot report
switches. The main purpose of STP is to errors.
ensure that you do not create loops when you
w
om
case of packet switching, it is connectionless.
Circuit switching is implemented in the Answer: d
Physical layer, whereas packet switching is Explanation: Packet switching and Circuit
implemented in the Network layer. Internet switching are two different types of switching
too is based on the concept of circuit methods used to connect the multiple
switching. communicating devices with one another.
Packet switching is used in conventional
.c
2. Most packet switches use this principle LAN systems and circuit switching is used in
____________ telephonic systems.
a) Stop and wait
b) Store and forward 5. The required resources for communication
ul
c) Store and wait between end systems are reserved for the
d) Stop and forward duration of the session between end systems
in ________ method.
Answer: b
pa
Explanation: The packet switch will not
transmit the first bit to outbound link until it
a) Packet switching
b) Circuit switching
c) Line switching
receives the entire packet. If the entire packet d) Frequency switching
is not received and the time-out period
expires, the packet switch will inform the Answer: b
jin
sender to resend the part of packet or the Explanation: In circuit switching, a physical
entire packet based on the algorithm being path between the sender and receiver is
used. established. This path is maintained until the
connection is needed. Circuit switching is
3. If there are N routers from source to implemented in the Physical layer and is used
.re
b) (N*L)/R a) authentication
c) (2N*L)/R b) guaranteed constant rate
d) L/R c) reliability
d) store and forward
w
Answer: b
Explanation: The equation to find the end to Answer: b
end delay when no. of bits, transmission rate Explanation: Circuit switching is connection
w
and no. of routers is given by (N*L)/R. The oriented and is always implemented in the
total end to end delay, that is, nodal delay is physical layer. Once a path is set, all
the sum of all, the processing delay, queuing transmission occurs through the same path. It
delay, transmission delay and propagation is used since the early times in telephonic
delay. systems.
om
Answer: a Answer: c
Explanation: In packet switching, the bits are Explanation: TOS-type of service identifies
received in out of order and need to be the type of packets. It is not related to
assembled at the receiver end, whereas in the fragmentation but is used to request specific
case of Circuit switching, all the bits are treatment such as high throughput, high
received in order. All transmissions may not reliability or low latency for the IP packet
.c
occur through the same path in case of packet depending upon the type of service it belongs
switching. to.
8. Which of the following is not an 3. The TTL field has value 10. How many
ul
application layer service? routers (max) can process this datagram?
a) Network virtual terminal a) 11
b) File transfer, access, and management
pa b) 5
c) Mail service c) 10
d) Error control d) 1
Answer: d Answer: c
Explanation: Application layer is the Explanation: TTL stands for Time to Live.
topmost layer in the OSI model. Network This field specifies the life of the IP packet
jin
virtual terminal, mail service, file transfer, based on the number of hops it makes
access and management are all services of the (Number of routers it goes through). TTL
application layer. It uses protocols like HTTP, field is decremented by one each time the
FTP, and DNS etc. to provide these services. datagram is processed by a router. When the
value is 0, the packet is automatically
.re
destroyed.
TOPIC 2.10 IPV4 ADDRESS
4. If the value in protocol field is 17, the
1. Which of the following is not applicable transport layer protocol used is
for IP? _____________
w
Answer: a Answer: b
Explanation: The Internet Protocol is the Explanation: The protocol field enables the
w
networking protocol which establishes the demultiplexing feature so that the IP protocol
internet by relaying datagrams across network can be used to carry payloads of more than
boundaries. ICMP is a supporting protocol for one protocol type. Its most used values are 17
IP which handles the Error Reporting and 6 for UDP and TCP respectively. ICMP
functionality. and IGMP are network layer protocols.
om
and can also be exploited by attackers to
Answer: c create a DOS attack such as a teardrop attack.
Explanation: Data field usually has transport Fragmentation won’t be required if the
layer segments, but it can also carry ICMP transport layer protocols perform wise
messages. SMTP is an application layer segmentation.
protocol. First it must go through the
transport layer to be converted into TCP 9. Which field helps to check rearrangement
.c
segments and then it can be inserted into IP of the fragments?
packets. a) offset
b) flag
6. What should be the flag value to indicate c) ttl
ul
the last fragment? d) identifer
a) 0
b) 1 Answer: a
Explanation: The Fragment Offset field
c) TTl value
d) Protocol field value
pa specifies where the fragment fits in the
original datagram. The offset of the first
Answer: a fragment will always be 0. The size of the
Explanation: The Flag field in the IP header field (13 bits) is 3-bits shorter than the size of
is used to control and identify the fragments. the total length field (16 bits).
jin
It contains three bits: reserved, don’t
fragment and more fragments. If the more
fragments bit is 0, it means that the fragment
TOPIC 2.11 NETWORK LAYER
is the last fragment. PROTOCOLS ( IP, ICMP,
MOBILE IP)
.re
Answer: c
delivery service for the data. It’s dependent Explanation: In computer networks, the data
upon the transport layer protocols like TCP to from the application layer is sent to the
offer reliability. transport layer and is converted to segments.
w
These frames are then transferred to physical 5. Which of the following routing algorithms
layer where the frames are converted to bits. can be used for network layer design?
a) shortest path algorithm
2. Which one of the following is not a b) distance vector routing
function of network layer? c) link state routing
a) routing d) all of the mentioned
om
b) inter-networking
c) congestion control Answer: d
d) error control Explanation: The routing algorithm is what
decides where a packet should go next. There
Answer: d are several routing techniques like shortest
Explanation: In the OSI model, network path algorithm, static and dynamic routing,
layer is the third layer and it provides data decentralized routing, distance vector routing,
.c
routing paths for network communications. link state routing, Hierarchical routing etc.
Error control is a function of the data link The routing algorithms go hand in hand with
layer and the transport layer. the operations of all the routers in the
networks. The routers are the main
ul
3. A 4 byte IP address consists of participants in these algorithms.
__________
a) only network address 6. Which of the following is not correct in
b) only host address
c) network address & host address
d) network address & MAC address
pa relation to multi-destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
Answer: c d) there are multiple receivers
Explanation: An ip address which is 32 bits
jin
long, that means it is of 4 bytes and is Answer: c
composed of a network and host portion and Explanation: In multi-destination routing,
it depends on address class. The size of the there is more than one receiver and the route
host address and network address depends for each destination which is contained in a
upon the class of the address in classful IP list of destinations is to be found by the
.re
ensure that you do not create loops when you functionality as IP by itself cannot report
have redundant paths in your network. errors.
om
b) admission control
c) load shedding
d) routing information protocol
TOPIC 3.1 ROUTING
Answer: d
Explanation: The Routing Information 1. Which type of Ethernet framing is used for
Protocol (RIP) is used by the network layer TCP/IP and DEC net?
.c
for the function of dynamic routing. a) Ethernet 802.3
Congestion control focuses on the flow of the b) Ethernet 802.2
traffic in the network and uses algorithms like c) Ethernet II
traffic aware routing, admission control and
ul
d) Ethernet SNAP
load shedding to deal with congestion.
Answer: c
9. The network layer protocol for internet is Explanation: The Ethernet 802.3 framing is
__________
a) ethernet
b) internet protocol
pa used for NetWare versions 2 to 3.11, and the
Ethernet 802.2 framing is used for NetWare
versions 3.12 and later plus OSI routing,
c) hypertext transfer protocol Ethernet II is used with TCP/IP and DEC net,
d) file transfer protocol and Ethernet SNAP is used with TCP/IP and
AppleTalk. The type field in Ethernet 802.2
jin
Answer: b frame is replaced by a length field in Ethernet
Explanation: There are several protocols 802.3.
used in Network layer. Some of them are IP,
ICMP, CLNP, ARP, IPX, HRSP etc. 2. Consider a situation in which you are a
Hypertext transfer protocol is for application
.re
om
b) The node address is always protocols.
administratively assigned
c) The node address is usually the MAC 6. As a system administrator, you want to
address debug IGRP but are worried that the “debug
d) If the MAC address is used as the node IP IGRP transaction” command will flood the
address, then IPX eliminates the use of ARP console. What is the command that you
should use?
.c
Answer: b a) Debug IP IGRP event
Explanation: The network address can be up b) Debug IP IGRP-events
to 16 hexadecimal digits in length. The node c) Debug IP IGRP summary
number is 12 hexadecimal digits. The node d) Debug IP IGRP events
ul
address is usually the MAC address. An
example IPX address is 4a1d.0000.0c56.de33. Answer: d
The network part is 4a1d. The node part is
pa Explanation: The “debug IP IGRP events” is
0000.0c56.de33. The network number is used to display a short summary of IGRP
assigned by the system administrator of the routing information. You can append an IP
Novell network and the MAC address/node address onto either console’s command-line
address is not assigned by the administrator. to see only the IGRP updates from a
neighbor. The command will only give a short
4. Which NetWare protocol works on layer 3– summary and hence won’t flood the
jin
network layer—of the OSI model? command line.
a) IPX
b) NCP 7. What does the following series of
c) SPX commands “Router IGRP 71 network”
accomplish?
.re
d) NetBIOS
10.0.0.0 router IGRP 109 network 172.68.7.0
Answer: a a) It isolates networks 10.0.0.0 and 172.68.7.0
Explanation: IPX (Internetwork Packet b) It loads IGRP for networks 109 and 71
Exchange) is the NetWare network layer 3 c) It disables RIP
protocol used for transferring information on d) It disables all routing protocols
w
d) NCP
8. The “IPX delay number” command will
Answer: a allow an administrator to change the default
Explanation: NetWare Link Services settings. What are the default settings?
Protocol (NLSP) provides link-state routing. a) For LAN interfaces, one tick; for WAN
interfaces, six ticks c) It is the default for Cisco IPX load sharing
b) For LAN interfaces, six ticks; for WAN d) It enables load sharing on 2 paths if the
interfaces, one tick paths are unequal metric paths
c) For LAN interfaces, zero ticks; for WAN
interfaces, five ticks Answer: a
d) For LAN interfaces, five ticks; for WAN Explanation: It enables load sharing on 2
om
interfaces, zero Ticks paths if the paths are equal metric paths. The
default is 1 path and the maximum is 512
Answer: a paths. The value must always be greater than
Explanation: Tick is basically the update rate 1 and must be a natural number.
of clients in the network. The IPX delay
number will give the ticks at a certain time. 11. You want to enable both arpa and snap
The default ticks are–for LAN interfaces, one encapsulation on one router interface. How
.c
tick, and for WAN interfaces, six ticks. do you do this?
a) The interface can handle multiple
9. As a system administrator, you need to set encapsulation types with no extra
up one Ethernet interface on the Cisco router configuration
ul
to allow for both sap and Novell-ether b) Assign two network numbers, one for each
encapsulations. Which set of commands will encapsulation type
accomplish this? pa c) Enable Novell-ether to run multiple
a) Interface Ethernet 0.1 IPX encapsulation encapsulation types
Novell-ether IPX network 9e interface d) Both arpa and snap are enabled by default
Ethernet 0.2 IPX network 6c so you don’t have to configure anything
b) Interface Ethernet 0 IPX encapsulation
Novell-ether IPX network 9e interface Answer: b
Ethernet 0 IPX encapsulation sap IPX Explanation: To assign multiple network
jin
network 6c numbers, you usually use sub interfaces. A
c) Interface Ethernet 0.1 IPX encapsulation sample configuration follows: IPXEthernet
Novell-ether interface Ethernet 0.2 IPX 0.1 IPX encapsulation novell-ether ipx
encapsulation sap network 9e interface ethernet 0.2 ipx
encapsulation sap ipx network 6c
.re
interface Ethernet0.2 IPX encapsulation sap local network,that server will respond. If
IPX network 6c. there isn’t, the Cisco router has to be
configured to forward theGNS SAP.
w
om
nodes in the path from source to destination,
Answer: a that are not the intended destination for the
Explanation: Cisco routers build SAP tables packet in order to pass the packet to the next
and forward the table every 60 seconds. All node in the path. The destination machine
SAPs can’t befiltered even with 4.x since does not forward the packet to any other
NDS and time synchronization uses SAPs. node.
.c
14. Novell’s implementation of RIP updates 2. A second technique to reduce routing table
routing tables every _________ seconds. and simplify searching process is called
a) 60 _________
b) 90 a) Network-Specific Method
ul
c) 10 b) Network-Specific Motion
d) 30 c) Network-Specific Maintaining
d) Network-Specific Membership
Answer: a
pa
Explanation: Novell’s RIP updates routing
tables every 60 seconds, Apple’s RTMP is
Answer: a
Explanation: In the network specific
every 10 seconds, routers ARP every 60 forwarding method, there is only one record,
seconds, IGRP signal every 90 seconds, and the destination of the packet, in the routing
Banyan VINES signals every 90 seconds. table and not the other hosts of the network.
jin
The other two forwarding methods are the
15. In Novell’s use of RIP, there are two default method and the next-hop method.
metrics used to make routing decisions.
Select the correct metrics. 3. Next-Hop Method is used to reduce
a) Ticks & Hops contents of a _________
.re
c) Tunneling c) Network
d) Security d) Link
Answer: d Answer: a
Explanation: The size of the routing table in Explanation: The Djikstra’s shortest path
the technique must be manageable for the algorithm is the fastest among the algorithms
om
network nodes i.e. it must not be too big. for finding the shortest path in a graph. But it
Security of the forwarding packet is the is a greedy method based algorithm so it does
highest priority for a technique and must be not guarantee the shortest path every time.
high enough so that only authorized senders
and receivers can access the packet’s content. 8. In Multicast Routing Protocol, flooding is
used to broadcast packets but it creates
5. Host-specific routing is used for purposes ________
.c
such as checking route or providing _____ a) Gaps
a) Network Measures b) Loops
b) Security Measures c) Holes
c) Routing Measures d) Links
ul
d) Delivery Measures
Answer: b
Answer: b Explanation: In multicast routing, there is
Explanation: In host-specific routing, the one sender and many receivers. So flooding is
pa
route of the packet is defined based on the
exact match of the packet’s IP with the
the most basic method to forward packets to
many receivers. The one issue with flooding
routing table entry of the host. It provides the is that it creates routing loops. One loop
best security for the packet as the packet is prevention method is that the routers will not
forwarded only to routers in the pre-defined send the packet to a node where the packet
jin
path. has been received before.
Explanation: In Unicast routing, there is only loop-free forwarding method for multi-cast
sender and one receiver. So, if there is routing in modern systems. The method
instability between three nodes, in which one focuses on forwarding the packet away from
is sender, one is receiver and one is the router the source IP in each iteration to make sure
w
om
destination.
5. Routing is performed only centrally.
a) True
TOPIC 3.3 PROTOCOLS b) False
.c
b) Procedures and also in fully distributed way.
c) Formats & Procedures
d) None of the mentioned 6. Which is connection oriented and which is
connection-less?
ul
Answer: c a) Datagrams, virtual circuits
Explanation: Protocol is a set of procedures b) Virtual circuits, datagrams
and formats that entities use to communicate c) Datagrams
d) None of the mentioned
information.
pa
2. The time required to transmit frame Answer: b
depends on Explanation: Datagram is connection-less
a) Frame size and virtual circuits are connection oriented.
b) Channel capacity
jin
c) Frame size & Channel capacity 7. Which uses UDP?
d) None of the mentioned a) Echo
b) Time
Answer: c c) Domain name server
Explanation: The time to transmit frame is d) All of the mentioned
.re
b) Frames
c) Bytes & Frames 8. Which uses TCP?
d) None of the mentioned a) Simple mail transfer protocol
b) Simple network management protocol
w
unacknowledged.
Answer: a
4. Routing is Explanation: Some of the protocols using
a) Static TCP are http, telnet, file transfer protocol,
b) Dynamic simple mail transfer protocol etc.
om
default method and the next-hop method.
Answer: c
Explanation: G series tells about level 3. Next-Hop Method is used to reduce
transmission, modulation and framing. contents of a _________
a) Revolving table
10. Which tells about signalling? b) Rotating Table
a) V series c) Routing Table
.c
b) X series d) Re-allocate table
c) G series
d) Q series Answer: c
Explanation: In the next-hop forwarding
ul
Answer: d method, the routing table of each router in the
Explanation: Q series tells about signalling. path contains the address of only the next hop
pa in the path of packet. This method is suitable
TOPIC 3.4 MULTICAST for short distances only.
ROUTING AND ITS BASICS 4. Several techniques can make size of
routing table manageable and also handle
1. The term that is used to place packet in its issues such as __________
route to its destination is called __________ a) Maturity
jin
a) Delayed b) Error reporting
b) Urgent c) Tunneling
c) Forwarding d) Security
d) Delivering
Answer: d
.re
node in the path. The destination machine high enough so that only authorized senders
does not forward the packet to any other and receivers can access the packet’s content.
node.
5. Host-specific routing is used for purposes
w
2. A second technique to reduce routing table such as checking route or providing _____
and simplify searching process is called a) Network Measures
_________ b) Security Measures
w
route of the packet is defined based on the the most basic method to forward packets to
exact match of the packet’s IP with the many receivers. The one issue with flooding
routing table entry of the host. It provides the is that it creates routing loops. One loop
best security for the packet as the packet is prevention method is that the routers will not
forwarded only to routers in the pre-defined send the packet to a node where the packet
path. has been received before.
om
6. In Unicast routing, if instability is between 9. RPF stands for __________
three nodes, stability cannot be ________ a) Reverse Path Forwarding
a) Stable b) Reverse Path Failure
b) Reversed c) Reverse Packet Forwarding
c) Guaranteed d) Reverse Protocol Failure
d) Forward
.c
Answer: a
Answer: c Explanation: Reverse Path Forwarding is a
Explanation: In Unicast routing, there is only loop-free forwarding method for multi-cast
sender and one receiver. So, if there is routing in modern systems. The method
ul
instability between three nodes, in which one focuses on forwarding the packet away from
is sender, one is receiver and one is the router the source IP in each iteration to make sure
in the path, there is no other path available for
pa there is no loops.
the packet and the stability of the network is
not guaranteed. 10. LSP stands for __________
a) Link Stable Packet
7. In Unicast Routing, Dijkstra algorithm b) Link State Packet
creates a shortest path tree from a ________ c) Link State Protocol
a) Graph d) Link State Path
jin
b) Tree
c) Network Answer: b
d) Link Explanation: A Link State Packet is a packet
created by a router that lists its neighboring
Answer: a nodes and routers in link state routing
.re
Explanation: The Djikstra’s shortest path protocol. It is shared with other routers to find
algorithm is the fastest among the algorithms the shortest path from a source to the
for finding the shortest path in a graph. But it destination.
is a greedy method based algorithm so it does
not guarantee the shortest path every time.
TOPIC 3.5 OVERVIEW OF
w
om
state information to other routers in the makes sure that the communication between
network. neighbors is bidirectional. It’s similar to the
real world moral construct of saying “Hello”
2. The computation of the shortest path in to initialize the communication.
OSPF is usually done by ____________
a) Bellman-ford algorithm 5. Which of the following is not a type of
b) Routing information protocol OSPF packet?
.c
c) Dijkstra’s algorithm a) Hello
d) Distance vector routing b) Link-state request
c) Link-state response
Answer: c d) Link-state ACK
ul
Explanation: Shortest path in OSPF is
usually computed by Dijkstra’s algorithm. It Answer: c
was proposed by Edsger W. Dijkstra in the Explanation: The five types of OSPF packets
are: Hello, Database description, Link-state
pa
year 1956. It is a greedy method algorithm
and hence may not guarantee the shortest path
every time, but is really fast.
request, Link-state update, and Link-state
ACK. There is no Link-state response packet;
the neighbor router sends a Link-state update
3. Which of the following is false with packet as a response to the Link-state request
respect to the features of OSPF? packet if there is an update in the routing
jin
a) Support for fixed-length subnetting by table.
including the subnet mask in the routing
message 6. What is the correct order of the operations
b) More flexible link cost than can range from of OSPF?
1 to 65535 i – Hello packets
.re
a) Type b) MS
b) Area ID c) Database descriptor sequence number
c) Authentication type d) Options
d) Checksum
Answer: c
Answer: d Explanation: Sequence number field is used
om
Explanation: Checksum field is used to to detect a missing packet. The packets are to
detect errors. It makes sure that the data be received in order of the sequence number,
portions that are being sent are all in integrity. so if the receiver detects that there is a
It can detect duplicated bits. Once an error is sequence number skipped or missing in the
detected, the sender has to re-transmit the order, it stops processing the further received
data as it won’t receive an acknowledgement. packets and informs the sender to retransmit
the packets in sequence.
.c
8. In OSPF database descriptor packet, if
there are more database descriptor packets in
the flow, ‘M’ field is set to ____________ TOPIC 3.6 OVERVIEW OF IPV6
a) 1 ADDRESSING – TRANSITION
ul
b) 0 FROM IPV4 TO IPV6
c) more
d) -1 pa 1. The size of an IP address in IPv6 is
_________
Answer: a
a) 4 bytes
Explanation: The “M” bit is the more bit,
b) 128 bits
which indicates that there are more packets to
c) 8 bytes
be received in the descriptor packet flow
d) 100 bits
whenever it is set to 1. There is also an “I” bit
jin
which indicates if the packet is first in the Answer: b
flow. Explanation: An IPv6 address is 128 bits
long. Therefore, 2128 i.e. 340 undecillion
9. In OSPF database descriptor packet, which
addresses are possible in IPv6. IPv4 has only
field is used to indicate that the router is
.re
a) 10bytes
Answer: b
b) 25bytes
Explanation: The MS bit is used to indicate
c) 30bytes
if the origin of the packet is a master or a
w
d) 40bytes
slave. If it is set to 1, the source of the packet
is a master, and if it is set to 0, the source of Answer: d
the packet is a slave. Explanation: IPv6 datagram has fixed header
w
om
b) Fast-switching Explanation: The Hop limit value is
c) ToS field decremented by one by a router when the
d) Option field datagram is forwarded by the router. When
the value becomes zero the datagram is
Answer: c discarded. The field is 8-bits wide, so an IPv6
Explanation: The traffic class field is used to packet can live up to 255 router hops only.
specify the priority of the IP packet which is a
.c
similar functionality to the Type of Service 7. Dual-stack approach refers to _________
field in the IPv4 header. It’s an 8-bit field and a) implementing Ipv4 with 2 stacks
its values are not defined in the RFC 2460. b) implementing Ipv6 with 2 stacks
c) node has both IPv4 and IPv6 support
ul
4. IPv6 does not use _________ type of d) implementing a MAC address with 2
address. stacks
a) broadcast
b) multicast Answer: c
c) anycast
d) unicast
pa Explanation: Dual-stack is one of the
approaches used to support IPv6 in already
existing systems. ISPs are using it as a
Answer: a method to transfer from IPv4 to IPv6
Explanation: There is no concept of completely eventually due to the lower
jin
broadcast address in IPv6. Instead, there is an number of possible available addresses in
anycast address in IPv6 which allows sending IPv4.
messages to a group of devices but not all
devices in a network. Anycast address is not 8. Suppose two IPv6 nodes want to
standardized in IPv4. interoperate using IPv6 datagrams, but they
.re
c) Options c) No solution
d) Anycast address d) Replace the system
Answer: d Answer: b
w
Explanation: There is an anycast address in Explanation: The IPv4 routers can form a
IPv6 which allows sending messages to a tunnel in which at the sender’s side, the IPv6
group of devices but not all devices in a datagram is encapsulated in to IPv4, and at
w
network. Anycast address is not standardized the receiver’s side of the tunnel, the IPv4
in IPv4. packet is stripped and the IPv6 packet is sent
to the receiver.
6. The _________ field determines the
lifetime of IPv6 datagram
om
d) 64 to 79 an abbreviation for Transmission Control
Protocol and UDP is an abbreviation for User
Answer: a Datagram Protocol. TCP is connection
Explanation: Teredo is a technique through oriented whereas UDP is connectionless.
which gives the possibility for full IPv6
network connectivity to IPv6 capable hosts 3. User datagram protocol is called
which are currently on an IPv4 network. Bits connectionless because _____________
.c
96 to 127 in the datagram represents a) all UDP packets are treated independently
obfuscated 1Pv4 address of the IPv4 network. by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent
ul
order
d) it sends data very quickly
UNIT IV TRANSPORT
Answer: a
LAYER
pa Explanation: UDP is an alternative for TCP
and it is used for those purposes where speed
TOPIC 4.1 INTRODUCTION TO matters most whereas loss of data is not a
problem. UDP is connectionless whereas TCP
TRANSPORT LAYER is connection oriented.
jin
1. Transport layer aggregates data from 4. Transmission control protocol
different applications into a single stream ___________
before passing it to ____________ a) is a connection-oriented protocol
a) network layer b) uses a three way handshake to establish a
.re
every layer has its own set of functions and Major internet applications like www, email,
protocols to ensure efficient network file transfer etc rely on TCP. TCP is
performance. connection oriented and it is optimized for
w
a) socket c) node
b) pipe d) protocol
c) port
d) machine Answer: a
Explanation: Just as the IP address identifies
Answer: a the computer, the network port identifies the
om
Explanation: Socket is one end point in a two application or service running on the
way communication link in the network. TCP computer. A port number is 16 bits. The
layer can identify the application that data is combination of IP address preceded with the
destined to be sent by using the port number port number is called the socket address.
that is bound to socket.
9. Transport layer protocols deals with
6. Socket-style API for windows is called ____________
.c
____________ a) application to application communication
a) wsock b) process to process communication
b) winsock c) node to node communication
c) wins d) man to man communication
ul
d) sockwi
Answer: b
Answer: b Explanation: Transport layer is 4th layer in
Explanation: Winsock is a programming TCP/IP model and OSI reference model. It
pa
interface which deals with input output
requests for internet applications in windows
deals with logical communication between
process. It is responsible for delivering a
OS. It defines how windows network message between network host.
software should access network services.
10. Which of the following is a transport
jin
7. Which one of the following is a version of layer protocol?
UDP with congestion control? a) stream control transmission protocol
a) datagram congestion control protocol b) internet control message protocol
b) stream control transmission protocol c) neighbor discovery protocol
c) structured stream transport d) dynamic host configuration protocol
.re
deals with reliable connection setup, where streams of data are to be continuously
teardown, congestion control, explicit transmitted between two connected network
congestion notification, and feature nodes. Some of the other transport layer
negotiation. It is used in modern day systems protocols are RDP, RUDP, TCP, DCCP, UDP
w
a) Connection-oriented Answer: c
b) Unreliable Explanation: As UDP does not provide
c) Transport layer protocol assurance of delivery of packet, reliability
d) Low overhead and other services, the overhead taken to
provide these services is reduced in UDP’s
Answer: a operation. Thus, UDP provides low overhead,
om
Explanation: UDP is an unreliable, and higher speed.
connectionless transport layer protocol that
provides message-based data transmission. 5. Port number used by Network Time
TCP is an example of connection-oriented Protocol (NTP) with UDP is ________
protocols. a) 161
b) 123
2. Return value of the UDP port “Chargen” is c) 162
.c
_______ d) 124
a) String of characters
b) String of integers Answer: b
c) Array of characters with integers Explanation: The Network Time Protocol is
ul
d) Array of zero’s and one’s a clock synchronization network protocol
implemented by using UDP port number 123
Answer: a to send and receive time stamps.
Explanation: Using Chargen with UDP on
pa
port 19, the server sends a UDP datagram
containing a random number of characters
6. What is the header size of a UDP packet?
a) 8 bytes
every time it receives a datagram from the b) 8 bits
connecting host. The number of characters is c) 16 bytes
between 0 and 512. d) 124 bytes
jin
3. Beyond IP, UDP provides additional Answer: a
services such as _______ Explanation: The fixed size of the UDP
a) Routing and switching packet header is 8 bytes. It contains four two-
b) Sending and receiving of packets byte fields: Source port address, Destination
.re
8. “Total length” field in UDP packet header datagram as UDP doesn’t have to ensure the
is the length of _________ delivery of the packet.
a) Only UDP header
b) Only data
c) Only checksum
TOPIC 4.3 TRANSMISSION
d) UDP header plus data CONTROL PROTOCOLS (TCP),
om
SERVICES, FEATURES, TCP
Answer: d CONNECTION, STATE
Explanation: Total length is the 16 bit field
which contains the length of UDP header and
TRANSITION DIAGRAM
the data. The maximum value of the Total
length field and the maximum size of a UDP 1. Which of the following is false with
datagram is 65,535 bytes (8 byte header + respect to TCP?
.c
65,527 bytes of data). a) Connection-oriented
b) Process-to-process
9. Which is the correct expression for the c) Transport layer protocol
length of UDP datagram? d) Unreliable
ul
a) UDP length = IP length – IP header’s
length Answer: d
b) UDP length = UDP length – UDP header’s Explanation: TCP is a transport layer
protocol that provides reliable and ordered
length
pa
c) UDP length = IP length + IP header’s
length
delivery of a stream of bytes between hosts
communicating via an IP network.
d) UDP length = UDP length + UDP header’s
length 2. In TCP, sending and receiving data is done
as _______
jin
Answer: a a) Stream of bytes
Explanation: A user datagram is b) Sequence of characters
encapsulated in an IP datagram. There is a c) Lines of data
field in the IP header that defines the total d) Packets
length of the IP packet. There is another field
.re
10. The ______ field is used to detect errors number of send () commands into one stream
over the entire user datagram. of data and still transmit it reliably.
a) udp header
b) checksum 3. TCP process may not write and read data at
w
Answer: b b) Buffers
Explanation: Checksum field is used to c) Segments
detect errors over the entire user datagram. d) Stacks
Though it is not as efficient as CRC which is
used in TCP, it gets the job done for the UDP
om
a) Byte number
4. TCP groups a number of bytes together b) Buffer number
into a packet called _______ c) Segment number
a) Packet d) Acknowledgment
b) Buffer
c) Segment Answer: a
d) Stack Explanation: As TCP has to ensure ordered
.c
delivery of packets, sequence number and
Answer: c acknowledgement number are used to
Explanation: A segment may be collection of identify the byte number of the packet in the
data from many send () statements. TCP stream of bytes being transmitted.
ul
transmits each segment as a stream of bytes.
8. Suppose a TCP connection is transferring a
5. Communication offered by TCP is file of 1000 bytes. The first byte is numbered
________ 10001. What is the sequence number of the
a) Full-duplex
b) Half-duplex
pa segment if all data is sent in only one
segment?
c) Semi-duplex a) 10000
d) Byte by byte b) 10001
c) 12001
jin
Answer: a d) 11001
Explanation: Data can flow both the
directions at the same time during a TCP Answer: b
communication hence, it is full-duplex. This Explanation: The sequence number given to
is the reason why TCP is used in systems that first byte of a segment, with respect to its
.re
require full-duplex operation such as e-mail order among the previous segments, is the
systems. sequence number of that segment.
Answer: d Answer: d
w
random 32 bit sequence of 0’s and 1’s, during c) Prevent before congestion occurs
the connection handshake. d) Prevent before sending packets
om
previously before it even happens by enforcing certain
b) total number of bytes to receive policies. Retransmission policy, window
c) sequence number of the next byte to be policy and acknowledgement policy are some
received policies that might be enforced.
d) sequence of zeros and ones
3. Retransmission of packets must not be
Answer: c done when _______
.c
Explanation: The acknowledgement field in a) Packet is lost
a segment defines the sequence number of the b) Packet is corrupted
byte which is to be received next i.e. c) Packet is needed
sequence number of byte that the sender d) Packet is error-free
ul
should transmit next.
Answer: d
Explanation: Retransmission refers to the
TOPIC 4.4 ERROR AND pa sender having to resend the packet to the
CONGESTION CONTROL - receiver. It needs to be done only when some
CONGESTION AVOIDANCE anomaly occurs with the packet like when the
(DECBIT, RED) – QOS – packet is lost or corrupted.
APPLICATION 4. In Go-Back-N window, when the timer of
jin
REQUIREMENTS the packet times out, several packets have to
be resent even some may have arrived safe.
1. Two broad categories of congestion control Whereas in Selective Repeat window, the
are sender resends ___________
a) Open-loop and Closed-loop a) Packet which are not lost
.re
techniques are used to treat congestion after it on the negative acknowledgements received
has happened. and then resends only those packets thus
saving bandwidth.
w
c) Router Answer: d
d) Switch Explanation: In Virtual circuit networks,
each node knows the upstream node from
Answer: c which a flow data is coming. So, it makes
Explanation: The discarding policy adopted possible for the congested node to track the
by the routers mainly states that the routers source of the congestion and then inform that
om
discard sensitive or corrupted packets that it node to reduce the flow to remove
receives, thus controlling the integrity of the congestion.
packet flow. The discarding policy is adopted
as an open loop congestion control technique. 9. The packet sent by a node to the source to
inform it of congestion is called _______
6. Closed-Loop control mechanisms try to a) Explicit
_________ b) Discard
.c
a) Remove after congestion occurs c) Choke
b) Remove after sometime d) Backpressure
c) Prevent before congestion occurs
d) Prevent before sending packets Answer: c
ul
Explanation: Choke packet is sent by a node
Answer: a to the source to inform it of congestion. Two
Explanation: In closed loop congestion choke packet techniques can be used for the
control, methods are implemented to remove
pa
congestion after it occurs. Some of the
methods used are backpressure and choke
operation called hop-by-hop choke packet
and source choke packet.
propagates in the opposite direction of the increasing and continues sending packets
data flow to inform the predecessor node to through the threshold window thus preventing
reduce the flow of packets. This is why this congestion.
technique is called a node-to-node congestion
w
Answer: b b) Client-server
Explanation: In the congestion avoidance c) HTTP
algorithm, the size of the congestion window d) Both Peer-to-Peer & Client-Server
increases additively until congestion is
detected. Once congestion is detected, the Answer: d
size of congestion window is decreased once Explanation: HTTP is a protocol.
om
and then the packets are transmitted to
achieve congestion avoidance. 4. Application developer has permission to
decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and
UNIT V APPLICATION Maximum buffer size
.c
d) None of the mentioned
LAYER
Answer: c
Explanation: Application layer provides the
ul
TOPIC 5.1 APPLICATION
interface between applications and the
LAYER PARADIGMS network. So application developer can decide
what transport layer to use and what should
be its maximum buffer size.
a) HTTP
b) SMTP
pa
1. Which is not a application layer protocol?
om
application layer and there are message and d) All of the mentioned
data oriented.
Answer: d
8. Which of the following is an application Explanation: The transport services that are
layer service? provided to application are reliable data
a) Network virtual terminal transfer, security and timing. These are very
b) File transfer, access, and management important for proper end to end services.
.c
c) Mail service
d) All of the mentioned 12. Electronic mail uses which Application
layer protocol?
Answer: d a) SMTP
ul
Explanation: The services provided by the b) HTTP
application layer are network virtual terminal, c) FTP
file transfer, access and management, mail d) SIP
services, directory services, various file and
data operations.
pa Answer: a
Explanation: Email uses various protocols
9. To deliver a message to the correct like SMTP, IMAP and POP. The most
application program running on a host, the prominent one used in application layer is
_______ address must be consulted. SMTP.
jin
a) IP
b) MAC
c) Port TOPIC 5.2 CLIENT SERVER
d) None of the mentioned PROGRAMMING
.re
om
virtual environment. a) stub layer
b) skeleton layer
3. A typical _________ program creates some c) remote layer
remote objects, makes references to these d) transport protocol
objects accessible, and waits for clients to
invoke methods on these objects. Answer: d
a) Server Explanation: The transport protocol layer is
.c
b) Client the binary data protocol that sends remote
c) Thread object requests over the wire. A client is any
d) Concurrent remote application that communicates with
these server objects.
ul
Answer: a
Explanation: A server program creates 7. A middleware layer between the stub
remote objects. It gives reference to these skeleton and transport.
a) remote layer
methods on these objects.
pa
objects and then waits for clients to invoke
b) instruction layer
c) reference layer
4. A typical __________ program obtains a d) remote reference layer
remote reference to one or more remote
objects on a server and then invokes methods Answer: d
jin
on them. Explanation: The remote reference layer is
a) Server the middleware between the stub/skeleton
b) Client layer and underlying transport protocol.
c) Thread
d) Concurrent 8. An object acting as a gateway for the client
.re
side.
Answer: b a) skeleton
Explanation: A client program obtains a b) stub
remote reference to one or more remote c) remote
objects on a server. It then invokes methods d) server
w
on them.
Answer: b
5. The ___________ layer, which provides Explanation: The stub is an object that acts
the interface that client and server application as a gateway for the client side. The outgoing
w
objects use to interact with each other. requests are passed through the stub.
a) Increasing
b) Count 9. A gateway for the server side object.
w
c) Bit a) skeleton
d) Stub/skeleton b) stub
c) remote
Answer: d d) server
Explanation: The stub or skeleton layer
Answer: a Answer: b
Explanation: The skeleton is an object, acts Explanation: A dynamic web page provides
as a gateway for the server side object. All the different content every time the user opens it
incoming requests are routed through it. based on some events like new additions or
time of the day. Languages such as JavaScript
10. RMI uses stub and skeleton for are used to respond to client-side events while
om
communication with the ________ object. languages such as PHP as used to respond to
a) client server-side events.
b) remote
c) server 3. What is a web browser?
d) any a) a program that can display a web page
b) a program used to view html documents
Answer: b c) it enables user to access the resources of
.c
Explanation: RMI uses stub and skeleton internet
object for communication with the remote d) all of the mentioned
object. A remote object is an object whose
method can be invoked from another JVM. Answer: d
ul
Explanation: A web browser is an
application program that is used to access the
TOPIC 5.3 WORLD WIDE WEB World Wide Web resources, applications and
AND HTTP
pa
1. A piece of icon or image on a web page
websites. Some examples of web browsers
are Google Chrome, Internet Explorer and
Safari.
associated with another webpage is called
______ 4. Common gateway interface is used to
a) url _______
jin
b) hyperlink a) generate executable files from web content
c) plugin by web server
d) extension b) generate web pages
c) stream videos
Answer: b d) download media files
.re
webpage. Hyperlink is piece of icon or image generates dynamic web pages. A CGI script
on a web page associated with another executes only when a request is made. The
webpage. script then generates HTML.
w
is a locator for the resource to be located by lightweight and active scripting language
HTTP on the World Wide Web. The URL is which can be used on Microsoft Visual Basic.
derived from the Uniform Resource Identifier. It was first released in 1996.
6. A web cookie is a small piece of data that 9. What is document object model (DOM)?
is _______ a) convention for representing and interacting
om
a) sent from a website and stored in user’s with objects in html documents
web browser while a user is browsing a b) application programming interface
website c) hierarchy of objects in ASP.NET
b) sent from user and stored in the server d) scripting language
while a user is browsing a website
c) sent from root server to all servers Answer: a
d) sent from the root server to other root Explanation: DOM is a hierarchical model
.c
servers i.e. a tree used to represent an HTML or
XML document. Every node of the tree an
Answer: a object that represents a part of the document.
Explanation: A web cookie is a small piece
ul
of data sent from a website and stored in 10. AJAX stands for _______
user’s web browser while a user is browsing a) asynchronous javascript and xml
the website and is used to remember stateful b) advanced JSP and xml
c) asynchronous JSP and xml
pa
information about the user’s operations on the
website. This can help the website provide a
better browsing experience to the user.
d) advanced javascript and xml
Answer: a
7. Which one of the following is not used to Explanation: AJAX is a group of
generate dynamic web pages? technologies that works on the client-side to
jin
a) PHP create asynchronous web applications. It is
b) ASP.NET used to modify only a part of a webpage and
c) JSP not the whole webpage whenever some event
d) CSS occurs.
.re
Answer: d
Explanation: CSS alone cannot be used to
TOPIC 5.4 DNS
generate dynamic web pages as it does not
provide many event handling functions. It can 1. The entire hostname has a maximum of
be used along with JavaScript to generate ___________
w
platform is _______
a) VBScript Answer: a
b) ASP.NET Explanation: An entire hostname can have a
w
om
Answer: b a) dynamic DNS
Explanation: DNS client also known as DNS b) mail transfer agent
resolver also known as DNS lookup helps to c) authoritative name server
resolve DNS requests using an external DNS d) none of the mentioned
server.
Answer: a
3. Servers handle requests for other domains Explanation: Dynamic DNS or in short
.c
_______ DDNS or DynDNS helps in automatically
a) directly updating a name server in the DNS. This does
b) by contacting remote DNS server not require manual editing.
c) it is not possible
ul
d) none of the mentioned 7. Wildcard domain names start with label
_______
Answer: b a) @
Explanation: Whenever a request is received b) *
pa
at server from other domains, it handles this
situation by contacting remote DNS server.
c) &
d) #
Explanation: Domain Name system not only 8. The right to use a domain name is
deals with mapping IP addresses with the delegated by domain name registers which
hostname but also deals with exchange of are accredited by _______
information in the server. a) internet architecture board
b) internet society
w
5. If a server has no clue about where to find c) internet research task force
the address for a hostname then _______ d) internet corporation for assigned names
a) server asks to the root server and numbers
b) server asks to its adjcent server
w
9. The domain name system is maintained by 2. SMTP connections secured by SSL are
_______ known as _____________
a) distributed database system a) SMTPS
b) a single server b) SSMTP
c) a single computer c) SNMP
d) none of the mentioned d) STARTTLS
om
Answer: a Answer: a
Explanation: A domain name system is Explanation: SSMTP is a simple mail
maintained by a distributed database system. transfer program to send mail from a local PC
It is a collection of multiple, logically to a mail host. SNMP is a network
interrelated databases distributed over a management protocol. STARTTLS
computer network. connections are secured by TLS.
.c
10. Which one of the following is not true? 3. SMTP uses which of the following TCP
a) multiple hostnames may correspond to a port?
single IP address a) 22
ul
b) a single hostname may correspond to many b) 23
IP addresses c) 21
c) a single hostname may correspond to a
pa d) 25
single IP address
d) none of the mentioned Answer: d
Explanation: Port 21 is used for FTP control
Answer: c connection, port 22 is used by SSH, and port
Explanation: It need not be that a single 23 is used by TELNET.
hostname will correspond to a ip address. For
jin
example facebook.com and fb.com both 4. Which one of the following protocol is
correspond to same ip address. So there can used to receive mail messages?
be multiple hostnames for a single ip address. a) SMTP
b) Post Office Protocol (POP)
c) Internet Message Access Protocol (IMAP)
.re
protocol for electronic mail transfer. to send and receive mails on the internet.
a) TCP
b) UDP 5. What is on-demand mail relay (ODMR)?
c) DCCP a) protocol for SMTP security
w
om
b) MAC address like a free relay for email agents to forward
c) URL their mails through. Open Mail Relays are
d) Name now unpopular because they can be used by
attackers to perform man-in-the-middle
Answer: a attacks.
Explanation: The client needs to know the IP
of its initial SMTP server as it has to send the 10. SMTP is not used to deliver messages to
.c
mail first to that server and then the server ______
forwards the mail ahead on behalf of the user. a) user’s terminal
b) user’s mailbox
7. An SMTP session may not include c) user’s word processor
ul
_______ d) user’s email client
a) zero SMTP transaction
b) one SMTP transaction Answer: c
c) more than one SMTP transaction Explanation: SMTP can only be used to send
d) one HTTP transaction
pa messages to user’s terminal, email client or
mailbox. A stand-alone word processor
Answer: d cannot be connected to a network, so it won’t
Explanation: An SMTP session can only be possible to deliver messages to it.
include SMTP transactions regardless the
jin
number. Any other protocol’s transaction is
not included in an SMTP session. TOPIC 5.6 INTRODUCTION TO
PEER TO PEER NETWORKS
8. SMTP defines _______
a) message transport 1. Which layer is responsible for process-to-
.re
such as TCP are used to provide other error control and flow control. It provides an
services like encryption for the messages. interface for the implementation of process to
process delivery through ports. There are
w
a) Client/Server Answer: d
b) Source/Destination Explanation: IANA divided port numbers
c) Message Transfer into three ranges i.e., Well-known, Registered
d) Peer to Peer and Dynamic ports. Well-known port
numbers range from 0 to 1023, registered port
Answer: a numbers are from 1024 to 49151 and
om
Explanation: The most common method dynamic port numbers are from 49152 to
used for this communication is Client/Server. 65535.
The client requests a service through a
particular port number to the port of the 6. The combination of an IP address and port
server using its socket address. Then the number is called as ________
server responds by giving the requested a) Socket address
service to the client port. b) Port address
.c
c) MAC address
3. Multiple processes on destinations at d) Host address
transport layer are identified by __________
a) Mac address Answer: a
ul
b) Port number Explanation: Socket address is the
c) Host number combination of an IP address and a port
d) Host address pa number and it is used to define the client-end
and server-end processes uniquely.
Answer: b
Explanation: Multiple processes on 7. Which of the following is false with
destinations are identified by a transport layer respect to Connectionless service of transport
address also called as port number. The IP layer protocol?
address along with the port number is called a) Packets are not numbered
jin
the socket address. b) Packets are not delayed
c) No acknowledgement
4. Range of port numbers in Internet model is d) Packet may arrive out of sequence
__________
a) 0 and 32,765(8-bit) Answer: b
.re
Explanation: Port numbers are 16-bit pathway for the packets to travel.
integers between 0 and 65,535. They are an
interface for the implementation of process to 8. Correct order in the process of Connection-
process delivery for the transport layer. Oriented services is ________
w
i. Data transfer
5. According to Internet Assigned Numbers ii. Connection release
Authority (IANA), which of the following iii. Connection establishment
w
om
their ends to terminate the connection.
c) 4
9. In transport layer, Multiplexing is done at d) 5
_________
Answer: c
a) Channel
Explanation: There are 4 phases in the
b) Receiver site
handshaking protocol. These are –
c) Sender site
.c
d) Packet Phase 1 : Establishing security capabilities
Phase 2 : Server Authentication and Key
Answer: c Exchange
Explanation: At the sender’s side, there are Phase 3 : Client Authentication and Key
ul
multiple processes which may want to send Exchange
packets. But there is only one transport layer Phase 4 : Finish/ End.
protocol like TCP or UDP working at a time.
2. In the SSL record protocol operation pad_2
pa
So the transport layer protocol gets the
messages from these processes and separates
them with different port numbers. This
is –
a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 48 times for
process is called multiplexing and it is done
MD5
before sending packets to the receivers side.
c) is the byte 0x5C repeated 48 times for
jin
10. The process of error checking and SHA-1
dropping of the header, delivering messages d) is the byte 0x36 repeated 48 times for
to appropriate process based on port number MD5
is called as _______
Answer: b
a) Delivery of packets
.re
om
d) crtificate_verify the handshake protocol.
.c
in CipherSuite parameter? d) Does not use hash algorithm
a) RSA
b) Fixed Diffie-Hellman Answer: c
c) Ephemeral Diffie-Hellman Explanation: The DSS signature uses SHA-
ul
d) Any of the mentioned 1.
Answer: b d) 48 bytes
Explanation: The certificate message is
required for any agreed-on key exchange Answer: c
method except Anonymous Diffie-Hellman. Explanation: The size is 36 bytes after MD5
w
om
pre master key of size – b) Packet filter
a) 48 bytes c) Content filter
b) 56 bytes d) Virus filter
c) 64 bytes
d) 32 bytes Answer: b
Explanation: As you know, firewalls are
Answer: a available as hardware appliances, as software-
.c
Explanation: The client_key_exchange only, or a combination of the two. In every
message uses a pre master key of size 48 case, the purpose of a firewall is to isolate
bytes. your trusted internal network (or your
personal PC) from the dangers of unknown
ul
13. The certificate_verify message involves resources on the Internet and other network
the process defined by the pseudo-code (in connections that may be harmful. The
terms of MD5) – firewall prevents unauthorized access to your
CertificateVerify.signature.md5_hash =
MD5(master_secret || pad_2 ||
pa
MD5(handshake_messages || master_secret ||
internal, trusted network from outside threats.
d) No Error Answer: a
Explanation: Most network layer firewalls
Answer: d can operate as stateful or stateless firewalls,
Explanation: The code is correct with no creating two subcategories of the standard
errors. network layer firewall. Stateful firewalls have
w
om
c) Firewall point
d) Secure point 6. A packet filter firewall filters at
__________
Answer: a a) Physical layer
Explanation: A firewall can be a PC, a b) Data link layer
router, a midrange, a mainframe, a UNIX c) Network layer or Transport layer
workstation, or a combination of these that d) Application layer
.c
determines which information or services can
be accessed from the outside and who is Answer: c
permitted to use the information and services Explanation: In computing, a firewall is a
from outside. Generally, a firewall is installed network security system that monitors and
ul
at the point where the secure internal network controls the incoming and outgoing network
and untrusted external network meet, which is traffic based on predetermined security rules.
also known as a chokepoint. pa [1] A firewall typically establishes a barrier
between a trusted, secure internal network
4. Which of the following is / are the types of and another outside network, such as the
firewall? Internet, that is assumed not to be secure or
a) Packet Filtering Firewall trusted.[2] Firewalls are often categorized as
b) Dual Homed Gateway Firewall either network firewalls or host-based
c) Screen Host Firewall firewalls.
jin
d) Dual Host Firewall
7. What is one advantage of setting up a DMZ
Answer: a with two firewalls?
Explanation: A firewall can be a PC, a a) You can control where traffic goes in three
midrange, a mainframe, a UNIX workstation, networks
.re
om
Explanation: The source routing feature that it protects.
provides a path address for the packet to help a) Robust
the firewall to reassemble the data stream that b) Expansive
was divided into packets. After reassembling, c) Fast
the firewall can then filter the stream. d) Scalable
.c
___________ which is a list of active Explanation: The firewall has to be
connections. expansive because a network is expected to
a) Routing table grow with time and if the firewall is unable to
b) Bridging table grow with it, the firewall won’t be able to
ul
c) State table handle the growing network traffic flow and
d) Connection table will hence fail.
Answer: a
pa
Explanation: The routing table basically
gives the state of each connection i.e. whether
jin
.re
w
w
w