You are on page 1of 15

Name: Class:

Saturday, October 26, 2019 Total Possible Marks: 60

Test
Please use a pencil to complete the test. Print your name on the Name
line above. Read the instructions for each section carefully. When you
have completed the test, place your test face down on your desk and
raise your hand.
1. Internet protocols are standardized in the ...
1
A Standard documents B RFCs
C Recommendations D Drafts

2. Which of the following defines how the hosts send and receive packets in the
1 network?
A Routing table B Protocols
C Infrastructure D None of them

3. What does store-and-forward transmission mean?


1
A Packet switch must receive the B Router stores and forwards every
entire packet before it can begin to bit of a packet as soon as possible
transmit the first bit of the packet
onto the outbound link
C Packet switch waits for buffer D None of them
become full before transmitting the
packet on to the outbound link

4. What is end-to-end delay if we send a L-bit length packet on a path has N routers with
1 transmission rate of each link is R?
A L/NR B NL/R
C (N+1)L/R D (N-1)L/R

5. Which of the following delays appears when we need to wait for an idle environment
1 to transmit?
A Transmission delay B Processing delay
C Queuing delay D Propagation delay

Schoolhouse Test page 1


Test Saturday, October 26, 2019
6. How does the router determine which link it should forward the packet onto?
1
A Using forwarding table B Using routing table
C Using OpenFlow table D All of them

7. In which of the following networks a host may have to wait for access to a
1 communication link?
A Packet-switched networks B Circuit-switched networks
C All of them D None of them

8. Which switching method allows more users to use network?


1
A Router switching B Packet switching
C Circuit switching D Datagram switching

9. __________is a meeting point where multiple ISPs can peer together.


1
A Tier 1 ISP B IXP
C Access ISP D Regional ISP

10. If R is transmission rate (bps), L is packet length (bits) and a is average packet arrival
1 rate, which of following statements is incorrect?
A La/R ~ 0: average queueing delay B La/R > 1: more “work” arriving than
small can be serviced, average delay finite
C La/R -> 1: average queueing delay D La/R < 1: expected queuing delay in
large any system

Schoolhouse Test page 2


Test Saturday, October 26, 2019
11.
1

Consider the scenario shown in figure, with four different servers connected to four
different clients over four three-hop paths.
What is the maximum achievable end-end throughput (in Mbps) for each of four
client-to-server pairs, assuming that the middle link is fair-shared?
A 70 Mbps B 75 Mbps
C 80 Mbps D 37.5 Mbps

12. An process-to-process communication is a function of _________ layer.


1
A Application B Transport
C Network D Physical

13. What is the name of the packets processed at the link layer?
1
A IP B Datagram
C Frame D Segment

Schoolhouse Test page 3


Test Saturday, October 26, 2019
14.
1

The model presented in figure is ______ model.


A OSI B ISO
C TCP/IP D Network

15. _______ layer allows applications to interpret meaning of data, e.g., encryption,
1 compression, machine-specific conventions
A Presentation B Session
C Link D Physical

16. Synchronization, checkpointing, recovery of data exchange are functions of ________


1 layer.
A Presentation B Session
C Transport D Network

17. In OSI model, as data packet moves from the lower to the upper layer header
1 are______.
A removed B added
C rearranged D modified

Schoolhouse Test page 4


Test Saturday, October 26, 2019
18. Which of following statements is correct?
1
A Routers and link-layer switches do B Routers and link-layer switches
not implement all of the layers in typically implement only the top
the protocol stack layers
C Switches implement layers 3 and 4 D Router implements layer 1 and 2

19. What data is payload in IP packet?


1
A Message B Segment
C Message with application layer D Segment with transport layer
header header

20. The client’s and the server’s functions are used in:
1
A Client/server model and Peer to B Client model only
Peer model
C Server model only D P2P model only

21. What is not a characteristic of UDP Protocol?


1
A reliable data transfer B connectionless
C no flow control D no congestion control

22. Which of following applications is loss-tolerant?


1
A File transfer B Streaming video
C Instant messaging D E-mail

23. Which of following protocols uses UDP?


1
A SMTP B Telnet
C HTTP D DNS

24. As soon as the browser receives the IP address from____, it can initiate a TCP
1 connection to the HTTP server located at port_____ at that IP address
A DNS… 80 B HTTP… 80
C User…80 D Client…60

Schoolhouse Test page 5


Test Saturday, October 26, 2019
25. HTTP is a_____ protocol.
1
A Stateless B Slow-start
C Persistent D Non-persistent

26. TCP is called a ________________transport protocol.


1
A connectionless, reliable B connection-oriented,
unreliable
C connectionless, unreliable D connection-oriented,
reliable

27. Which the following is the individual characteristic of rdt3.0?


1
A Packet retransmission on B Requires countdown timer
receipt of NAK
C Handling duplicate packets D Handling duplicate packets

28. Which of the following is NOT mechanisms used to provide for


1 reliable data transfer?

A ACKs B Handshaking

C Checksum D Sequence numbering

29. Suppose that Host A then sends two segments to Host B over a TCP
1 connection. The first and second segments contain 30 and 40 bytes
of data, respectively. In the first segment, the sequence number
is 145. In the acknowledgement of the first arriving segment,
what is the acknowledgment number?

A 215 B 185
C 175 D 141

30. How many duplicate ack-numbers trigger the Fast Retransmission


1 mode?

A 1 B 2
C 3 D No, retransmissions are
triggered by timeout event

Schoolhouse Test page 6


Test Saturday, October 26, 2019
31. Find the checksum of these 16-bit words:
1 1011 0111 1011 0011
1010 0011 1010 0101
1001 0110 1010 1110
A 0000 1101 1111 1000 B 1111 0010 0000 0111
C 0000 1101 1111 1001 D 1010 0100 1010 0110

32. The transport layer protocol provides logical communication


1 between _______ running on different hosts, while the network
layer protocol provides logical communication between________.

A Processes ... Hosts B Hosts ... Processes

C Points ....Stations D Layers ...Hosts

33. The combination of an IP address and a port number is called a


1 _________.

A socket B network address

C transport address D None of them

34. Those followings : a) Slow start; b) Congestion


1 avoidance c) Fast retransmit; d) Fast recovery, are
mechanisms of____________
A TCP congestion control B TCP timer management
C TCP flow control D UDP congestion control

35. In TCP, what can happen if the timeout is smaller than the
1 connection's round-trip time?
A It can result in B It can increase
unnecessary transmission speed
retransmissions
C It reduces slow start phase D It reduce the transmission
speed

Schoolhouse Test page 7


Test Saturday, October 26, 2019
36. Suppose that host 10.0.0.2 initiates a connection, using source port 5500 to a Web
1 server listening at port 80 at 128.119.40.186. The NAT translation table for this TCP
connection. WAN side 138.76.30.7, 5002 LAN side 10.0.0.2, 5500 What are the
destination IP addresses and port numbers on the IP datagram arriving to the WAN
side of the router with interface address 138.76.30.7?
A Destination IP : B Destination IP :
138.76.30.7, Destination 10.0.0.2, Destination
Port : 5002 Port : 5500
C Destination IP : D Destination IP :
138.76.30.7, Destination 128.119.40.186,
Port : 80 Destination Port : 80

37. Consider an IP subnet with prefix 129.17.129.97/27. Provide


1 the range of IP addresses that can be assigned to this
subnet.
A 129.17.129.96 - B 129.17.129.0 -
129.17.129.127 129.17.129.225
C 129.17.129.96 - D 129.17.129.0 -
129.17.129.255 129.17.129.127

38. Given the IP address 201.14.78.65 and the subnet mask


1 255.255.255.224, what is the subnet address?
A 201.14.78.0 B 201.14.78.32
C 201.14.78.64 D 201.14.78.48

39. The purpose of ICMP echo request and ICMP echo reply is to
1
A report errors B check node-to-node
communication
C check packet lifetime D trace the route to
destination host

40. What type of routing algorithm that OSPF use?


1
A Distance Vector B Link State
C Shortest Path D Distributed

Schoolhouse Test page 8


Test Saturday, October 26, 2019
41. A datagram is fragmented into three smaller datagrams. Which
1 of the following is true?
A The identification field B The more fragment bit is
is the same for all three set to 0 for all three
datagrams datagrams
C The do not fragment bit D The offset field is the
is set to 1 for all three size of each datagram
datagrams

42. What is the protocol that network devices (for example :


1 modem ADSL) use to assign IP address to PCs in LAN
automatically?
A DHCP B HTTP
C ICMP D DNS

43. Which statement is correct about router?


1
A Each interface to have an B Interface does not have
unique IP address IP addresses at all
C The first interface has D Each interface to have a
address 0.0.0.0, the routing table
second interface has
address 0.0.0.1, and so
on
44. Which of the following is true about the IP address
1 192.0.0.10/24?

A The network address is B The netid is 192


192.0.0.0
C The class is D D This is a multicast address

45. In virtual circuit network, which information is used to


1 identify the path between the source and the destination?
A VC number B IP address

C MAC address D All of them

Schoolhouse Test page 9


Test Saturday, October 26, 2019
46. When CRC is calculated, consider the 4-bit generator G = 1001
1 and suppose that D has the value 111010. What is the value of R?

A 100 B 101
C 110 D 011

47. Which of the following is the MAC protocol?


1
A BGP B RIP
C CSMA/CD D ICMP

48. What is the function of ARP?


1
A It resolves IP addresses to B It resolves MAC addresses
MAC addresses to IP addresses
C It resolves hostnames to IP D It resolves NetBIOS names
addresses to IP addresses

49. Which the following is the individual characteristic of switch?


1
A Transport layer device B Maintain a routing table

C All nodes connected to D Examining incoming frame's


device can collide with one MAC address, selectively
another forward frame to outgoing
links

50. Which of the following access methods is associated with WLAN


1 networks?

A CSMA/CD B CSMA/CA

C Token Exchange D Demand Polling

51. A receiving host computes the checksum on a frame and determines


1 that the frame is damaged. Then frame is then discarded. At which
OSI layer did this happen?

A Data link B Physical

C Transport D Network

Schoolhouse Test page 10


Test Saturday, October 26, 2019
52. Two-dimensional parity check can ________.
1
A Detect a single bit error B Detect a single bit error
and correct it but not able to correct it
C Detect a bust of bit errors D Detect a bust of bit errors
but correct a single bit

53. Channel partitioning, random access, and taking turns are ______
1 .

A MAC protocols B CSMA/CA

C CSMA/CD D PPP

Schoolhouse Test page 11


Test Saturday, October 26, 2019
54.
1

The problem is to distribute a file of size F = 7 Gbits to each of these 7 peers. Suppose
the server has an upload rate of u = 77 Mbps, and that the 7 peers have upload rates
of:
u1 = 23 Mbps, u2 = 10 Mbps, u3 = 17 Mbps, u4 = 29 Mbps, u5 = 21 Mbps, u6 = 26
Mbps, u7 = 13 Mbps,
and download rates of:
d1 = 26 Mbps, d2 = 36 Mbps, d3 = 23 Mbps, d4 = 29 Mbps, d5 = 20 Mbps, d6 = 39
Mbps, d7 = 32 Mbps

The minimum time needed to distribute this file using the client-server model is
______ secs.
The minimum time needed to distribute this file using peer-to-peer download is
______ secs.
A 350 ... 636.36 B 300 ... 563.36
C 563.36 ... 300 D 636.36 ... 350

Schoolhouse Test page 12


Test Saturday, October 26, 2019
55.
1

The figure presents the idea of:


A TDM B FDM
C FDM D TDM & FDM

56.
1

Consider the figure, with three links, each with the specified transmission rate and
link length.
Assume a packet length of 16000 bits. The speed of light propagation delay on each
link is 3x10^8 m/sec.
Find the end-to-end delay?
A 6.7 ms B 6.5 ms
C 5.2 ms D 4.9 ms

Schoolhouse Test page 13


Test Saturday, October 26, 2019
57.
1

Consider the reliable data transfer rdt2.1 sender FSM shown in the figure. Which
numbers are not correct about rdt2.1?
A 2&3 B 4&5
C 3&5 D None of them

58. What field in the IP header changes when a datagram is forwarded


1 by a simple router?

A ToS B TTL
C Source IP address D Destination IP address

59. In order to have minimum 1000 addresses per subnet, how many bits should we
1 borrow from host ID to divide network 185.246.0.0?
A 2; 3; 4; 5; 6 B 1; 2; 3; 4; 5
C 3; 4; 5; 6; 7 D 4; 5; 6; 7; 8

Schoolhouse Test page 14


Test Saturday, October 26, 2019
60. What happen if 2 hosts are assigned with 2 IP addresses belong to 2 different IP
1 network address ranges?
A The router must be used to connect B The switch must be used to connect
2 hosts in order to let them 2 hosts in order to let them
communicate with each other communicate with each other
C Those 2 hosts cannot communicate D Those 2 hosts can only
over IP network communicate with each other only
when they are connected directly by
using cross-over cable

Schoolhouse Test page 15

You might also like