Sie sind auf Seite 1von 50

CS 610 Solved (Correct) MCQS (References are given in Blue

Font)

The protocol address of the next hop must be _____________ to an equivalent hardware
address before a packet can be sent.
Encrypted
Decrypted
Translated
Non of these
A _____________ addressbindin! table is used for each physical network.
New
"imilar
Separate
#ld
$D% provides connectionoriented service.
True
False
T&% provides connection oriented reliable data streamin! service' whereas $D% provides
connectionless unreliable messa!in! service.
The $D% stands for__________.
$niversal Data!ram %rotocol
User Datagram Protocol
$nited Data!ram %rotocol
None of the !iven
(n )way handshake T&% requires to !enerate a random ________ sequence number.
)* bit
32 bit
)+ bit
none of the !iven
T&% stands for _______
Transport control protocol
Transmission control protocol
Terminal control protocol
None of the !iven
As the Internet gre! the original Classful addressing sche"e #eca"e a
li"itation$ %he I& address s'ace as #eing e(hausted #ecause all netor)s had to
choose one of three 'ossi#le si*es$
Select correct o'tion+
True
False
Question , - of .0 ( Start ti"e+ 06+--+0/ &M )
%otal M a r ) s+ 1
%ice 0A% allos a site to run servers$
Select correct o'tion+
True
False
&reli"inar1 version of I& as called 222222222$
Select correct o'tion+
I& 3 0e 4eneration (I&ng)
IP - Next Generation (IPng)
I& 3 0et 4eneration (I&ng)
0one of the given
As the Internet gre! the original Classful addressing sche"e #eca"e a
li"itation$ %he I& address s'ace as #eing e(hausted #ecause all netor)s had to
choose one of to 'ossi#le si*es$
Select correct o'tion+
%rue
False
222222222 uses indo "echanis" to control the flo of data$
Select correct o'tion+
I&
56&
TCP
none of the given
%C& uses indo "echanis" to control the flo of data$
%he Internet service 'roviders coordinate ith the Internet assigned nu"#er
authorit1 to o#tain their netor) nu"#ers$
Select correct o'tion+
True
False
7hich 'rotocol is used to test different tools$
Select correct o'tion+
ICMP
I4M&
%C&8I&
none of the given
$"(N, (&-% T# TE"T .EA&/A0(1(T23
(&-% can also be used to test different tools. An (nternet host A' is reachable from
another host 0' if data!ram4s can be delivered from A to 0. %in! pro!ram tests reach
ability. (t sends data!ram from 0 to A' that echoes back to 0. it uses (&-% echo request
and echo reply messa!es. (nternet layer includes code to reply to incomin! (&-%
echo request messa!es.
22222222 identifies the a''lication 'rogra" that sent the data$
Select correct o'tion+
6estination &ort
Source port
9ogical address
0one of the given
%he Source can configure outgoing datagra":s to avoid 222222222
Select correct o'tion+
Seg"entation
6efrag"entation
Fragmentation
0one of the given
5ra!mentation should be avoided. "ource can confi!ure out!oin! data!rams to avoid
fra!mentation. "ource determines path -T$ smallest network -T$ on path from
source to destination.
Question , 1; of .0 ( Start ti"e+ 06+</+1. &M )
%otal M a r ) s+ 1
%he ti"e for ac)noledge"ent to arrive de'ends on 2222222222
Select correct o'tion+
6istance to destination
Current traffic conditions
Both a and
0one of the given
The time for acknowled!ement to arrive depends on3
6 Distance to destination
6 &urrent traffic conditions
hich is not the t1'e of error "essages defined #1 ICM&$
Select correct o'tion+
Source =uench
%i"e e(ceeded
6estination unreacha#le
None o! the gi"en
>RR?R M>SSA4>S+
%hese are as follos+
@ Source =uench
@ %i"e e(ceeded
@ 6estination unreacha#le
@ Redirect
@ Frag"entation re=uired
_________ is used to attach two autonomous systems.
"elect correct option3
0,%
(,%
#GP
none of the !iven
Question # 2 of 20
Due to revolutionali7ation of (%89 the speed has increased from _______
"elect correct option3
:9kbps to :;<kbps
:;<kbps to ;!bps
$%&ps to 'gps
none of the !iven
"cale is also dramatically chan!ed. "i7e from a few tens to a few tens of millions
#f computers has been revolutioni7ed. "peed has increased from :9=bps to ;,bps. Also
There is an increased frame si7e in hardware
Question # 3 of 20
>henever it handles a packet' (% software needs to separate the destination address into a
prefix.
"elect correct option3
True
False
&#-%$T(N, T/E &1A"" #5 AN ADD.E""3
>henever it handles a packet' (% software needs to separate the destination
Address into a prefix and suffix.
Question # 4 of 20
TT1 stands for __________
"elect correct option3
Time to 1earn
Time to 1eave
Time to (i"e
none of the !iven
Question # 5 of 20
(,%s stand for _________
"elect correct option3
(nternal ,ateway %rotocols
Interior Gate)a* Protocols
(ntermediate ,ateway %rotocols
None of the !iven
Question # 6 of 20
_____________identifies which application pro!ram on receivin! computer should
receive the data
"elect correct option3
1o!ical address
"ource port
+estination Port
None of the !iven
5ield Destination %ort identifies which application pro!ram on receivin! computer should
receive the data. >hile field source port identifies the application pro!rams that sent the
data.
Question # 7 of 20
__________________encapsulates (% data!ram as data area in hardware frame.
"elect correct option3
Net)or& Inter!ace (a*er
Datalink 1ayer
Network 1ayer
None of the !iven
The network interface layer encapsulates an entire data!ram in the data area of a
hardware frame
vu7s.net
Question # of 20
&lass A mask is <::.*.*.* which is used for ________________
"elect correct option3
$nicastin!
-ulticastin!
Sunetting
All of the !iven
class A mask is <::.*.*.* which is used for subnettin!.
Question # ! of 20
NAT is not useful at a residence with &able -odem or D"1 connectivity.
"elect correct option3
True
"alse
Question # #0 of 20
Autonomous "ystem chooses a routin! protocol to exchan!e routin! information which is
passed before bein! summari7ed to another !roup.
"elect correct option3
True
5alse
Question # ## of 20
______ layer %rovides reliable delivery of data!ram.
"elect correct option3
Network
Transport
Datalink
none of the !iven
Transport layer provides reliable delivery. Network layer ? (% ? can detect and
report errors without actually fixin! them. (t focuses on data!ram delivery. Application
layer is not interested in differentiatin! amon! delivery problems at intermediate routers
Question # #2 of 20
The process of usin! a routin! table to select a next hop for a !iven data!ram is
called_________.
"elect correct option3
Encapsulation
.eassemblin!
,outing or !or)arding
None of the !iven
The process of usin! a routin! table to select a next hop for a !iven data!ram is called
routin! or forwardin!.
Question # #3 of 20
The process of learnin! the path -T$ is known as path -T$ discovery.
"elect correct option3
True
5alse
The process of learnin! the path -T$ is known as path -T$ discovery.
Question # #4 of 20
As the (nternet !rew' the ori!inal &lassful addressin! scheme became a limitation. The (%
address space was bein! exhausted because all networks had to choose one of ________
possible si7es.
"elect correct option3
three
two
four
five
T$ree
As the (nternet !rew' the ori!inal &lassful addressin! scheme became a limitation.
The (% address space was bein! exhausted because all networks had to choose one of
Three possible si7es. -any addresses were unused.
Two new mechanisms were invented to overcome the limitations' which are as
5ollows3
6 "ubnet addressin!
6 &lassless addressin!
Question # #5 of 20
End to End delivery "ervice of (% data!ram is _____
"elect correct option3
&onnection oriented
Connectionless
both a and b
none of the !iven
Question # #6 of 20
E,% stands for _________
"elect correct option3
Extension ,ateway %rotocol
#xterior Gate)a* Protocol
Explicit ,ateway %rotocol
none of the !iven
Question # #7 of 20
/ashin! is the transformation of a strin! of characters into a usually shorter fixedlen!th
value or a key that represents the ori!inal strin!.
"elect correct option3
True
5alse
/ashin! is the transformation of a strin! of characters into a usually shorter fixedlen!th
value or a key that represents the ori!inal strin!. /ashin! is used to index and retrieve
items in a database because it is faster to find the item usin! the shorter hashed key than
to find it usin! the ori!inal value. (t is also used in many encryption al!orithms.
Question # # of 20
Althou!h the A.% messa!e format is sufficiently !eneral to allow arbitrary protocol and
hardware addresses. A.% is almost always used to bind a )<bit (% address to a ____
Ethernet address.
"elect correct option3
;9bit
-.-it
9+bit
;<@bit
Althou!h the A.% messa!e format is sufficiently !eneral to allow arbitrary protocol and
hardware addresses. A.% is almost always used to bind a )<bit (% address to a +@bit
Ethernet address
Question # #! of 20
.eliability is not the responsibility of the Transport layer.
"elect correct option3
True
"alse
.eliability is the responsibility of the Transport layer. (n T&%A(%' T&% provides reliable
transport service. -ost (nternet applications use T&% as no other protocol has proved to
work better.
Question # 20 of 20
(%89 address with ______ leadin! 7eros is interpreted to hold an (%8+ address.
"elect correct option3
htt'+88vu*s$net8
!6
;**
;<*
none of the !iven
(%v9 address with B9 leadin! 7eros is interpreted to hold an (%v+ addressQuestion # # of
20
NAT software does not allow a %& to connect with the (nternet and act as a NAT device
at the same time.
"elect correct option3
True
"alse
Question # 2 of 20
T&% uses the term se!ment to refer to a ________.
"elect correct option3
packet
message
both CaD and CbD
None of the !iven
both a and bE
T&% uses sin!le format for all messa!es. T&% uses the term se!ment to refer to a
messa!e. Each messa!e sent from T&% on one machine to T&% on another machine uses
this format includin! data and acknowled!ement.
Question # 3 of 20
The $niversal Data!ram %rotocol is a messa!eoriented protocol.
"elect correct option3
True
5alse
$D% has the followin! characteristics.
6 (t is an endtoend protocol. (t provides applicationtoapplication communication.
6 (t provides connectionless service.
6 (t is a -essa!e#riented protocol.
6 (t uses besteffort delivery service.
6 (t follows arbitrary interaction.
6 (t is operatin! system independent
Question # 4 of 20
______________field tells the receiver how to order fra!ments within a !iven data!ram.
"elect correct option3
51A,"
51A,-ENT #55"ET
(DENT(5(&AT(#N
%one of t$e gi&en
The 5.A,-ENT #55"ET field tells a receiver how to order fra!ments within a !iven
data!ram
Question # 5 of 20
(% data!ram can contains ________ octets.
"elect correct option3
*9:':):
#'65(535
;9:':)9
none of the !iven
Data!rams can have different si7es i.e.
/eader area is usually fixed C<* octetsD but can have options. Data area can contain
between ; octet and 9:.:): octets C<;9;D.
$sually' data area is much lar!er than header.
Question # 6 of 20
The amount of buffer space available at any time is called the window.
"elect correct option3
True
5alse
Question # 7 of 20
_______ "ource is responsible for fra!mentation.
"elect correct option3
(%8+
)P*6
(%v9 source Cnot intermediate routersD is responsible for fra!mentation. .outers
simply drop data!rams lar!er than network -T$ C-aximum Transmission $nitD. "o
source must fra!ment data!ram to reach destination.
Question # of 20
.outers use _______ to forward data!rams alon! prearran!ed path.
"elect correct option3
Traffic class
"lo+ label
Destination address
none of the !iven
.outers use flow label to forward data!rams alon! prearran!ed path
Question # ! of 20
_______ protocol uses three way handshake to be!in a connection.
"elect correct option3
$D%
T,P
(%
none of the !iven
Question # #0 of 20
Typical internet routin! uses uses a combination of two metrics__________________.
"elect correct option3
routin! metrics
administrative cost and routin! metrics
hop cost
a-ministrati&e cost an- $op count
Question # #4 of 20
Network Address and %ort Translation CNA%TD is by far the most popular form of
_______
"elect correct option3
Network Address Transmission
%et+or. /--ress Translation
Network Address Transformation
None of the !iven
Question # #5 of 20
The routers within an autonomous system use a _____________ to exchan!e routin!
information.
"elect correct option3
)nterior 0ate+a1 protocols2)0Ps3
Exterior ,ateway protocol CE,%sD
0oth (nterior ,ateway protocolsC(,%sD and Exterior ,ateway protocol CE,%sD
None of the !iven
(t is used amon! routers within autonomous system. The destinations lie within (,%.
Question # #7 of 20
(nterior ,ateway %rotocols C(,%sD and Exterior ,ateway %rotocols CE,%sD two broad
classes of (nternet .outin! %rotocol.
"elect correct option3
True
5alse
Question # # of 20
The Network 1ayer %rotocol (&-% stands for____________
"elect correct option3
(nstant &ontrol -essa!e %rotocol
)nternet ,ontrol 4essage Protocol
(nitial &ontrol -essa!e %rotocol
None of the !iven
Question # #! of 20
The &urrent version of (%8ersion + is _____ old
"elect correct option3
;@ years
20 1ears
<< years
none of !iven
T&% is a connectionless and reliable transport protocol.
"elect correct option3
True
"alse
/T4 $ea-er is about t$e________________of t$e cell5
"elect correct option3
;:F
#06 page 66
<*F
:F
7itter is significance for ______________
"elect correct option3
8oice
8ideo
Data
/l of abo&e page 66
8o+ man1 met$o-s e9ist for buil-ing routing table:
"elect correct option
;
2 pages
) +
T$e process of for+ar-ing t$e pac.ets of information is calle- routing
T$e routing table contains information about t$e _____________ imme-iatel1
aroun- it
"elect correct option3
Topolo!y of the network
Destination page 5
0oth of the above
None of the above
/s1nc$ronous Transfer 4o-e uses t$e concept of ______________
"elect correct option3
&onnectionless networkin!
,onnection'oriente- net+or.ing page 66
;$ic$ of t$e follo+ing statement is true regar-ing /T4:
"elect correct option3
(t is a sin!le technolo!y for voice' video and data
(t has low Gitter and hi!h capacity
(t uses fixed si7ed small cells. +@ octetHs data
/ll of t$e abo&e page 65
/ ____ can for+ar- or bloc. messages base- on t$e information in t$e message
itself
"elect correct option
-essa!e di!est
%roxy firewall
Pac.et filter fire+all not foun- in $an-outs
%rivate =ey
2ou can use an (% packet filter firewall to create a set of rules that either discards or
accepts traffic over a network connection.C"ource to confirm
http3AApublib.boulder.ibm.comAinfocenterApowersysAv)r;m:Aindex.GspE
topicIAipha:Apacketfilterfirewall.htmD
Transmission me-ia are usuall1 categori<e- as
"elect correct option3
0ui-e- or ungui-e-
5ixed or unfixed
Determinate or indeterminate
-etallic or nonmetallic
;$ic$ of t$e follo+ing is not a gui-e- me-ium:
"elect correct option3
Twistedpair cable
5iberoptic cable
/tmosp$ere
&oaxial &able
;$ic$ multiple9ing tec$ni=ue transmits -igital signals:
"elect correct option3
>D-
5D-
TD4
None of the above
/ll -estinations on same s+itc$ $a&e same _________
"elect correct option3
.outer
(nformation
%e9t 8op page 5
None of the above
;$ic$ of t$e follo+ing statement is true regar-ing Distance'*ector >outing:
"elect correct option3
(t is very simple to implement.
Pac.et s+itc$ up-ates its o+n routing table first5 Page 64
(t is used in .(%.
All of the above
/n e9terior s+itc$ is one +it$ +$ic$ _______________
"elect correct option3
,omputers are attac$e- page 5!
No computer is attached
/ubs are attached externally None of the above
"rame rela1 is _______________________
"elect correct option3
,onnection oriente- ser&ice page 64
&onnectionless service (t is typically ran!es from :-bps to ;***-bps. None of the
above
/n interior s+itc$ is one +it$ +$ic$ ___________
"elect correct option3
&omputers are attached
%o computer is attac$e- page 5!
&omputers are attached internally
None of the above
;$ic$ of t$e follo+ing is not a benefit of source in-epen-ence:
"elect correct option3
(t allows fast and efficient routin!.
Pac.et s+itc$ -o not nee- to $a&e complete information about all -estinations
Network functions even if topolo!y chan!es
None of the above

;$ic$ of t$e follo+ing statement regar-ing /T4 is true:
"elect correct option3
&onnections in AT- are called virtual channels
The 8& is identified by a <+bit value formed from the 8%(
?ot$ 2a3 an- 2b3
None of the above
/T4 $ea-er is about t$e '''''''''' of t$e cell5
"elect correct option3
;:F
#06
<*F
:F

8o+ man1 met$o-s e9ist for computing routing table:
"elect correct option3
:
+
)
2
;$ic$ of t$e follo+ing statement is true regar-ing Distance'&ector routing:
"elect correct option3
(t is very simple to implement.
Pac.et s+itc$ up-ates its o+n routing table first5
(t is used in .(%.
All of the above
;$ic$ one of t$e follo+ing is a propert1 of static routing:
"elect correct option3
(t is inflexible
(t is done at boot time
(t has low network overload
/ll of t$e abo&e
/s1nc$ronous Transfer 4o-e uses t$e concept of ''''''''''''''''''''5
"elect correct option3
&onnectionless networkin!
,onnection'oriente- net+or.ing
;$ic$ multiple9ing tec$ni=ue s$ifts eac$ signal to a -ifferent carrier fre=uenc1:
"elect correct option3
TD-
"D4
0oth a and b
None of the above
/n interior s+itc$ is one +it$ +$ic$ @@@@@@@5
"elect correct option3
&omputers are attached
%o computer is attac$e-
&omputers are attached internally
None of the above
A/% net+or.s can not be e9ten-e- to &er1 large net+or.s because of t$e limitations
of55555555555
"elect correct option3
Area
Distance
.outers
Technolo!y
;$ic$ of t$e follo+ing statement is +rong regar-ing /T4:
"elect correct option3
(t is a sin!le technolo!y for voice' video and data
(t has low Gitter and hi!h capacity.
(t uses fixed si7e' small cells' and +@ octet4s data
%one of t$e abo&e
;$ic$ one of t$e follo+ing is t$e responsibilit1 of DBi.straC algorit$m:
"elect correct option3
To compute t$e s$ortest pat$ bet+een t+o no-es
To extract next hop information from path information
To insert next hop information into routin! table
All of the above
;$ic$ one of t$e follo+ing is a propert1 of -1namic routing:
"elect correct option3
(t is inflexible
(t has low network overload
)t can +or. aroun- net+or. failure
All of the above
;$ic$ of t$e follo+ing statement is true regar-ing /T4:
"elect correct option3
AT- is a sin!le technolo!y that is desi!ned to meet the !oals of both 1ANs and >ANs.
AT- uses the concept of connectionoriented networkin!.
?ot$ 2a3 an- 2b3
None of the above
Dource in-epen-ence is a p$enomena in +$ic$ ne9t $op to -estination -oes not
-epen- on t$e JJJJJJJ
"elect correct option3
Dource of pac.et
Destination of packet
No of hops
"ource of protocol
)f a computer on t$e net+or. s$ares resources for ot$ers to use( it is calle- ____
a5 Der&er
b5 ,lient
c5 4ainframe
/ns+erE a
25 Terminators are use- in ______ topolog15
a5 ?us
b5 Dtar
/ns+erE a
35 )n _____ topolog1( if a computerCs net+or. cable is bro.en( +$ole net+or. goes
-o+n5
a5 ?us
b5 Dtar
/ns+erE a
45 "or large net+or.s( _______ topolog1 is use-5
a5 ?us
b5 Dtar
c5 >ing
/ns+erE b
55 )DF stan-s for
a5 )nternational Dtan-ar- Frgani<ation
b5 )nternational Dtu-ent Frgani<ation
c5 )ntegrate- Der&ices Frgani<ation
/ns+erE a
65 )DF FD) mo-el is use- in
a5 Dtan- alone P,
b5 %et+or. en&ironment
/ns+erE b
75 %et+or. cable lies on _____ la1er
a5 /pplication
b5 %et+or.
c5 P$1sical
/ns+erE c
5 ____ Aa1er -eci-es +$ic$ p$1sical pat$+a1 t$e -ata s$oul- ta.e5
a5 /pplication
b5 %et+or.
c5 P$1sical
/ns+erE c
!5 )DD% is an e9ample of ______ net+or.
a5 ,ircuit s+itc$e-
b5 Pac.et s+itc$e-
/ns+erE a
#05 G525 is an e9ample of ______ net+or.
a5 ,ircuit s+itc$e-
b5 Pac.et s+itc$e-
/ns+erE b
##5 _____________ allo+s A/% users to s$are computer programs an- -ata5
a5 ,ommunication ser&er
b5 Print ser&er
c5 "ile ser&er
/ns+erE c
#25 Print ser&er uses ________ +$ic$ is a buffer t$at $ol-s -ata before it is sen- to
t$e printer5
a5 Queue
b5 Dpool
c5 %o-e
/ns+erE b
#35 / stan-alone program t$at $as been mo-ifie- to +or. on a A/% b1 inclu-ing
concurrenc1 controls suc$ as file an- recor- loc.ing is an e9ample of____
a A/% intrinsic soft+are
b5 A/% a+are soft+are
c5 0roup+are
-5 A/% ignorant soft+are
/ns+erE a
#45 T$e ______ portion of A/% management soft+are restricts access( recor-s user
acti&ities an- au-it -ata etc5
a5 ,onfiguration management
b5 Decurit1 management
c5 Performance management
/ns+er E b
#55 ;$at is t$e ma9 cable lengt$ of DTP:
a5 #00 ft
b5 200 ft
c5 #00 m
-5 200 m
/ns+er E -
#65 ;$at is t$e ma9 -ata capacit1 of DTP:
a5 #0 mbps
b5 #00 mbps
c5 #000 mbps
-5 #0000 mbps
/ns+erE b
#75 ;$ic$ connector DTP uses:
a5 ?%,
b5 >7'##
c5 >7'45
-5 >7'6!
/ns+er E c
#5 ;$at is t$e central -e&ice in star topolog1:
a5 DTP ser&er
b5 8ubHs+itc$
c5 PD,
-5 >outer
/ns+er E b
#!5 ;$at is ma9 -ata capacit1 for optical fiber cable:
a5 #0 mbps
b5 #00 mbps
c5 #000 mbps
-5 #0000 mbps
/ns+er E c
(n Direct point to point communication addin! the Nth computer requires new
connections.
None of the !iven
N<
N;
CN< ?NDA<
disadvantage In Direct point to point communication is that adding a new computer to
the network requires N-1 new connections .(P# 23
Question %oE 2 2 4 a r . sE # 3 $ttpEHH&u<s5net
(n %ointto%oint topolo!y there are two topolo!ies.
Tree and .in!
"tar and .in!
"tar and Tree
None of the !iven
%#(NTT#%#(NT3
www.vu7s.netA
htt'+88grou's$google$co"8grou'8vuAs
(n Point-to-Point topolo!y there are two topolo!ies.
;D "TA. topolo!y
<D T.EE topolo!y
Question %oE 3 2 4 a r . sE # 3 $ttpEHH&u<s5net
)n '''''''''''''( net+or. occupies t$e smaller area li.e a room a floor or a buil-ing
1AN
>AN
-AN
None of the !iven
In !"N network occupies the sma##er area #ike a room a $#oor or a %ui#ding.(P# &
8ar-+are t$at calculates a ,>, uses t+o simple components.
AND unit and K#. unit
"hift re!ister and K#. unit
"hift re!ister and AND unit
none of the !iven
&.& uses Gust two hardware components3
6 "hift re!ister
6 Exclusive #. C K#. unit D .(P# 2'
Question %oE 6 2 4 a r . sE # 3 $ttpEHH&u<s5net
The ,i!abit Ethernet hardware operates at a rate of
;* -bps
;** -bps
L ;*** -bps
L None of the !iven
(iga%it )thernet that operates at 1 (%ps (1''' *%ps over $i%er optics and twisted pair
)thernet ca%#es.
$ttpEHH&u<s5net
formall1 name- __________ informall1 .no+n as t$e t+iste- pair It$ernet or TP
It$ernet5
L ;* 0ase <
L ;* 0ase :
L ;* 0ase T
L none of the !iven
1'+",)--.
-his is another standard o$ wiring scheme. It is common#/ ca##ed 1'+ase--0 -wisted Pair
or -P )thernet. (P# &3
5net
/n interface for t$in It$ernet must $a&e an ____________ connector ( an- must
generate signals accor-ing to t$e_____________ specification.
L .M+:' ;* 0ase T
L .M+:' ;* 0ase :
L 0N&' ;* 0ase <
L 0N&' ;* 0ase T
EHH&u<s5net
/ s1stem +it$ re-un-ant bri-ges mig$t $a&e a problem +it$_______ in t$e s1stem.
L 1oop
L 5ilters
L "pannin! Trees
L All !iven choices
$ttpEHH&u<s5net
________ computes s$ortest pat$s in a grap$ b1 using +eig$ts on e-ges as a
measure of -istance5
L ,reedy al!orithm
L Distance vector al!orithm
L DiGksta4s al!orithm
L none of the !iven
D1ikstra2s a#gorithm can accommodate weights on edges in graph. -he shortest
Path is then the path with #owest tota# weight (sum o$ the weight with a## edges. It shou#d
%e noted that the shortest path is not necessari#/ with $ewest edges (or hops.
?asic A/% tec$nologies suc$ as It$ernet( To.en >ing( an- "DD) use a _____5
L &onnectionless service paradi!m
L &onnectionoriented service paradi!m
L 0oth &onnectionless and &onnectionoriented service paradi!m
L None of the !iven
_______ protocols of T,PH)P la1ering mo-el specif1 $o+ to ensure reliable transfer5
L %hysical 1ayer
L Network (nterface 1ayer
L (nternet 1ayer
L Transport 1ayer
!"3)4 &. ensure re#ia%#e trans$er #a/er & in -5P #a/ering mode# is transport #a/er.
EHH&u<s5net
/n )nternet /--ress 2)P a--ress3 is a uni=ue __________ binar1 number assigne-
to a $ost an- use- for all communication +it$ $ost
L +@bit
L )<bit
L <+bit
L None of the !iven
"n Internet address (IP address is a unique 32-%it %inar/ num%er assigned to a
6ost and used $or a## communication with the host
t$e a--ress __________ i-entifies t$e p$1sical net+or. to +$ic$ t$e computer is
attac$e-( +$ile t$e _______ i-entifies an in-i&i-ual computer on t$at net+or.5
L %refix' suffix
L suffix' prefix
L suffix' suffix
L none of the !iven
PREFIX:
It identi$ies the ph/sica# network to which the computers are attached.
SUFFIX:
It identi$ies an individua# computer on the network.
___________ places t$e boun-ar1 bet+een t$e first an- secon- octets
L &lass A
L &lass 0
L &lass &
L &lass D
&lass A places the boundary between the first and second octets. &lass 0 places the
boundary between the second and third octets' and class & places the boundary between
the third and fourth octets.
___________ places t$e boun-ar1 bet+een t$e t$ir- an- fourt$ octets5
L &lass A
L &lass 0
L &lass &
L &lass D
&lass A places the boundary between the first and second octets. &lass 0 places the
boundary between the second and third octets' and class & places the boundary between
the third and fourth octets.
$ttpEHH&u<s5net
________ fiel- of $ea-er in-icates +$et$er a -atagram is a fragment or a complete
-atagram.
L 51A,"
L 51A,-ENT #55"ET
L (DENT(5(&AT(#N
L None of the !iven
74"(*)N-"-I8N.
(% uses fra!mentation i.e. data!ram4s can be split into pieces to fit in network with small
-T$. Each fra!ment is an independent data!ram. (t includes all header fields. 0it in
header indicates that the data!ram is a fra!ment
tpEHH&u<s5net
______ pro&i-es connectionless ser&ice5
L T&%
L $D%
L (%
L none of the !iven
9DP has the $o##owing characteristics.
: It is an end-to-end protoco#. It provides app#ication-to-app#ication communication.
: It provides connection#ess service.
: It is a *essage-8riented protoco#.
: It uses %est-e$$ort de#iver/ service.
: It $o##ows ar%itrar/ interaction.
: It is operating s/stem independent
EHH&u<s5net
UDP an- T,P are bot$_________ la1er protocols
L %hysical
L Data link
L Network
L Transport
,onnection'oriente- ser&ice( Point'to'point( ,omplete reliabilit1( "ull'-uple9
communication( Dtream interface( >eliable connection start'up an- 0raceful
connection s$ut-o+n are t$e ser&ices pro&i-e- b1__________
L (%
L None of the !iven
L T&%
L $D%
"E.8(&E %.#8(DED 02 T&%3
5ollowin! are the services provided by T&%3
6 &onnectionoriented service
6 %ointtopoint
6 &omplete reliability
6 5ullduplex communication
6 "tream interface
6 .eliable connection startup
6 ,raceful connection shutdown
_______ protocols of T,PH)P la1ering mo-el specif1 $o+ to ensure reliable transfer5
L %hysical 1ayer
L Network (nterface 1ayer
L (nternet 1ayer
L Transport 1ayer
!"3)4 &. ensure re#ia%#e trans$er #a/er & in -5P #a/ering mode# is transport #a/er
________i-entifies +$ic$ application program on recei&ing computer s$oul- recei&e
t$e -ata
L 1o!ical address
L "ource port
L Destination %ort
L None of the !iven
7ie#d Destination Port identi$ies which app#ication program on receiving computer
shou#d receive the data $ie#d source port identi$ies the app#ication programs that sent the
data.
Question %oE 23 2 4 a r . sE # 3 $ttpEHH&u<s5net
________ identifies the application pro!ram that sent the data.
L Destination %ort
L "ource port
L 1o!ical address
L None of the !iven
7ie#d Destination Port identi$ies which app#ication program on receiving computer
shou#d receive the data ;hi#e $ie#d source port identi$ies the app#ication programs that
sent the data. (4e$erence $rom )-%ooks
T$e ?or-er 0ate+a1 Protocol 2?0P3 uses_________ for all communication
L $D%
L T&%
L 0oth $D% and T&%
L none of the !iven
0#.DE. ,ATE>A2 %.#T#&#13
(t is most popular Exterior ,ateway %rotocol in (nternet. (t has followin! characteristics3
N(t provides routin! amon! autonomous systems CE,%D.
N(t provides policies to control routes advertised.
N(t uses reliable transport CT&%D.
EHH&u<s5net
____________ uses -istance &ector approac$ to -efine routing
L 0,%
L #"%5
L .(%
L None of the !iven
.#$T(N, (N5#.-AT(#N %.#T#&#1 C.(%D3
(t has the followin! characteristics3
N(t is used for routin! within an autonomous system C(,%D.
N/op &ount -etric3 .(% measures distance in network hops' where each network
between the source and destination counts as a sin!le hop.
N(t uses $D% for all messa!e transmissions.
N.(% is used over 1AN. 8ersion ; of .(% uses hardware broadcast and version < allows
Delivery via multicast.
N(t can be used to advertise default route propa!ation. An or!ani7ation can use .(% to
(nstall a default route in each router.
N(t uses distance vector al!orithm.
EHH&u<s5net
),4P message transport is acte- upon b1 getting ),4P encr1pte- in )P5
L True
L 5alse
I5*P message transport is acted upon %/ getting I5*P encapsu#ated in IP (P# 11<
Protocol a--resses are abstractions pro&i-e- b1 ___________5
L hardware
L software
L operatin! system
L internet
Protoco# addresses are a%stractions provided %/ so$tware (re$erence
T$ese pac.ets ser&e same purpose on ________ as frames on ______
L (ntranet' 1AN
L (nternet' >AN
L (ntranet' >AN
L (nternet' 1AN
=I4-9"! P"5>)-,.
-hese packets serve same purpose in Internet as $rames on !"N
/--ress mas. -efines $o+ man1 bits of a--ress are in suffi9:
L True
L 5alse
Address mask defines how many bits of address are in prefix. %refix defines how much of
address used to identify network.
$ttpEHH&u<s5net
a single net+or.ing tec$nolog1 is best for all nee-s5
L True
L 5alse
-here is no sing#e networking techno#og/ that is %est $or a## needs
$ttpEHH&u<s5net
/ computer attac$e- to a gi&en net+or. can onl1 communicate +it$ ot$er
computers attac$e- to t$e same net+or.5 )s t$is a problem +it$ multiple net+or.s:
L True
L 5alse
the chief problems with multiple networks are as follows3
6 A computer attached to a !iven network can only communicate with other
&omputers attached to the same network.
EHH&u<s5net
T$e term self'i-entif1ing is use- for ,lassful )P a--resses because t$e class of t$e
a--ress can be compute- from t$e a--ress__________5
L (tself
L prefix
L suffix
L mask
5#ass$u# IP addresses are se#$-identi$/ing %ecause the c#ass o$ the address can %e
computed $rom the address itse#$
"in- t$e class of t$e a--ress5
#0#00### ##0##0## #000#0## 0##0####
L A
L 0
L E
L &
.eference table handouts % O @P
&u<s5net
"in- t$e class of t$e a--ressE
####00## #00##0## #####0## 0000####
L A
L &
L E
L 0
.eference table handouts % O @P
EHH&u<s5net
)n +$ic$ met$o- of /--ress >esolution Protocol t$e protocol a--ress is -etermine-
b1 $ar-+are a--ress:
;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for
Data I9c$ange:
L T
L D
L &
L T' &
.eference table handouts % O BP
EHH&u<s5net
;$ic$ met$o- of /--ress >esolution Protocol re=uires $ar-+are broa-cast:
;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for
Data I9c$ange:
L D
L T
L &
L T' D
.eference table handouts % O BP
EHH&u<s5net
;$ic$ met$o- of /--ress >esolution Protocol resolution +it$ minimum -ela1:
;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for
Data I9c$ange:
L T' D
L c
L T
L T' &
.eference table handouts % O BP
)n +$ic$ met$o- of /--ress >esolution Protocol t$e implimentation is more
-ifficult:
;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for
Data I9c$ange:
L T' &
L T
L &
L D
.eference table handouts % O BPEHH&u<s5net
Fn of t$e -esign goals for unicast route propagation is __________5
L &onsistency
L inconsistency
L stability
L dynamic addressin!
8n o$ the design goa#s $or unicast route propagation is sta%i#it/?continua# changes in
route are undesira%#e %ecause the/ #ead to higher 1itter and datagram arriving out o$
order. -hus0 once a unicast routing protoco# $inds a shortest path0 it usua##/ retains the
route unti# a $ai#ure makes the path unusa%#e. (4e$erence $rom )-%ook
&u<s5net
Propagation multicast routing information -iffers -ramaticall1 from unicast route
propagation:
L True
L 5alse
Propagating multicast routing information differs dramatically from unicast
route propagation. -he di$$erence arises %ecause internet mu#ticast a##ows d/namic
group mem%ership and autonomous senders
$ttpEHH&u<s5net
To sa&e traffic( an I0P -oes not summari<e routing information from t$e
autonomous s1stem before passing it to anot$er autonomous s1stem5
L True
L 5alse
-o save tra$$ic0 an )(P summari@e routing in$ormation $rom the autonomous s/stem
%e$ore passing it to another autonomous s/stem. *ore important an )(P imp#ements
po#ic/ constraint that a##ows a s/stem manager to determine eAact#/ what in$ormation is
re#eased outside the organi@ation. C4e$erence $rom )-%ookD
EHH&u<s5net
)n )P&6 t$e t1pe of a--ress use- for collection of computers +it$ same prefi95 /re
.no+n as_________5
L Anycast
L $nicast
L -ulticast
L Non of the !iven
7o##owing are specia# t/pes o$ addresses0 IPvB uses.
Unicast: It is used $or sing#e destination computer.
Multicast: It is used $or mu#tip#e destinationsC possi%#/ not at same site.
Cluster: -his t/pe o$ address is used $or co##ection o$ computers with same pre$iA0
Datagram is de#ivered to one out o$ c#uster.
Dpecial t1pes of a--resses in )P&6 use- for multiple -estinationsK possibl1 not same
site5 /re .no+n as________
L $nicast
L Anycast
L -ulticast
L none of the !iven
5ollowin! are special types of addresses' (%v9 uses3
UnicastE (t is used for sin!le destination computer.
4ulticastE (t is used for multiple destinationsQ possibly not at same site.
,lusterE This type of address is used for collection of computers with same prefix'
Data!ram is delivered to one out of cluster.
EHH&u<s5net
UDP offers application programs a 4essage'Friente- )nterface( applications can
-epen- on protocol to preser&e -ata boun-aries5
L True
L 5alse
9DP o$$ers app#ication programs a *essage-8riented Inter$ace. It does not divide
messages into packets $or transmission and does not com%ine messages $or de#iver/.
"D="N-"(),.
: "pp#ications can depend on protoco# to preserve data %oundaries.
EHH&u<s5net
>eliabilit1 is t$e responsibilit1 of t$e _________ la1er
L Network
L Data link
L Transport
L Application
4e#ia%i#it/ is the responsi%i#it/ o$ the -ransport #a/er
&u<s5net
T,P uses _______ mec$anism to control t$e flo+ of -ata5
L door
L window
L acknowled!ment
L retransmission
)n Direct point to point communication a--ing t$e %t$ computer re=uires''''''''''''
ne+ connections5
L None of the !iven
L N<
L N;
L CN< ?NDA<
disadvantage In Direct point to point communication is that adding a new computer to
the network requires N-1 new connections .(P# 23
net
)n Point'to'Point topolog1 t$ere are t+o topologies.
L Tree and .in!
L "tar and .in!
L "tar and Tree
L None of the !iven
%#(NTT#%#(NT3
(n Point-to-Point topolo!y there are two topolo!ies.
;D "TA. topolo!y
<D T.EE topolo!y
$ttpEHH&u<s5net
)n '''''''''''''( net+or. occupies t$e smaller area li.e a room a floor or a buil-ing
L 1AN
L >AN
L -AN
L None of the !iven
In !"N network occupies the sma##er area #ike a room a $#oor or a %ui#ding.(P# &
5net
8ar-+are t$at calculates a ,>, uses t+o simple components5
L AND unit and K#. unit
L "hift re!ister and K#. unit
L "hift re!ister and ANDunit
L none of the !iven
&.& uses Gust two hardware components3
6 "hift re!ister
6 Exclusive #. C K#. unit D .(P# 2'
$ttpEHH&u<s5net
$ttpEHH&u<s5net
T$e 0igabit It$ernet $ar-+are operates at a rate of ''''''''
L ;* -bps
L ;** -bps
L ;*** -bps
L None of the !iven
(iga%it )thernet that operates at 1 (%ps (1''' *%ps over $i%er optics and twisted pair
)thernet ca%#es.
5net
formall1 name- __________ informall1 .no+n as t$e t+iste- pair It$ernet or TP
It$ernet5
L ;* 0ase <
L ;* 0ase :
L ;* 0ase T
L none of the !iven
1'+",)--.
-his is another standard o$ wiring scheme. It is common#/ ca##ed 1'+ase--0 -wisted Pair
or -P )thernet. (P# &3 net
/n interface for t$in It$ernet must $a&e an ____________ connector ( an- must
generate signals accor-ing to t$e_____________ specification.
L .M+:' ;* 0ase T
L .M+:' ;* 0ase :
L 0N&' ;* 0ase <
L 0N&' ;* 0ase T
EHH&u<s5net
/ s1stem +it$ re-un-ant bri-ges mig$t $a&e a problem +it$_______ in t$e s1stem5
L 1oop
L 5ilters
L "pannin! Trees
L All !iven choices
EHH&u<s5net
________ computes s$ortest pat$s in a grap$ b1 using +eig$ts on e-ges as a
measure of -istance5
L ,reedy al!orithm
L Distance vector al!orithm
L DiGksta4s al!orithm
L none of the !iven
D1ikstra2s a#gorithm can accommodate weights on edges in graph. -he shortest
Path is then the path with #owest tota# weight (sum o$ the weight with a## edges. It shou#d
+e noted that the shortest path is not necessari#/ with $ewest edges (or hops.
?asic A/% tec$nologies suc$ as It$ernet( To.en >ing( an- "DD) use a _____5
L &onnectionless service paradi!m
L &onnectionoriented service paradi!m
L 0oth &onnectionless and &onnectionoriented service paradi!m
L none of the !iven
&u<s5net
_______ protocols of T,PH)P la1ering mo-el specif1 $o+ to ensure reliable transfer5
L %hysical 1ayer
L Network (nterface 1ayer
L (nternet 1ayer
L Transport 1ayer
!"3)4 &. ensure re#ia%#e trans$er #a/er & in -5P #a/ering mode# is transport #a/er.
/n )nternet /--ress 2)P a--ress3 is a uni=ue __________ binar1 number assigne-
to a $ost an- use- for all communication +it$ $ost
L +@bit
L )<bit
L <+bit
L None of the !iven
"n Internet address (IP address is a unique 32-%it %inar/ num%er assigned to a
host and used $or a## communication with the host
$ttpEHH&u<s5net
T$e a--ress __________ i-entifies t$e p$1sical net+or. to +$ic$ t$e computer is
attac$e-( +$ile t$e _______ i-entifies an in-i&i-ual computer on t$at net+or.5
L prefix ' suffix
L suffix ' prefix
L suffix ' suffix
L None of the !iven
PREFIX:
It identi$ies the ph/sica# network to which the computers are attached.
SUFFIX:
It identi$ies an individua# computer on the network.
$ttpEHH&u<s5net
___________ places t$e boun-ar1 bet+een t$e first an- secon- octets
L &lass A
L &lass 0
L &lass &
L &lass D
&lass A places the boundary between the first and second octets. &lass 0 places the
boundary between the second and third octets' and class & places the boundary between
the third and fourth octets.
$ttpEHH&u<s5net
___________ places t$e boun-ar1 bet+een t$e t$ir- an- fourt$ octets5
L &lass A
L &lass 0
L &lass &
L &lass D
&lass A places the boundary between the first and second octets. &lass 0 places the
boundary between the second and third octets' and class & places the boundary between
the third and fourth octets.
$ttpEHH&u<s5net
________ fiel- of $ea-er in-icates +$et$er a -atagram is a fragment or a complete
-atagram5
L 51A,"
L 51A,-ENT #55"ET
L (DENT(5(&AT(#N
L None of the !iven
74"(*)N-"-I8N.
EHH&u<s5net
______ pro&i-es connectionless ser&ice5
L T&%
L $D%
L (%
L none of the !iven
9DP has the $o##owing characteristics.
: It is an end-to-end protoco#. It provides app#ication-to-app#ication communication.
: It provides connection#ess service.
: It is a *essage-8riented protoco#.
: It uses %est-e$$ort de#iver/ service.
: It $o##ows ar%itrar/ interaction.
: It is operating s/stem independent
UDP an- T,P are bot$_________ la1er protocols
L %hysical
L Data link
L Network
L Transport
$ttpEHH&u<s5net
,onnection'oriente- ser&ice( Point'to'point( ,omplete reliabilit1( "ull'-uple9
communication( Dtream interface( >eliable connection startup an- 0raceful
connection s$ut-o+n are t$e ser&ices pro&i-e- b1__________
L (%
L None of the !iven
L T&%
L $D%
"E.8(&E %.#8(DED 02 T&%3
5ollowin! are the services provided by T&%3
6 &onnectionoriented service
6 %ointtopoint
6 &omplete reliability
6 5ullduplex communication
6 "tream interface
6 .eliable connection startup
6 ,raceful connection shutdown
$ttpEHH&u<s5net
_______ protocols of T,PH)P la1ering mo-el specif1 $o+ to ensure reliable transfer5
L %hysical 1ayer
L Network (nterface 1ayer
L (nternet 1ayer
L Transport 1ayer
!"3)4 &. ensure re#ia%#e trans$er #a/er & in -5P #a/ering mode# is transport #a/er
EHH&u<s5net
________i-entifies +$ic$ application program on recei&ing computer s$oul- recei&e
t$e -ata
L 1o!ical address
L "ource port
L Destination %ort
L None of the !iven
$ttpEHH&u<s5net
________ i-entifies t$e application program t$at sent t$e -ata5
L Destination %ort
L "ource port
L 1o!ical address
L None of the !iven
The 0order ,ateway %rotocol C0,%D uses_________ for all communication
L $D%
L T&%
L 0oth $D% and T&%
L None of the !iven
0#.DE. ,ATE>A2 %.#T#&#13
(t is most popular Exterior ,ateway %rotocol in (nternet. (t has followin! characteristics3
N(t provides routin! amon! autonomous systems CE,%D.
N(t provides policies to control routes advertised.
N(t uses reliable transport CT&%D.
.
$ttpEHH&u<s5net
____________ uses -istance &ector approac$ to -efine routing
L 0,%
L #"%5
L .(%
L None of the !iven
.#$T(N, (N5#.-AT(#N %.#T#&#1 C.(%D3
(t has the followin! characteristics3
N(t is used for routin! within an autonomous system C(,%D.
N/op &ount -etric3 .(% measures distance in network hops' where each network
between the source and destination counts as a sin!le hop.
N(t uses $D% for all messa!e transmissions.
N.(% is used over 1AN. 8ersion ; of .(% uses hardware broadcast and version < allows
delivery via multicast.
N(t can be used to advertise default route propa!ation. An or!ani7ation can use .(% to
install a default route in each router.
N(t uses distance vector al!orithm.
EHH&u<s5net
),4P message transport is acte- upon b1 getting ),4P encr1pte- in )P5
L True
L 5alse
I5*P message transport is acted upon %/ getting I5*P encapsu#ated in IP (P# 11<
EHH&u<s5net
Protocol a--resses are abstractions pro&i-e- b1 ___________5
L hardware
L software
L operatin! system
L internet
Protoco# addresses are a%stractions provided %/ so$tware
T$ese pac.ets ser&e same purpose on ________ as frames on ______
L (ntranet' 1AN
L (nternet' >AN
L (ntranet' >AN
L (nternet' 1AN
=I4-9"! P"5>)-,.
-hese packets serve same purpose in Internet as $rames on !"N
5net
/--ress mas. -efines $o+ man1 bits of a--ress are in suffi9:
L True
L 5alse
Address mask defines how many bits of address are in prefix. %refix defines how much of
address used to identify network.
/ single net+or.ing tec$nolog1 is best for all nee-s.
L True
L 5alse
-here is no sing#e networking techno#og/ that is %est $or a## needsEHH&u<s5net
/ computer attac$e- to a gi&en net+or. can onl1 communicate +it$ ot$er
computers attac$e- to t$e same net+or.5 )s t$is a problem +it$ multiple net+or.s:
L True
L 5alse
the chief problems with multiple networks are as follows3
6 A computer attached to a !iven network can only communicate with other
&omputers attached to the same network.
EHH&u<s5net
T$e term self'i-entif1ing is use- for ,lassful )P a--resses because t$e class of t$e
a--ress can be compute- from t$e a--ress__________5
L (tself
L prefix
L suffix
L mask
5#ass$u# IP addresses are se#$-identi$/ing %ecause the c#ass o$ the address can %e
computed $rom the address itse#$
"in- t$e class of t$e a--ress5
#0#00### ##0##0## #000#0## 0##0####
L A
L 0
L E
L &
.eference table handouts % O @P
$ttpEHH&u<s5net
"in- t$e class of t$e a--ressE
####00## #00##0## #####0## 0000####
L A
L &
L E
L 0
.eference table handouts % O @P
)n +$ic$ met$o- of /--ress >esolution Protocol t$e protocol a--ress is -etermine-
b1 $ar-+are a--ress:
;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for
Data I9c$ange:
L T
L D
L &
L T' &
.eference table handouts % O BP
EHH&u<s5net
;$ic$ met$o- of /--ress >esolution Protocol re=uires $ar-+are broa-cast:
;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for
Data I9c$ange:
L D
L T
L &
L T' D
.eference table handouts % O BP
&u<s5net
;$ic$ met$o- of /--ress >esolution Protocol resolution +it$ minimum -ela1:
;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for
Data I9c$ange:
L T' D
L c
L T
L T' &
.eference table handouts % O BP
)n +$ic$ met$o- of /--ress >esolution Protocol t$e implementation is more
-ifficult:
;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for
Data I9c$ange:
L T' &
L T
L &
L D
.eference table handouts % O BP
Fn of t$e -esign goals for unicast route propagation is __________5
L &onsistency
L inconsistency
L stability
L dynamic addressin!
8n o$ the design goa#s $or unicast route propagation is sta%i#it/?continua# changes in
route are undesira%#e %ecause the/ #ead to higher 1itter and datagram arriving out o$
order. -hus0 once a unicast routing protoco# $inds a shortest path0 it usua##/ retains the
route unti# a $ai#ure makes the path unusa%#e. (4e$erence $rom )-%ook
$ttpEHH&u<s5net
Propagation multicast routing information -iffers -ramaticall1 from unicast route
propagation:
L True
L 5alse
Propagating multicast routing information differs dramatically from unicast
route propagation. -he di$$erence arises %ecause internet mu#ticast a##ows d/namic
group mem%ership and autonomous senders
to sa&e traffic an I0P -oes not summari<e routing information from t$e
autonomous s1stem before passing it to anot$er autonomous s1stem5
L True
L 5alse
to save tra$$ic0 an )(P summari@e routing in$ormation $rom the autonomous s/stem
%e$ore passing it to another autonomous s/stem. *ore important an )(P imp#ements
po#ic/ constraint that a##ows a s/stem manager to determine eAact#/ what in$ormation is
re#eased outside the organi@ation. C4e$erence $rom )-%ookD
$ttpEHH&u<s5net
)n )P&6 t$e t1pe of a--ress use- for collection of computers +it$ same prefi95 /re
.no+n as_____
L Anycast
L $nicast
L -ulticast
L none of the !iven
7o##owing are specia# t/pes o$ addresses0 IPvB uses.
Unicast: It is used $or sing#e destination computer.
Multicast: It is used $or mu#tip#e destinationsC possi%#/ not at same site.
Cluster: -his t/pe o$ address is used $or co##ection o$ computers with same pre$iA0
Datagram is de#ivered to one out o$ c#uster.
&u<s5net
Dpecial t1pes of a--resses in )P&6 use- for multiple -estinationsK possibl1 not at
same site5 _________5
L $nicast
L Anycast
L -ulticast
L none of the !iven
5ollowin! are special types of addresses' (%v9 uses3
UnicastE (t is used for sin!le destination computer.
4ulticastE (t is used for multiple destinationsQ possibly not at same site.
,lusterE This type of address is used for collection of computers with same prefix'
Data!ram is delivered to one out of cluster.
UDP offers application programs a 4essage'Friente- )nterface( applications can
-epen- on protocol to preser&e -ata boun-aries5
L True
L 5alse
9DP o$$ers app#ication programs a *essage-8riented Inter$ace. It does not divide
messages into packets $or transmission and does not com%ine messages $or de#iver/.
"D="N-"(),.
: "pp#ications can depend on protoco# to preserve data %oundaries.
$ttpEHH&u<s5net
>eliabilit1 is t$e responsibilit1 of t$e _________ la1er
L Network
L Data link
L Transport
L Application
4e#ia%i#it/ is the responsi%i#it/ o$ the -ransport #a/er
EHH&u<s5net
T,P uses _______ mec$anism to control t$e flo+ of -ata5
L Door
L window
L acknowled!ment
L retransmission
-5P uses window mechanism to contro# the $#ow o$ data.
$ttpEHH&u<s5net
t$e time for ac.no+le-gement to arri&al of pac.et -epen-s on5
L Distance to destination and &urrent traffic conditions
L &urrent traffic conditions
L Distance to destination
L non of these
-he time $or acknow#edgement to arrive depends on.
: Distance to destination
: 5urrent tra$$ic conditions
EHH&u<s5net
"DD) can transmits -ata at a rate of ''''''''''
L ;** million bits per second
L ;* million bits per second
L ;*** million bits per second
L None of the !iven
$ttpEHH&u<s5net
t$e time for ac.no+le-gement to arri&al of pac.et -epen-s on5
L Distance to destination and &urrent traffic conditions
L &urrent traffic conditions
L Distance to destination
L non of these
-he time $or acknow#edgement to arrive depends on.
: Distance to destination
: 5urrent tra$$ic conditionsEHH&u<s5net
"DD) can transmits -ata at a rate of ''''''''''
L ;** million bits per second
L ;* million bits per second
L ;*** million bits per second
L None of the !iven

Das könnte Ihnen auch gefallen