Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

Chapter 1.

1. What does WWW stand for?

a. Whole Wide World?


b. World Wide Wealth
c. World War Won
d. World Wide Web

The correct answer is: World Wide Web.

2. Internet works on _____________________

a. both packet switching and circuit switching


b. Internet data switching (IDS)
c. packet switching
d. circuit switching

The correct answer is: packet switching.

3. Who writes the rules for the Internet?

a. The Internet Society


b. The government of the country in which the Internet is being used
c. Your Internet provider.
d. No-one

The correct answer is: The Internet Society.

4. The maximum rate of data transfer across a given path is called


_________________________

a. transmission speed
b. speed of bits
c. speed of packets
d. bandwidth

The correct answer is: bandwidth.


5. Computer networks connect the following devices:

a. Servers
b. Computers and servers
c. Computers
d. Any computing device running a network app

The correct answer is: Any computing device running a network app

6. Select the correct cable that transport signals in the form of light

a. Fiber optics
b. Copper wires
c. Copper wires and fiber optics
d. Satellite communications

The correct answer is: Fiber optics.

7. Where do files live on the Internet?

a. On your computer
b. On one massive computer - the www
c. On individual computers, often known as servers
d. On a network of routers

The correct answer is: On individual computers, often known as servers.

8. What is the Internet?

a. A physical facility that organizations use to house their critical applications and data.
b. A global network of computers and electronic devices
c. A type of web browser
d. A global collection of different websites

The correct answer is: A global network of computers and electronic devices.

9. Protocols define format, ____________ of msgs sent and received among network entities,
and ________________ on msg transmission, receipt.

a. condition.....................action taken
b. order............................rules
c. order ............................ actions taken
d. condition...........................rules

The correct answer is: order ............................ actions taken.

10. A ______________ application is any application running on one host providing


communication to another application running on a different host.
Note: The answer is a single word.

The correct answer is: network

11. What is the purpose of protocols in data communications?

a. specifying the device operating systems that will support the communication
b. providing the rules required for a specific type of communication to occur !
c. dictating the content of the message sent during communication
d. specifying the bandwidth of the channel or medium for each type of communication

The correct answer is: providing the rules required for a specific type of communication to
occur.

12. A _____________ is a networking device that forwards data packets between computer
networks. They perform the traffic directing functions on the Internet. Data sent through the
internet, such as a web page or email, is in the form of data packets.

The correct answer is: Router.

13. _____________ : enable people or even computers to communicate within a network.


These applications usually use a client-server architecture, where the client and server are
two computers connected to the network.

The correct answer is: Network Applications.


14. What is RFC?

a. RFC is a flexible, transparent fiber made by drawing glass or plastic to a diameter slightly
thicker than that of a human hair.
b. RFC is a numbered document, which includes appraisals, descriptions and definitions of
online protocols, concepts, methods and programmers RFCs are administered by the IETF.
c. RFC is the the conceptual model and set of communications protocols used in the Internet
and similar computer networks. It is commonly known as RFC because the foundational
protocols in the suite are the Transmission Control Protocol and the Internet Protocol.
d. RFC is a method of grouping data that is transmitted over a digital network into packets.
Packets are made of a header and a payload.

The correct answer is: RFC is a numbered document, which includes appraisals, descriptions
and definitions of online protocols, concepts, methods and programmers. RFCs are
administered by the IETF.

15. ___________________________ also sometimes referred to as the Internet of Everything


(IoE), consists of all the web-enabled devices that collect, send and act on data they acquire
from their surrounding environments using embedded sensors, processors and
communication hardware.

a. The Internet of Things (IoT)


b. The network of Network
c. The core Internet
d. The world wide Web

The correct answer is: The Internet of Things (IoT).

16. The ________________________________________ is a large open international


community of network designers, operators, vendors, and researchers concerned with the
evolution of the Internet architecture and the smooth operation of the Internet.

a. Internet Corporation for Assigned Names and Numbers (ICANN)


b. Institute of Electrical and Electronics Engineers (IEEE)
c. World Wide Web Consortium (W3C)
d. Internet Engineering Task Force (IETF)

The correct answer is: Internet Engineering Task Force (IETF).


17. Select the correct cable that transport signals in the form of light

a. Copper wires and fiber optics


b. Satellite communications
c. Copper wires
d. Fiber optics

The correct answer is: Fiber optics.

18. Today's connection speeds to the Internet are measured in ____________.

a. bits per second (bps)


b. Megabytes per second (Mbps) !
c. Kilobits per second (Kbps)
d. Kilobytes per second (KBps)

The correct answer is: Megabytes per second (Mbps)

19. A page on the internet is not sent in one large piece but is instead broken into small pieces
called _____________.

a. bits
b. bytes
c. packets !
d. data

The correct answer is: packets.

20. The special part of the Internet that you use when you load a web page is most properly
called

a. The World Wide Web


b. ARPANET
c. Hypertext Markup Language (HTML)
d. Packet switching

The correct answer is: The World Wide Web.


21. The simplest and best definition of the Internet is that....

a. It is a network of computer networks !


b. It is really easy to communicate with other people on
c. It is a body of knowledge available on many computers
d. It has a lot of computers and programs

The correct answer is: It is a network of computer networks.

22. __________ is a set of rules for the exchange of data between a terminal and a computer
or between two computers.

a. IETF
b. Request for comments
c. Standard
d. Protocol

The correct answer is: Protocol.



D= YR = L(bits)_ a

Rrfitslsec )
Chapter 1.2
R=
Ub¥ ,
=
bits persea

ls D( seal ✗ Rl bites )s bits

1. DSL stands for bytes ✗ 8


p→×É
a. digital switched line
b. data subscriber line
guess
"" " GB ( gigabytes) ✗ 10 ✗

8) final

;I÷!÷!÷
↳ ☐ ans
c. digital subscriber line ☐ mbps-
d. data switched line sub .

The correct answer is: digital subscriber line.


'
Mbpsxco

2. Simplistically, the _________________________ network refers to the end-points and the def

first hop from the end-points into the center of the network. The
&
_____________________network then connects the various zones within the data center
f- -

and to other data centers, with switches and routers.


a.Es _-
edge ......................... core
-

b. core ......................... core


c. core ......................... edge
d. edge ......................... edge

The correct answer is: edge ......................... core

3. ______________ is a technology for bringing high-bandwidth information to homes and


small businesses using old plain telephone lines.
Note: write the abbreviation not the whole name.

The correct answer is: DSL.


-

✗109×8

a-
g.
4. Calculate the transmission bandwidth in Mbps, if a file of 3.4 Giga bytes (GB) is sent in
1.2 minutes. Calculate your answer to a single decimal point.
D-
Answer: i. 2×60
-
Gigabytes ÷ 1.2
The correct answer is: 377.8
106 3 -4 → ✗
Giga bit,
R = YD = 3-4×8×109=377777777.8 ÷

to → →

1. 2×60 8

oyet-eiY.ir
5. Which of the following primarily uses guided or unguided media?
Local telephone system ( Guided )
Satellite communications ( undesiae )
Fiber-optic cable.

( Guided )
Cellular telephone system ( unguided )

The correct answer is: Local telephone system → Guided media, Satellite communications →
Unguided media, Fiber-optic cable → Guided media,
- - = Cellular telephone system → Unguided
media. -

6. Match the following network defintions:


computer network → info Comm .
.

A global computer network providing a variety of information and communication


facilities, consisting of interconnected networks using standardized communication b
f- __ intercom
protocols.
___-
.

A network located on the periphery of a centralized network.


-
network
A type of telecommunications network which connects subscribers to their immediate b
service provider. easing
The central element of a network that provides services to customers who are connected by
various smaller networks. stand

The correct answer is:


A global computer network providing a variety of information and communication facilities,
consisting of interconnected networks using standardized communication protocols. → Internet
network.
A network located on the periphery of a centralized network. → Edge network.
A type of telecommunications network which connects subscribers to their immediate service
-

provider. → Access network.


The central element of a network that provides services to customers who are connected by
various smaller networks. → Core network.

7. Now, in home access network, it is often that many functions (devices) are combined in a
single box. Provide an example of one one of these functions (devices)?
Note: devices used in home to connect to the Internet.
Answer:
___________

The correct answer is: modem.


8. Interference
__________ occurs when unwanted radio frequency signals disrupt the use of your

- -

television, radio or cordless telephone. It may prevent reception altogether, may cause only
a temporary loss of a signal, or may affect the quality of the sound or picture produced by
-

your equipment.
-

Interference.←
The correct answer is: ________ 0\
⑥icondnctiw⑧
,
outer
9. Match the following physical media definitions: coppertone
- Cable consists of an inner copper core and a second conducting outer sheath.
sheath
Cable with glass fiber carrying light pulses.
s Cable has UTP and STP different implementations. →Twisted Pair cable
- -

A wireless networking technology that uses line-of sight communications between pairs of
- Earth- based transmitters and receivers to relay information. The transmitters and
receivers are usually positioned well above ground level on towers, mountaintops, or atop
tall buildings.

The correct answer is:


Cable consists of an inner copper core and a second conducting outer sheath. → Coaxial cable.
Cable with glass fiber carrying light pulses. → Fiber optic cable.
-

Cable has UTP and STP different implementations. → Twisted-pair cable.


A wireless networking technology that uses line-of sight communications between pairs of
Earth-based transmitters and receivers to relay information. The transmitters and receivers are
usually positioned well above ground level on towers, mountaintops, or atop tall buildings. →
Terrestrial microwave.

10. Match the following network definitions:


A type of telecommunications network which connects subscribers to their immediate
service provider. access network
A network located on the periphery of a centralized network. edge network
The central element of a network that provides services to customers who are connected by
various smaller networks. → corenetwar
A global computer network providing a variety of information and communication
facilities, consisting of interconnected networks using standardized communication
protocols. Internet

The correct answer is:


A type of telecommunications network which connects subscribers to their immediate service
provider. → Access network. A network located on the periphery of a centralized network. →
Edge network. The central element of a network that provides services to customers who are
connected by various smaller networks. → Core network. A global computer network providing
a variety of information and communication facilities, consisting of interconnected networks
using standardized communication protocols. → Internet network.
D= YR = l(bits)_ a

Rrfitslsec )
R=
"¥¥ec ,
=
bits Persea

ls D( seal ✗ Rl bites )s bits

11. FTTP stands for ___________________


a. Frame Terminal Transfer Protocol bytes ✗ 8
p→×É
8)
"

b. Frequency To Time Placement GB ( gigabytes) ✗ 10 ✗


final
min ✗ 60
c. File Text Transfer Protocol ans

d. Fiber To The Premises mbps-


R→ final
'
✗Lo
The correct answer is: Fiber To The Premises.
É '
Mbpsxco

12. ____________ is a technique by which the total bandwidth available in a


communication medium is divided into a series of non-overlapping frequency bands, each
of which is used to carry a separate signal.

a. Code-division multiplexing (CDM)


b. Frequency-division multiplexing (FDM)
c. Space-division multiplexing (SDM)
d. Time-division multiplexing (TDM)

The correct answer is: Frequency-division multiplexing (FDM).


13. Calculate the delay time in micro second to transmit a packet of of length 9027 ②
- -
bytes
over a single link with 39 Mbps transmission bandwidth. Calculate your answer to a single
→T%
decimal point.
-

=4RT
Answer: _________ ☐
90297118¥ 1.851×10-3×101
=

The correct answer is: 1851.69


-
14. Which of the following primarily uses guided or unguided media?

Local telephone system ( an )


Satellite communications ( Ung )
Cellular telephone system ( Ung . )

Fiber-optic cable ( )

The correct answer is: Local telephone system → Guided media, Satellite communications →
-

Unguided media, Cellular telephone system → Unguided media, Fiber-optic cable → Guided
-
-

media.
.

15. The applications of Frequency-Division Multiplexing (FDM) are:


-

a. mobile calls
b. television broadcasting
D= YR llbitsj.se
c. DSL
= ,

d. All mentioned items Rrfitslsec )


R =

Ubip¥ ,
=
bits parsec
The correct answer is: All mentioned items.
ls D( seal ✗ Rlbsites )s bits

bytes ✗ 8
p→×É
8)
"

GB ( gigabytes) ✗ 10 ✗
16. DSL is part of the following network. final
min ✗ 60
a. edge network ans

÷÷÷÷÷
b. core network
c. access network
d. Wifi network
'
The correct answer is: access network Mbpsxco

a
17. _____________ is a method by which multiple analog or digital signals are combined
into one signal over a shared medium. The aim is to share a scarce resource. For example,
-
-0s f-
in telecommunications, several telephone calls may be carried using one wire or many IP
connection can use a single NIC.

The correct answer is: multiplexing


fI---

Multiplexing
18. Calculate the size of a file in Mega bytes (MB) if it took 2.4 seconds to send it though a
-

transmission link with a rate of 36.0 Mbps. Calculate your answer to a single decimal point.
Foc


The correct answer is: 10.8

,

Ls 24136.01×106 sg6%%°

19. Match the following network definitions:

A€-00
telecommunications network that extends over a large geographic area for the primary

I-OI-wi-dn-On-EI-F-s.gr#ni----------
purpose of computer networking. ( WANK)

Uses Ethernet to connect devices together. ( )

Links two or more devices using wireless communication to form a local network within a
limited area such as a home, school, computer laboratory, campus, or office building.
( Windle )
ran
A radio network distributed over land through cells where each cell includes a fixed
location transceiver known as base station. These cells together provide radio coverage
over larger geographical areas. User equipment (UE), such as mobile phones, is therefore
able to communicate even if the equipment is moving through cells during transmission.
( )

The correct answer is: A telecommunications network that extends over a large geographic area
for the primary purpose of computer networking. → WAN, Uses Ethernet to connect devices

-
together → Wired LAN, Links two or more devices using wireless communication to form a
local network within a limited area such as a home, school, computer laboratory, campus, or
office building. → wireless LANs, A radio network distributed over land through cells where
___

each cell includes a fixed location transceiver known as base station. These cells together
provide radio coverage over larger geographical areas. User equipment (UE), such as mobile
phones, is therefore able to communicate even if the equipment is moving through cells during
transmission. → Cellular network.
-

20. Typically, DSL in residential has:


É
a. the upstream transmission rate is the lower as the downstream transmission rate
b. depends on the network app.
c. the upstream transmission rate is the same as the downstream transmission rate.
d. the upstream transmission rate is the higher as the downstream transmission rate

The correct answer is: the upstream transmission rate is the lower as the downstream
transmission rate.

21. Transmission media are usually categorized as ________________.


.

a. determinate or indeterminate b. metallic or nonmetallic


c. fixed or unfixed
d. guided or unguided

f-
The correct answer is: guided or unguided.
Chapter 1.3

1. _____________________________ is the set of techniques that allows the simultaneous


transmission of multiple signals across a single data link.
a. Compressing.
b. Demodulation.
c. Multiplexing.
d. Modulation.

The correct answer is: Multiplexing.

2. The required resources for communication between end systems are reserved for the
duration of the session between end systems in ________ method.
a. data switching.
b. Line switching.
c. Packet switching.
d. Circuit switching.

The correct answer is: Circuit switching.

3. In _________ systems, resources are allocated on demand.


a. Circuit switching.
b. Line switching.
c. Packet switching.
d. data switching.

The correct answer is: Packet switching.

4. Which multiplexing technique shifts each signal to a different carrier frequency?


a. TDM.
b. TDM and FDM.
c. FDM.
d. SDM.

The correct answer is: FDM.


5. If there are N routers from source to destination, and each link has a fixed transmission
rate of R bits per second then, the total end to end delay in sending a packet with L number
of bits is equal to _____________
a. NL/R
b.N
c. (2N*L)/R
d. NR/L

The correct answer is: NL/R

6. Match the following Internet service providers ISPs definitions:


1. Universities, enterprises and large organizations provide access to the Internet and may
act as.
2. Provide Internet connectivity to local access ISP in a region.
3. The backbone of the Internet. These ISPs build infrastructure such as the Atlantic Internet
sea cables. They provide traffic to all other ISPs, not end users.
4. Provide internet services to a city or a district, their customer base includes home and
corporate customer.

The correct answer is: Universities, enterprises and large organizations provide access to the
Internet and may act as → Access ISP, Provide Internet connectivity to local access ISP in a
region. → Regional ISP, The backbone of the Internet. These ISPs build infrastructure such as
the Atlantic Internet sea cables. They provide traffic to all other ISPs, not end users. → Tire
1 ISP, Provide internet services to a city or a district, their customer base includes home and
corporate customer. → Access ISP.

7. _________________________ means finding a suitable path for a packet from the sender
to the destination.
a. Switching
b. Forwarding
c. Multiplexing
d. Routing

The correct answer is: Routing.

8. __________ is a company that provides Internet connections and services to individuals


and organizations.
Note: Write the abbreviation!

The correct answer is: ISPs.


9. The sharing of a medium and its link by two or more devices is called _____________.
a. multiplexing
b. line discipline
c. modulation
d. encoding

The correct answer is: multiplexing.

10. Most packet switches use this principle ____________


a. Store and wait
b. Store and forward
c. Stop and wait
d. Stop and forward

The correct answer is: Store and forward.

11. _____________________________is the process of deciding where to send a received


packet.
_____________________________ is the actual process of sending IP data packets to a port
of a router based on the destination IP of the packet.
a. Routing ........................... Forwarding
b. Switching ............................. Forwarding
c. Forwarding .......................... Routing
d. Switching ..........................Routing

The correct answer is: Routing ........................... Forwarding

12. If the arrival rate (in bits per second) to a link exceeds transmission rate of the link for
a period of time, then packets _______________________ if memory (buffer) fills up.
a. would be dropped (lost)
b. would be queued
c. would be sent immediately.
d. would be returned to the sender.

The correct answer is: would be dropped (lost)


13. In synchronous TDM, for n signal sources of the same data rate, each frame contains
_______ slots.
a. n
b. n+1
c. n-1
d. 0 to n

The correct answer is: n.


14. As the resources are reserved between two communicating end systems in circuit
switching, ___________ is achieved.
a. guaranteed constant rate
b. reliability
c. efficiency
d. sharing

The correct answer is: guaranteed constant rate

15. An Internet exchange point (IX or IXP) is:


a. a device that allows wireless devices to connect to a wired network using Wi-Fi, or
related standards.
b. defined in the Request for Comments RFCs to exchange data between two hosts in the
internet
c. the transparent backbone of the Internet to store and exchange internet content
d. a physical infrastructure through which Internet service providers (ISPs) and/or
Content Delivery Networks (CDNs) " exchange Internet traffic between their networks

The correct answer is: a physical infrastructure through which Internet service providers (ISPs)
and/or Content Delivery Networks (CDNs) exchange Internet traffic between their networks.

16. _____________ communications cable is a cable laid on the sea bed between land-based
stations to carry telecommunication signalsacrossstretchesofoceanandsea.
(single world only)

The correct answer is: submarine.

17. The Internet core network is connected in a _____________________ structure.


a. star
b. mesh
c. ring
d. bus

The correct answer is: mesh.


Question 5

Correct

Mark 1.00 out of 1.00

The
bottleneck
# link of a network path is the link with the smallest available bandwidth, i.e., the link that determines the end-to-end
throughput on the path.

Note: provide a single word!

Question 6

Correct

Mark 1.00 out of 1.00

In the Internet model, when data is sent from device X to device Y, the 5th layer to receive data at Y is

a. Link layer

b. Transport layer

c. physical layer

d. Application layer # Correct

Question 7

Correct

Mark 1.00 out of 1.00

In the Internet, the link and path delay measurements are in the rage of

a. seconds

b. milliseconds # Correct

c. microseconds

d. minutes
Question 8

Correct

Mark 1.00 out of 1.00

Which layer provides the services to user?

a. application layer # Correct

b. data link layer

c. network layer

d. transport layer

Question 9

Correct

Mark 1.00 out of 1.00

Which of the following layers is an addition to OSI model when compared with TCP IP model?

a. Application layer

b. Session and Presentation layer # Correct

c. Presentation layer

d. Session layer

Question 10

Correct

Mark 1.00 out of 1.00

Consider the scenario shown below, with three different servers connected to three different clients over three three-hop
paths. The three pairs share a common middle hop with a transmission capacity of R = 98 Mbps. The three links from the
servers to the shared link have a transmission capacity of RS = 5.2 Mbps. Each of the three links from the shared middle link to
a client has a transmission capacity of RC =22 Mbps. What is the maximum achievable end-end throughput (in Mbps) for each
of three client-to-server pairs, assuming that the middle link is fairly shared (divides its transmission rate equally)?

Answer: 5.2 #
Home / My courses / SUMMER202122-0612356-SQ8027806614-S1 / Chapter 1 Computer Networks and the Internet

/ Q4. Sections 1.4 delay, loss, throughput in networks and 1.5 protocol layers, service models,

Started on Saturday, 25 June 2022, 5:20 PM


State Finished
Completed on Saturday, 25 June 2022, 5:40 PM
Time taken 20 mins 2 secs
Grade 9.00 out of 10.00 (90%)

Question 1

Correct

Mark 1.00 out of 1.00

Consider the scenario shown below, with three different servers connected to three different clients over three three-hop
paths. The three pairs share a common middle hop with a transmission capacity of R = 72 Mbps. The three links from the
servers to the shared link have a transmission capacity of RS = 21 Mbps. Each of the three links from the shared middle link to a
client has a transmission capacity of RC =3.7 Mbps. What is the maximum achievable end-end throughput (in Mbps) for each
of three client-to-server pairs, assuming that the middle link is fairly shared (divides its transmission rate equally)?

Answer: 3.7 !

Question 2

Correct

Mark 1.00 out of 1.00

Which layer is responsible for process to process delivery in a general network model?

a. data link layer

b. Application layer 

c. transport layer ! Incorrect

d. network layer

"
#
Question 3

Correct

Mark 1.00 out of 1.00

In the Internet, the link and path delay measurements are in the rage of 

a. milliseconds ! Correct

b. minutes

c. microseconds

d. seconds

Question 4

Correct

Mark 1.00 out of 1.00

Transmission delay does not depend on _____________

a. Distance between the routers ! Correct

b. Packet length

c. Bandwidth of medium

d. Transmission rate

Question 5

Correct

Mark 1.00 out of 1.00

How many layers are present in the Internet protocol stack (TCP/IP model)?

a. 6

b. 5 ! Correct

c. 4

d. 7
Question 6

Correct

Mark 1.00 out of 1.00

Given the following three routers (two links) network. The distance between A and B is 3021 km and the distance between B
and C is 656 km. Also, the transmission rate  between A and B is 4 Mbps and the transmission rate between B and C is 11
 Mbps. 

A wants to send a 1000 byte packet to C through B. B is supposed to follow the store-and-forward model, that is, B will receive
the whole packet from A and then start transmitting the packet to C. Assume 

Data travels through the links at the speed of (2 x 108 meters/sec).


Queuing delay = processing delay =0.

What is the end-to-end delay seen by the packet in milliseconds?

Answer: 19.459 !

Question 7

Incorrect

Mark 0.00 out of 1.00

What is the general term that is used to describe a piece of data at any layer of a networking model?

a. frame

b. protocol data unit

c. segment

d. packet # Incorrect
Question 8

Correct

Mark 1.00 out of 1.00

In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps.
The throughput is ___________

a. 100 Mbps

b. 10 Mbps ! Correct

c. 50 Mbps

d. 40 Mbps

Question 9

Correct

Mark 1.00 out of 1.00

Propagation delay depends on ___________

a. Distance between the routers ! Correct

b. Packet length

c. Transmission rate

d. Time of day 

Question 10

Correct

Mark 1.00 out of 1.00

In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________

a. Network layer

b. Application layer ! Correct

c. Transport layer

d. Link layer
Home / My courses / SUMMER202122-0612356-SQ8027806614-S1 / Chapter 1 Computer Networks and the Internet

/ Q4. Sections 1.4 delay, loss, throughput in networks and 1.5 protocol layers, service models,

Started on Friday, 24 June 2022, 3:34 PM


State Finished
Completed on Friday, 24 June 2022, 3:54 PM
Time taken 20 mins 2 secs
Grade 6.00 out of 10.00 (60%)

Question 1

Correct

Mark 1.00 out of 1.00

OSI stands for __________

a. optical service implementation

b. open system interconnection ! Correct

c. open service Internet

d. operating system interface

"
Question 2

Not answered

Marked out of 1.00

Given the following three routers (two links) network. The distance between A and B is 3807 km and the distance between B
and C is 922 km. Also, the transmission rate  between A and B is 9 Mbps and the transmission rate between B and C is 11
 Mbps. 

A wants to send a 1814 byte packet to C through B. B is supposed to follow the store-and-forward model, that is, B will receive
the whole packet from A and then start transmitting the packet to C. Assume 

Data travels through the links at the speed of (2 x 108 meters/sec).


Queuing delay = processing delay =0.

What is the end-to-end delay seen by the packet in milliseconds?

Answer: #

Question 3

Correct

Mark 1.00 out of 1.00

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end
devices?

a.  data link layer

b. transport layer ! Correct

c. application layer

d. network layer
Home / My courses / SUMMER202122-0612356-SQ8027806614-S1 / Chapter 1 Computer Networks and the Internet

/ Q4. Sections 1.4 delay, loss, throughput in networks and 1.5 protocol layers, service models,

Started on Friday, 24 June 2022, 8:24 PM


State Finished
Completed on Friday, 24 June 2022, 8:44 PM
Time taken 19 mins 52 secs
Grade 8.00 out of 10.00 (80%)

Question 1

Correct

Mark 1.00 out of 1.00

Which of the following delay is faced by the packet in travelling from one end system to another?

a. All of the mentioned ! Correct

b. Transmission delay

c. Propagation delay

d. Queuing delay

Question 2

Correct

Mark 1.00 out of 1.00


"

------------------------------ is a term used for how much data can be transferred from the source to its destination within a
given time frame, while ------------------------------ is the term used for the maximum transfer capacity of a network. 

a. bitrate..........................throughput

b. throughput..........................bandwidth ! Correct

c. bitrate..........................bandwidth

d. bandwidth ............................. throughput


Question 3

Correct

Mark 1.00 out of 1.00

-
Consider the scenario shown below, with three different servers connected to three different clients over three three-hop
paths. The three pairs share a common middle hop with a transmission capacity of R = 39 Mbps. The three links from the
servers to the shared link have a transmission capacity of RS = 13 Mbps. Each of the three links from the shared middle link to a
client has a transmission capacity of RC =6.7 Mbps. What is the maximum achievable end-end throughput (in Mbps) for each
of three client-to-server pairs, assuming that the middle link is fairly shared (divides its transmission rate equally)?

Answer: 6.7Mps !

Question 4

Correct

Mark 1.00 out of 1.00

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order
of the protocol stack that is used to prepare the request for transmission?

a. HTTP, IP, TCP, Ethernet

b. Ethernet, IP, TCP, HTTP

c. Ethernet, TCP, IP, HTTP

d. HTTP, TCP, IP, Ethernet ! Correct

Question 5

Correct

Mark 1.00 out of 1.00

In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________

a. Application layer ! Correct

b. Network layer

c. Transport layer

d. Link layer
Question 6

Correct

Mark 1.00 out of 1.00

What are two benefits of using a layered network model? (Choose two.)

a. It ensures a device at one layer can function at the next higher layer.

b. It speeds up packet delivery.

c. It assists in protocol design. !

d. It prevents technology in one layer from affecting other layers. !

e. It prevents designers from creating their own model.

Question 7

Incorrect

Mark 0.00 out of 1.00

What PDU is encapsulated at the Network Layer?

a. A Segment is encapsulated at the Network Layer. # Incorrect

b. A datagram is encapsulated at the Network Layer

c. A message is encapsulated at the Network Layer

d. A frame is encapsulated at the Network Layer


Question 8

Incorrect

Mark 0.00 out of 1.00

What is the end-to-end packet latency (delay) in this store-and-forward subnet from router A to router E ? The answer is in
microseconds. 

Assume : 

Data travels through the links at the speed of (2 x 108 meters/sec).


All links are 2 km;
All transmission rate R = 64 Mbps;
Packet size = 3462  bytes
Queuing delay = processing delay =0;

Note: if you do not see the figure click 


https://www.dropbox.com/s/3csuhfo0onj8zk7/Chain_network_A_E.jpg?dl=0

Answer: 256.37 #

Question 9

Correct

Mark 1.00 out of 1.00

Traceroute
! is a  program that provides delay measurement from source to router along end-end Internet path towards destination.
(single word only)

Question 10

Correct

Mark 1.00 out of 1.00

The
bottleneck
! link of a network path is the link with the smallest available bandwidth, i.e., the link that determines the end-to-end
throughput on the path. 
Note: provide a single word!
Question 6

Correct

Mark 1.00 out of 1.00

Identify the order of the 5 steps encapsulation?

1. Create the segment


2. Convert to bits

3. Create the datagram


4. Create the frame
5. User creates the data

a. 1,2,4,3,5

b. 5,3,4,1,2

c. 2,1,3,4,5

d. 5,1,3,4,2 ! Correct

Question 7

Correct

Mark 1.00 out of 1.00

The number of layers in ISO OSI reference model is __________

a. 4

b. 6

c. 5

d. 7 ! Correct


# 

# 
Question 3

Correct

Mark 1.00 out of 1.00

In the Internet protocol stack, layer number two (Layer 2) refers to ______________________

a. Transport Layer

b. Network Layer

c. Application Layer

d. Link Layer ! Correct

Question 4

Correct

Mark 1.00 out of 1.00

In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps.
The throughput is ___________

a. 40 Mbps

b. 10 Mbps ! Correct

c. 100 Mbps

d. 50 Mbps

Question 5

Correct

Mark 1.00 out of 1.00

Which layer is responsible for process to process delivery in a general network model?

a. network layer

b. Application layer 

c. transport layer ! Incorrect

d. data link layer


Question 6

Correct

Mark 1.00 out of 1.00

Consider the scenario shown below, with three different servers connected to three different clients over three three-hop
paths. The three pairs share a common middle hop with a transmission capacity of R = 8.2 Mbps. The three links from the
servers to the shared link have a transmission capacity of RS = 25 Mbps. Each of the three links from the shared middle link to
a client has a transmission capacity of RC =9.3 Mbps. What is the maximum achievable end-end throughput (in Mbps) for each
of three client-to-server pairs, assuming that the middle link is fairly shared (divides its transmission rate equally)?

Answer: 2.73 !

Question 7

Correct

Mark 1.00 out of 1.00

Given the following three routers (two links) network. The distance between A and B is 1422 km and the distance between B
and C is 791 km. Also, the transmission rate  between A and B is 8 Mbps and the transmission rate between B and C is 19
 Mbps. 

A wants to send a 1275 byte packet to C through B. B is supposed to follow the store-and-forward model, that is, B will receive
the whole packet from A and then start transmitting the packet to C. Assume 
Data travels through the links at the speed of (2 x 108 meters/sec).
Queuing delay = processing delay =0.

What is the end-to-end delay seen by the packet in milliseconds?

Answer: 12.88 !
Question 2

Correct

Mark 1.00 out of 1.00

Which layer provides the services to user?

a. application layer ! Correct

b. data link layer

c. transport layer

d. network layer


Question 3

Correct

Mark 1.00 out of 1.00

In the Internet, the link and path delay measurements are in the rage of

a. milliseconds ! Correct

b. microseconds

c. minutes

d. seconds

Question 4

Correct

Mark 1.00 out of 1.00

What process is used to place one message inside another message for transfer from the source to the destination?

a. decoding

b. encapsulation ! Correct

c. packeting

d. layering
Home / My courses / SUMMER202122-0612356-SQ8027806614-S1 / Chapter 1 Computer Networks and the Internet

/ Q4. Sections 1.4 delay, loss, throughput in networks and 1.5 protocol layers, service models,

Started on Saturday, 25 June 2022, 11:20 AM


State Finished
Completed on Saturday, 25 June 2022, 11:35 AM
Time taken 14 mins 13 secs
Grade 7.00 out of 10.00 (70%)

Question 1

Correct

Mark 1.00 out of 1.00

A packet has two types of fields: header fields and a payload field. The payload is typically

a. the portion of the malware which performs malicious action

b. identifies the source and destination of the packet

c. a data unit from the layer above. ! Correct

d. includes information describing the packet

Question 2

Incorrect

Mark 0.00 out of 1.00

The
bottekneck
" link of a network path is the link with the smallest available bandwidth, i.e., the link that determines the end-to-end
throughput on the path.

Note: provide a single word!


Home / My courses / SUMMER202122-0612356-SQ8027806614-S1 / Chapter 1 Computer Networks and the Internet

/ Q4. Sections 1.4 delay, loss, throughput in networks and 1.5 protocol layers, service models,

Started on Saturday, 25 June 2022, 5:04 PM


State Finished
Completed on Saturday, 25 June 2022, 5:24 PM
Time taken 20 mins
Grade 10.00 out of 10.00 (100%)

Question 1

Correct

Mark 1.00 out of 1.00

What is the general term that is used to describe a piece of data at any layer of a networking model?

a. segment

b. frame

c. protocol data unit ! Correct

d. packet

Question 2

Correct

Mark 1.00 out of 1.00

Application layer is implemented in ____________

a. End system " ! Correct

b. Ethernet

c. NIC

d. routers
Question 7

Correct

Mark 1.00 out of 1.00

Identify the order of the 5 steps encapsulation?

1. Create the segment


2. Convert to bits

3. Create the datagram


4. Create the frame
5. User creates the data

a. 2,1,3,4,5

b. 5,1,3,4,2 ! Correct

c. 5,3,4,1,2

d. 1,2,4,3,5

Question 8

Correct

Mark 1.00 out of 1.00

The data link layer takes the dtagram from _________ and encapsulates them into frames for transmission.

a. Physical Layer

b. Transport Layer

c. Network Layer ! Correct

d. Application Layer
Question 8

Correct

Mark 1.00 out of 1.00

What are two benefits of using a layered network model? (Choose two.)

a. It ensures a device at one layer can function at the next higher layer.

b. It speeds up packet delivery.

c. It assists in protocol design. "

d. It prevents designers from creating their own model.

e. It prevents technology in one layer from affecting other layers. "

Question 9

Correct

Mark 1.00 out of 1.00

 Which layer is used to link the network dependent layers and application dependent layers?

a. Application layer 

b. Physical layer

c. Data link layer 

d. Transport layer " Correct


Home / My courses / SUMMER202122-0612356-SQ8027806614-S1 / Chapter 1 Computer Networks and the Internet

/ Q4. Sections 1.4 delay, loss, throughput in networks and 1.5 protocol layers, service models,

Started on Saturday, 25 June 2022, 2:49 PM


State Finished
Completed on Saturday, 25 June 2022, 3:08 PM
Time taken 19 mins 13 secs
Grade 9.00 out of 10.00 (90%)

Question 1

Correct

Mark 1.00 out of 1.00

The qualitative dependence of average queuing delay on the traffic intensity is shown in following figure.  The y-axis shows the
average queuing delay and the x-axis shows the  traffic intensity. Which of the following statement is FALSE.  

a. Average queuing delay increases very rapidly at traffic intensity beyond 80%. 

b. Traffic intensity = average packet arrival rate multiplied by packet transmission delay. 

c. The golden rules in traffic engineering is: Design your system so that the traffic intensity is no greater than 1.

d. Links must be run at 100% traffic intensity to justify their cost.  !

Your answer is correct.


Home / My courses / SUMMER202122-0612356-SQ8027806614-S1 / Chapter 1 Computer Networks and the Internet

/ Q4. Sections 1.4 delay, loss, throughput in networks and 1.5 protocol layers, service models,

Started on Saturday, 25 June 2022, 4:52 PM


State Finished
Completed on Saturday, 25 June 2022, 5:07 PM
Time taken 14 mins 31 secs
Grade 10.00 out of 10.00 (100%)

Question 1

Correct

Mark 1.00 out of 1.00

What is the end-to-end packet latency (delay) in this store-and-forward subnet from router A to router E ? The answer is in
microseconds.

Assume :
Data travels through the links at the speed of (2 x 108 meters/sec).
All links are 3.2 km;
All transmission rate R = 55 Mbps;
Packet size = 2494 bytes
Queuing delay = processing delay =0;

Note: if you do not see the figure click


https://www.dropbox.com/s/3csuhfo0onj8zk7/Chain_network_A_E.jpg?dl=0

Answer: 1515.05 !
Question 6

Correct

Mark 1.00 out of 1.00

Consider the scenario shown below, with three different servers connected to three different clients over three three-hop
paths. The three pairs share a common middle hop with a transmission capacity of R = 79 Mbps. The three links from the
servers to the shared link have a transmission capacity of RS = 25 Mbps. Each of the three links from the shared middle link to
a client has a transmission capacity of RC =6.5 Mbps. What is the maximum achievable end-end throughput (in Mbps) for each
of three client-to-server pairs, assuming that the middle link is fairly shared (divides its transmission rate equally)?

Answer: 6.5 !

Question 7

Correct

Mark 1.00 out of 1.00

The OSI Model was developed to

a. ensure communications could take place between different vendor specific models that were developed ! Correct
independently.

b. to describe the operation of network protocols

c. serve as a common basis of reference for desiging Internet protocols

d. define standards for communication


Home / My courses / FALL202122-0612356-SQ7884746614-B1 / Chapter 1 Computer Networks and the Internet

/ Q.6 Section 1.6+1.7

Started on Sunday, 7 November 2021, 10:45 AM


State Finished
Completed on Sunday, 7 November 2021, 10:52 AM
Time taken 6 mins 55 secs
Grade 2.00 out of 4.00 (50%)

Question 1

Correct

Mark 1.00 out of 1.00

Network security must be considered in__________________

a. in lower layers

b. in network dependent layers

c. in all layers ! Correct

d. in network independent layers

The correct answer is: in all layers


Home / My courses / FALL202122-0612356-SQ7884746614-B1 / Chapter 1 Computer Networks and the Internet

/ Q.6 Section 1.6+1.7

Started on Sunday, 7 November 2021, 10:44 AM


State Finished
Completed on Sunday, 7 November 2021, 10:46 AM
Time taken 2 mins 51 secs
Grade 4.00 out of 4.00 (100%)

Question 1

Correct

Mark 1.00 out of 1.00

Internet security ______________

a. assures 100% safe Internet communication.

b. gets its tools from the antivirus testing labs

c. is impeded in the original TCP/IP design

d. is playing catch-up ! Correct

The correct answer is: is playing catch-up

Question 2

Correct

Mark 1.00 out of 1.00

What are the field of network security?

a. how we can defend networks against attacks

b. how to design architectures that are immune to attacks

c. all of the above ! Correct

d. how bad guys can attack computer networks

The correct answer is: all of the above


Question 3

Correct

Mark 1.00 out of 1.00

Packet sniffers involve ____________

a. no receiver

b. Legal receiver

c. Active receiver

d. Passive receiver ! Correct

The correct answer is: Passive receiver

Question 4

Correct

Mark 1.00 out of 1.00

A British computer scientist Tim Berners-Lee published the first-ever website while working at CERN, the huge particle physics lab in Switzerland at the
beginning of

a. 1970’s

b. 1960’s

c. 1980’s

d. 1990’s ! Correct

The correct answer is: 1990’s


Question 2

Correct

Mark 1.00 out of 1.00

match the following ways bad guys can attack computer networks

self-replicating infection by passively receiving object that gets itself executed worm malware
!
make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with DoS
bogus traffic
!

can record keystrokes, web sites visited, upload info to collection site spyware malware
!

self-replicating infection by receiving/executingobject (e.g., e-mail attachment) virus malware


!
gathering, collecting, intercepting and logging traffic that passes over a computer network or part of packet “sniffing”
a network.
!

The correct answer is: self-replicating infection by passively receiving object that gets itself executed → worm malware, make
resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic → DoS, can record
keystrokes, web sites visited, upload info to collection site → spyware malware, self-replicating infection by
receiving/executingobject (e.g., e-mail attachment) → virus malware, gathering, collecting, intercepting and logging traffic that
passes over a computer network or part of a network. → packet “sniffing”

Question 3

Incorrect

Mark 0.00 out of 1.00

Packet sniffers involve ____________

a. Passive receiver

b. Legal receiver

c. Active receiver " Incorrect

d. no receiver

The correct answer is: Passive receiver


Question 4

Incorrect

Mark 0.00 out of 1.00

What was the network that became the basis of the Internet?

a. ARPANET #
b. WWW " Incorrect

c. TCP/IP

d. DARPA

The correct answer is: ARPANET

◀︎ Q5. Section 1.5 (protocol layers, service models)

Jump to...

First Exam (Chapter 1) ▶︎


Question 2

Incorrect

Mark 0.00 out of 1.00

#
network hijacked
" are networks of hijacked computer devices used to carry out various scams and cyberattacks. This term is formed from the
word’s “robot” and “network.”

The correct answer is: Botnets

Question 3

Correct

Mark 1.00 out of 1.00

Internet security ______________

a. is playing catch-up ! Correct

b. gets its tools from the antivirus testing labs

c. is impeded in the original TCP/IP design

d. assures 100% safe Internet communication.

The correct answer is: is playing catch-up


Home / My courses / FALL202122-0612356-SQ7884746614-B1 / Chapter 1 Computer Networks and the Internet

/ Q.6 Section 1.6+1.7

Started on Sunday, 7 November 2021, 10:44 AM


State Finished
Completed on Sunday, 7 November 2021, 10:45 AM
Time taken 1 min 20 secs
Grade 4.00 out of 4.00 (100%)

Question 1

Correct

Mark 1.00 out of 1.00

Botnet
! are networks of hijacked computer devices used to carry out various scams and cyberattacks. This term is formed from the
word’s “robot” and “network.”

The correct answer is: Botnets

Question 2

Correct

Mark 1.00 out of 1.00

___________________________send packet with false source address

a. IP spoofing ! Correct

b. spyware malware

c. packet sniffing

d. worm

The correct answer is: IP spoofing


Question 3

Correct

Mark 1.00 out of 1.00

botnet
! are networks of hijacked computer devices used to carry out various scams and cyberattacks. This term is formed from the
word’s “robot” and “network.”

The correct answer is: Botnets

Question 4

Incorrect

Mark 0.00 out of 1.00

The first workable prototype of the Internet came in the late ............................. with the creation of ARPANET,

a. 1970’s " Incorrect

b. 1980’s

c. 1960’s

d. 1950’s

The correct answer is: 1960’s

◀︎ Q5. Section 1.5 (protocol layers, service models)

Jump to...

First Exam (Chapter 1) ▶︎


Question 3

Correct A ______________________________requires a carrier file to spread across a network and replicates by


Mark 1.00 out inserting copies into other files. A ________________________________ can self-replicate without a carrier
of 1.00 file.

a. worm ........................... virus

b. virus ........................... worm ! Correct

c. worm ...........................botnet

d. botnet ........................... virus

The correct answer is: virus ........................... worm

Question 4

Correct A British computer scientist Tim Berners-Lee published the first-ever website while working at CERN, the huge particle physics
Mark 1.00 out lab in Switzerland at the beginning of
of 1.00

a. 1980’s

b. 1960’s

c. 1990’s ! Correct

d. 1970’s

The correct answer is: 1990’s

◀︎ Q5. Section 1.5 (protocol layers, Jump to...


First Exam (Chapter 1) ▶︎
service models)
Question 3

Correct

Mark 1.00 out of 1.00

___________________________send packet with false source address

a. spyware malware

b. worm

c. packet sniffing

d. IP spoofing ! Correct

The correct answer is: IP spoofing

Question 4

Correct

Mark 1.00 out of 1.00

The Advanced Research Projects Agency (ARPA), an arm of the ________________________ funded the development of the
Advanced Research Projects Agency Network (ARPANET) in the late 1960s. Its initial purpose was to link computers at
Pentagon-funded research institutions over telephone lines.

a. ISO

b. U.S. Defense Department, ! Correct

c. IEEE

d. ITU

The correct answer is: U.S. Defense Department,

You might also like