Which one is NOT the function of ping program?
A datagram cannot be larger than ________ of a network over which it is sent.
MTU Stands for _______- Minimum transmission unit
- Maximum transmission unit
- Multicast transmission unit
Fragmentation when using ICMP for path MTU should be avoided.
HEADER LEN field gives size of extention header.
The process of learning the path MTU is known as path MTU discovery.
________ is less complex and easy to understand.
IPV6 128 bits address includes network prefix and ________
The Universal Datagram is not an end-to-end protocol.
Ethernet uses a ____________ static addressing scheme in which each device is assigned a unique address by the manufacturer.
The --------- bit preamble in the Ethernet frame format that precedes the frame contains alternating 1s and 0s that allow the receiver’s hardware to synchronize with the incoming signal.
The third field of the header consists of ------ bit Ethernet frame type.
An interface for twisted pair Ethernet must have a ____________ connector, and must generate signals according to the_____________ specification.
A bridge uses the ___________ to determine which computers connect to which segment, and uses the __________ to determine whether to forward a copy of frame.
Formally named __________ informally known as the thick wire Ethernet or Thick net.
Formally named --------------- informally known as thin wire Ethernet or thin net.
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.- DMA(Direct Memory Access)
A system with redundant bridges might have a problem with_______ in the system.A Bridge can ________
________ has a jitter zero- None of the given
- Virtual Private Network
- Isochronous Network
- Asynchronous Network
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .- Connectionless service paradigm
- Connection oriented service paradigm
- Both Connectionless and Connection-oriented service paradigm
- None of the given
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________
The next hop to which a packet is sent depends only on- Path the packet has taken
When an application--------------- data, it makes a copy of the data available to all other computers on the network?
A ---------- provide a mechanism that a customer can use to set a physical address.- Configurable addressing scheme
- Dynamic addressing scheme
_____________ sense a signal on one cable and then transmits an amplified copy on the other cable.
The maximum size of an Ethernet segment is___________FDDI can transmits data at a rate of ------ 1000 million bits per second
- 100 million bits per second
- 10 million bits per second
Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.
-------------- have advantages arisen from the size and ease of computation.The term -------- is used to denote the definition of a packet used with a specific type of network.
------ has no way to determine the cause of the problem.
In -------------, network occupies the smaller area like a room a floor or a building
In ---------, network occupies larger areas like cities & countries.
No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.A typical port on an ATM switch operates at __________ or higher.
The product of delay and throughput measures the _____ of data that can be present on the network.
__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.- Constant Bit Rate (CBR) service
- Variable Bit Rate (VBR) service
- Available Bit Rate (ABR) service
Which of the following is a connecting device?
A bridges function in the _________ layers(s).- Physical (MAC) and Data link
A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________- Source node’s physical address
- Layer 2 destination address
- Layer 3 destination address
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
Local Talk is a LAN technology that employs -------------
The Fast Ethernet hardware operates at a rate of --------
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
Computer networks are often called -------------- because they use packet technology.
------ Program sends a message to a remote computer and reports whether the computer responds.
In Point-to-Point topology there are two topologies.
A network uses a ------arranges for computers to be connected in a closed loop.
An interface for thin Ethernet must have an ____________ connector, and must generate signals according to the_____________ specification.Find the class of the address.
10100111 11011011 10001011 01101111A
B
E
C
On of the design goals for unicast route propagation is __________.consistencyinconsistencystability dynamic addressing
Propagation multicast routing information differs dramatically from unicast route propagation?
True
False
The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.
no
many
In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.
Anycast
Unicast
Multicast
Non of the given
Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
Unicast
Anycast
Multicast
Non of the given
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
True
False
The time for acknowledgement to arrival of packet depends on.
Distance to destination and Current traffic conditions
Current traffic conditions
Distance to destination
non of these
Cost, effort, risks, and resources are the factors included in--------
Estimation
Testing
Development
Maintenance
There are _______ possibilities to detect the destination using Trace-route
1
2
3
None of the given
_______ is used for single destination computer.
Multicast
Broadcast
unicast
none of the given
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
16-bit
48-bit
64-bit
128-bit
Which is not the type of error messages defined by ICMP.
Source quench
Time exceeded
Destination unreachable
none of the given
End to End delivery Service of IP datagram is _____
Connection oriented
Connectionless
both a and b
none of the given
________ is a type of address used for collection of computers with same prefix.
Cluster
unicast
Multicast
none of the given
IPv6 ______________ is responsible for fragmentation. Routers simply drop datagram’s larger than network
Destination
Intermediate routers
Source
Medium
_______ Source is responsible for fragmentation.
IPV4
IPV6
________ message is sent in response to incoming datagrams with problems.
TCP/IP
IGMP
ICMP
none of the given
________ field is used to identify a specific path through the network
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction & operating system independent are the characteristics of ___________________
TCP
UDP
IP
None of the given
The process of using a routing table to select a next hop for a given datagram is called __________.
Encapsulation
Reassembling
Routing or forwarding
None of the given
A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called __________
Distance Vector Multicast Routing Protocol (DVMRP)
Core Based Tree (CBT)
Protocol Independent Multicast_Sparse Mode (PIM-SM)
Protocol Independent Multicast_Dense Mode (PIM-DM)
Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.
postfix, Infix
non of these
Infix, prefix
prefix, suffix
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________
None of the given
TCP
UDP
IP
_____ Protocol provides error reporting mechanism.
IGMP
SNMP
ICMP
none of the given
________ encapsulates IP datagram as data area in hardware frame.
Network Interface Layer
Datalink Layer
Network Layer
None of the given
TTL stands for __________
Time to Learn
Time to Leave
Time to Live
none of the given
______ layer Provides reliable delivery of datagram.
Network
Transport
Datalink
none of the given
Which protocol is used to test different tools.
ICMP
IGMP
TCP/IP
none of the given
Routers use _______ to forward datagrams along prearranged path.
Traffic class
Flow label
Destination address
none of the given
NEXT HEADER field in the base header defines type of header it appears at the end of fixed-size base header.
TRUE
FALSE
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.
Least
Maximum
Fragment
Frame
Postfix defines how much of address used to identify network.
TRUE
FALSE
______ contains all information needed to deliver datagram to the destination.
Header
The Source can configure outgoing datagram’s to avoid _________
Segmentation
Defragmentation
Fragmentation
None of the given
The Current version of IP-Version 4 is _____ old
18 years
20 years
22 years
none of given
The Header format of IPv6 is entirely different.
TRUE
FALSE
_______ shows senders preference for low latency, high Reliability.
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
The Network Layer Protocol ICMP stands for____________
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given
IPV6 address consists of ________
32 Bits
64 Bits
128 Bits
none of the given
_______ is a technique used to Limit datagram size to small MTU of any network
Segmentation
Fragmentation
Encapsulation
none of the given
ICMP message transport is acted upon by getting ICMP _________ in IP.
De-encapsulated
Encapsulated
Segmented
none of the given
IETF stands for _____________
Internet Engineering Task Force
Internal Efficient Task Force
Internet Engineering Technical Force
none of the given
Which of the following protocols provide the routing information at the autonomous system level?
BGP
OSPF
RIP
OSPF and RIP
A one-to-many communication between a source and a specific group of hosts is classified as a_______ communication.
Unicast
Multicast
Broadcast
Unicast & Multicast
_______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted.
RIP
OSPF
BGP
None of the given
In TCP when a computer sends a segment, the__________ and _______ fields refer to incoming data.
ACKNOWLEGE NUMBER, WINDOW
SEQUENCE NUMBER, WINDOW
ACKNOWLGEGE NUMBER, SEQUENCE NUMBER
None of the given
_________ is used to attach two autonomous systems.
BGP
IGP
EGP
none of the given
Routing inserts or changes values in _______
MAC address
routing table
both (a) and (b)
None of the given
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
True
False
Each autonomous system used to communicate among autonomous systems by chooses an IGP.
True
False
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
True
False
The computer uses _________ to inform Local router about the last application when it leaves.
ICMP
IGMP
SNMP
None of the given
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
96
100
120
none of the given
For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.
Efficiency
Security
Accuracy
Anomalies
Class A mask is 255.0.0.0 which is used for ______
Unicasting
Multicasting
Subnetting
All of the given
When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.
True
False Which one of these is not a main feature of connectionless service:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.