Sie sind auf Seite 1von 7

Using which method in transport layer data integrity can be ensured?

Checksum

Which of the following is not Transport Layer protocol? (you can choose multiple options)

ICMP & HTTP

What is function of Source Port and Destination Port in TCP Header

Provides application to application delivery

If a network has capcity of maximum segment size (MSS) 600 kb, and any node in same
network is advertising window size as 3000 Kb, then how many packets it can recive from
sender order to avoid flow control?

Buffer overrun can be reduced by using what?

Flow control

Which services are provided by transport layer?

Error Control

Which of the following is not function of TCP

Network Addressing

Which TCP Flag is used to determine first packet of 3 way handshake

SYN
_________ does not provide reliable end to end communication.

UDP

UDP packets are called as _________

Datagrams

IP address of any system contains

Network address/ID and total number of host in a networks

If a system has subnet mask of (255.255.255.240). How many possible host can exist in a
network?

16

The ability of a single network to span multiple physical networks is known as ______

Subnetting

In C class of IP addressing, if Host part is fixed with One bit for subnetting. then how many
host will exist in that each subnet.?

128

TTL stands for

Time to Live

Which of the following is limited broad cast address?

255.255.255.255
Minimum header size of IPv4 is

20 Bytes

Which of the following IP Address class is used for typically very large organizations.

Class A

If a system has subnet mask of (255.255.255.0). How many possible host can exist in a
network?

256

What is network id of the IP address 12.11.1.21

12.0.0.0

if x3 + x + 1 polynomial is used to divide data in CRC, then divisor would be ..........

1011

if sliding window is 60, and padding is 10. then what is the window size of sender if it is
using stop and wait algorithm?

Which of the following is not a flow control mechanism at data link layer
Ethernet

Which of the following Flow control algorithm has least efficiency in computer
communication?
Stop and Wait
What us the best method for error correction in computer networks?
Hamming Code

Hamming distance of 0101 and 1000 is ................

Round Trip time is equal to ..............

2 x Propagation delay

In selective repeat flow control, if window size is represented by 8 bits, then what will be size
of window at receiving end?

128

In Go Back N flow control, if window size is represented by 6 bits, then what will be size of
window at receiving end?

In Go Back N flow control, if window size is represented by 4 bits, then what will be size of
window at sender?

15

What is function of bind() function in socket programing

Assign IP and port number to socket

Socket is a ................. used to ...................

interface, send and receive data


Default port to send email is

25

In socket programming, Which of the following function are not present in client program, if
client wants to connect and send simple messages to server program. (you can select
multiple options)

Listen(), Bind()

In socket programming, once connection is established, passive and active participants are
“similar”

True

which of the following function is used to initialize socket API in application program.

WSAStartup()

In socket program, What are the possible values of domain in socket(domain, type,
protocol) in C (you can select multiple options)

PF_INET

Which of the following is most secured protocol? (you can select multiple options)

HTTPS

In socket programing in C, What are the four parameters of send() function? select correct
options.

send(socket, address of buffer, length of buffer, flags);


In sockets, Which of the following functions are blocking by default. (you can select multiple
options)

accept(), connect(), send(), recv()

OSPF stands for ?

Open Shortest Path First

The Routing Information Protocol (RIP) is based on …….. routing.

Distance vector

In ……. routing the least cost route between any two nodes is the minimum distance.

Distance vector

Router forwards the packet based on the __________________

Routing Table

If an administrate is adding manual entries in routing table, then this type of routing is
called

Static routing

Which of the following produces high traffic for routing in a network?

Flooding

Which of the following routing algorithm use flooding techniques tto update it's routing
table?

OSPF
Which of the following routing algorithm uses TTL value to stop packets to go in loops?
Link State

The OSPF protocol is routing protocol based on …….. routing.

Link state

Which of the following is inter domain routing protocol?

BGP

Das könnte Ihnen auch gefallen