________ of TCP/IP layering model, corresponds to basic network hardware.
- · Network Interface Layer
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
- · Network Interface Layer
________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.
____________ uses distance vector approach to define routing
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
- · Configuration-and -Tunneling
Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source address
Protocol addresses are abstractions provided by ___________.
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.
In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.
To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
------------- was especially concerned about the lack of high powered computers.
Missing eot indicates sending computer crashed in frame format.
The -------------term refers to the general concept of a small block of data.
CRC can detect more errors than a simple checksum.
The network that uses a -------------, usually consist of a single long cable to which computer attach.
LAN that use ATM technology have a -------------
A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame.
--------------- has a jitter zero
- · Virtual Private Network
The network with Throughput T and Delay D has a total --------------- bits in transit at a time.
One repeater ---------------, two repeaters --------------- the maximum cable length limitation.
End-to-end delivery service is connection oriented.
A single networking technology is best for all needs.
Twice NAT allows a site to run servers.
________ device is used for multicasting.
___________ does not depend on any particular unicast routing protocol.
A routing table contains_______
- · The destination network ID
- · The hop count to reach the network
- · The router ID of the next hop
_______ can be used to propagate information about remote networks.
________ protocol is designed to use within an organization.
NAPT stands for ________________
- · Network Address and Protocol Translation
- · Network Address and Port Translation
- · Network Address and Packet Translation
In dynamic routing, the routing table is initialized when system boots.
OSPF includes ________ address mask with each address.
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
_________ uses window mechanism to control the flow of data.
TCP uses _______ mechanism to control the flow of data.
IGPs stand for _________
- · Internal Gateway Protocols
- · Interior Gateway Protocols
- · Intermediate Gateway Protocols
________ protocol uses distance vector algorithm.
__________measures distance in network hops, where each network between the source and destination counts as single hop.
Network Address Translation (NAT) requires device to perform packet translation.
We use the term _______ to refer to a measure of the path that routing software use when choosing a route.
Which of the following is a correct representation of the IPv6?
Part of the 3-way handshake used to create a connection, requires each end to generate a random _____ sequence number.
Reconstruction of original datagram is called reassembly.
Reliability is the responsibility of the ______ layer.
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
- · Configuration-and -Tunneling
In Direct point to point communication adding the Nth computer requires------------ new connections.
The number of connections needed for N computer in direct point to point communication is equal to:
Hardware that calculates a CRC uses two simple components.
- · Shift register and XOR unit
- · Shift register and AND unit
The Gigabit Ethernet hardware operates at a rate of --------
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
- · Distance vector algorithm
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
- · Connectionless service paradigm
- · Connection-oriented service paradigm
- · Both Connectionless and Connection-oriented service paradigm
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.
___________ places the boundary between the first and second octets
___________ places the boundary between the second and third octets.
___________ places the boundary between the third and fourth octets.
________ field of header indicates whether a datagram is a fragment or a complete datagram.
______ provides connectionless service.
UDP and TCP are both_________ layer protocols
________identifies which application program on receiving computer should receive the data
Logical address
________ identifies the application program that sent the data.
The Border Gateway Protocol (BGP) uses_________ for all communication
Which of the following protocols allows the sender and receiver to enforce polices.
ICMP message transport is acted upon by getting ICMP encrypted in IP.
These ICMP message transport is acted upon ________ as frames on ______
Address mask defines how many bits of address are in suffix?
A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
Find the class of the address:
11110011 10011011 11111011 00001111
- · B
_________ is used to attach two autonomous systems.
Select correct option:
BGPIGP
EGP
none of the given
Question # 2 of 20 Due to revolutionalization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given Scale is also dramatically changed. Size from a few tens to a few tens of millions
of computers has been revolutionized. Speed has increased from 56Kbps to 1Gbps. Also
there is an increased frame size in hardware
Question # 3 of 20
Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Select correct option:
True
FalseCOMPUTING THE CLASS OF AN ADDRESS: Whenever it handles a packet, IP software needs to separate the destination
address into a prefix and suffix.
Question # 4 of 20
TTL stands for __________
Select correct option:
Time to Learn
Time to Leave
Time to Livenone of the given
Question # 5 of 20
IGPs stand for _________
Select correct option:
Internal Gateway Protocols
Interior Gateway ProtocolsIntermediate Gateway Protocols
None of the given Question # 6 of 20
_____________identifies which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination PortNone of the given
Field Destination Port identifies which application program on receiving computer should receive the data. While field source port identifies the application programs that sent the data. Question # 7 of 20
__________________encapsulates IP datagram as data area in hardware frame.
Select correct option:
Network Interface LayerDatalink Layer
Network Layer
None of the givenThe network interface layer encapsulates an entire datagram in the data area of a hardware frame
Question # 8 of 20
Class A mask is 255.0.0.0 which is used for ________________
Select correct option:
Unicasting
Multicasting
SubnettingAll of the given
class A mask is 255.0.0.0 which is used for subnetting.
Question # 9 of 20
NAT is not useful at a residence with Cable Modem or DSL connectivity.
Select correct option:
True
False
Question # 10 of 20
Autonomous System chooses a routing protocol to exchange routing information which is passed before being summarized to another group.
Select correct option:
TrueFalse
Question # 11 of 20
______ layer Provides reliable delivery of datagram.
Select correct option:
Network
TransportDatalink
none of the given
Transport layer provides reliable delivery. Network layer – IP – can detect and
report errors without actually fixing them. It focuses on datagram delivery. Application
layer is not interested in differentiating among delivery problems at intermediate routers
Question # 12 of 20
The process of using a routing table to select a next hop for a given datagram is called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwardingNone of the givenThe process of using a routing table to select a next hop for a given datagram is called routing or forwarding. Question # 13 of 20
The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False
The process of learning the path MTU is known as path MTU discovery.
Question # 14 of 20
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ________ possible sizes.
Select correct option:
three
two
four
five
Three
As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose one of
three possible sizes. Many addresses were unused.
Two new mechanisms were invented to overcome the limitations, which are as
follows:
• Subnet addressing
• Classless addressing
Question # 15 of 20
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
Question # 16 of 20
EGP stands for _________
Select correct option:
Extension Gateway Protocol
Exterior Gateway ProtocolExplicit Gateway Protocol
none of the given
Question # 17 of 20
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
TrueFalse
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string. Hashing is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value. It is also used in many encryption algorithms. Question # 18 of 20
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Select correct option:
16-bit
48-bit64-bit
128-bit Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a 48-bit Ethernet address
Question # 19 of 20
Reliability is not the responsibility of the Transport layer.
Select correct option:
True
False
Reliability is the responsibility of the Transport layer. In TCP/IP, TCP provides reliable transport service. Most Internet applications use TCP as no other protocol has proved to work better.
Question # 20 of 20
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96100
120
none of the given
IPv6 address with 96 leading zeros is interpreted to hold an IPv4 addressQuestion # 1 of 20
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:
True
False
Question # 2 of 20
TCP uses the term segment to refer to a ________.
Select correct option:
packet
messageboth (a) and (b)
None of the given
both a and b?
TCP uses single format for all messages. TCP uses the term segment to refer to a message. Each message sent from TCP on one machine to TCP on another machine uses this format including data and acknowledgement.
Question # 3 of 20
The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
TrueFalse
UDP has the following characteristics.
• It is an end-to-end protocol. It provides application-to-application communication.
• It provides connectionless service.
• It is a Message-Oriented protocol.
• It uses best-effort delivery service.
• It follows arbitrary interaction.
• It is operating system independent
Question # 4 of 20
______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
The FRAGMENT OFFSET field tells a receiver how to order fragments within a given datagram
Question # 5 of 20
IP datagram can contains ________ octets.
Select correct option:
0-65,535
1-65,5351-65,536
none of the given
Datagrams can have different sizes i.e.
Header area is usually fixed (20 octets) but can have options. Data area can contain
between 1 octet and 65.535 octets (216-1).
Usually, data area is much larger than header.
Question # 6 of 20
The amount of buffer space available at any time is called the window.
Select correct option:
TrueFalse
Question # 7 of 20
_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
IPv6 source (not intermediate routers) is responsible for fragmentation. Routers
simply drop datagrams larger than network MTU (Maximum Transmission Unit). So
source must fragment datagram to reach destination.
Question # 8 of 20
Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow labelDestination address
none of the given
Routers use flow label to forward datagrams along prearranged path
Question # 9 of 20
_______ protocol uses three way handshake to begin a connection.
Select correct option:
UDP
TCPIP
none of the given
Question # 10 of 20
Typical internet routing uses uses a combination of two metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count
Question # 14 of 20
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address TranslationNetwork Address Transformation
None of the given
Question # 15 of 20
The routers within an autonomous system use a _____________ to exchange routing information.
Select correct option:
Interior Gateway protocols(IGPs)Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
It is used among routers within autonomous system. The destinations lie within IGP.
Question # 17 of 20
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
TrueFalse
Question # 18 of 20
The Network Layer Protocol ICMP stands for____________
Select correct option:
Instant Control Message Protocol
Internet Control Message ProtocolInitial Control Message Protocol
None of the given
Question # 19 of 20
The Current version of IP-Version 4 is _____ old
Select correct option:
18 years
20 years22 years
none of given
Question # 20 of 20 ( Start time: 11:05:43 AM ) Total M - 1
TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False