You are on page 1of 10

Alazhar University – Gaza Course Code: ITCS4316

Faculty of Engineering & Information Course Name: Computer Network


Technology Semester 2020/2021
Field of Study: Computer Science
Saturday13/01/2021, 180 minutes

Final Exam Question


_____________________ :‫ة‬/‫إسم الطالب‬ Paper ______________ :‫ة‬/‫رقم الطالب‬
(Total Points: 100)

Question one: choose the correct answer


1- Which is NOT supported by TCP? (A) error control (B) flow control (C)
congestion control (D) delay control.
2- Which is NOT supported by UDP? (A) connectionless (B) best effort (C)
multiple processes (D) in-order.
3- When a DNS server receives two queries from the same host, which field of
the query message is different? (A) source IP address (B) source UDP port
number (C) destination IP address (D) destination UDP port number
4- A browser establishes two parallel TCP connections to the same Web server.
When the host running the browser receives a segment from the server, which
field of the segment is different? (A) source IP address (B) source TCP port
number (C) destination IP address (D) destination TCP port number.
5- The technique that a sender sends one packet then waits for its receiver’s
response is called (A) store-and-forward (B) stop-and-wait (C) pipelining (D)
retransmission
6- An acknowledgment for a packet with sequence number n indicating that all
packets with a sequence number up to and including n have been correctly
received at the receiver is called (A) negative acknowledgement (B) selective
acknowledgement (C) positive acknowledgement (D) duplicate
acknowledgement
7- IP is a protocol of the (A) link layer (B) network layer (C) transport layer (D)
application layer.
8- Which delay is the time waiting at the output link for transmission and
depends on the congestion level? (A) nodal processing (B) transmission (C)
propagation (D) queuing
9- Which are unguided media? (A) twisted-pair copper wire (B) coaxial cable
(C) power-line wire (D) radio channels
10- Each Web object is addressable by a (A) HTTP (B) HTML (C) URL (D)
XML
11- Which does not strictly belong to the hierarchy of DNS servers? (A) root
name server (B) top-level server (C) authoritative DNS server (D) local name
server
12- Which must have a buffer to receive out-of-order data? (A) Go-Back-N (B)
Selective Repeat (C) TCP (D) stop-and-wait
13- Which must have a buffer to receive out-of-order data? (A) Go-Back-N (B)
Selective Repeat (C) TCP (D) stop-and-wait

1
14- What is the type of the answer to a DNS query for the IP address of the
authoritative name server for the domain? (A) Type A (B) Type NS (C) Type
CNAME (D) Type MX

1-D 2-B 3-D 4-B 5A -6C -7B 8-D

9D 10C 11-B 12A 13-A 14B 15 16-

Question two: write down what best describe the following:


1. ____LAN_________________ an infrastructure that provides services to
applications
2. Which layer do internet protocols like HTTP, FTP and DNS belong to?
_________App layer_____
3. What is the name for a uniquely identifiable endpoint of a connection?
________socket_____

4. ______protocol___ defines the format and the order of messages exchanged

5. _________packet swiching____ use store-and-forward transmission at the


inputs to the links.

6. What information a uniquely identifiable endpoint of a connection (see


question before) consist of? ________________packet___________

7. _____network______ allow many devices to share the same media.

8. The function of ____presentation layer___ works as network translator.


9. Which layer do internet protocols like HTTP, FTP and DNS belong to?
_______ App layer _____

10. ___internetwork ___ a collection of computer networks interconnected


together.

11. The protocol _______SMTP____ used for sending email on Internet.

12. Which TCP/IP stack layers have to be passed when a computer accesses an
Internet website in a web browser __network layer____________

13. The____UDP__ protocol provides a connectionless service to its applications

14. . ______router____ is used to communicate between different networks

2
15. ___Routing protocol__ responsible for finding the shortest and free path.

16. __session layer_ The function of this layer is to provide mechanism to control
the dialogue between applications in end systems like dialogue discipline

Question three:

1- What are the typical causes of packet loss in a packet switched network?
• errors in data transmission
• network congestion.
• Network attack
• Faulty Networking Wires

2- An application layer protocol typically defines four things. What are these four
things?
• Types of messages
• syntax of messages
• semantics of messages
• timing

3- List three command used by FTP over control connection and expain it.

command Explain

mget get multiple files

mkdir make directory on remote machine

mls list contents of multiple remote


directories

mode set file transfer mode

3
4- What is the difference between network applications and application layer
protocols?
network applications ‫هي التطبيقات التي تعمل بتوفر االنترنت ك الكروم‬
application layer protocols‫هي البروتوكوالت التي تستخدمها التطبيقات للحصول على الحدمة المطلوبة‬

5- Both HTTP and FTP can be used for downloading and uploading files. Give one
similarity and one difference between the two protocols.

Similarity:

• transfers file using service of TCP.


• sorts the problem when a communicating client and server have a different
configuration.

BASIS FOR
HTTP FTP
COMPARISON

Basic HTTP is used to access FTP transfers file from one

websites. one host to another.

Connection HTTP establishes data FTP establishes two

connection only. connection one for data

and one for the control

connection.

4
BASIS FOR
HTTP FTP
COMPARISON

TCP ports HTTP uses TCP's port FTP uses TCP's port

number 80. number 20 and 21.

URL If you are using HTTP, http If you are using FTP, ftp will

will appear in URL. appear in URL.

Efficient HTTP is efficient in FTP is efficient in

transferring smaller files like transferring larger files.

web pages.

Authentication HTTP does not require FTP requires a password.

authentication.

Data The content transferred to a The file transferred to the

device using HTTP is not host device using FTP is

saved to the memory of that saved in the memory of

device. that host device.

5
6- What is the purpose of the IF-MODIFIED-SINCE field in an HTTP GET message?

The if-modified-since and the last-modified header are part of the validation: A
document or resource is checked for its current validity. This reduces server requests,
data transfer and access times to control client-side waiting times, server-side
utilization and the bandwidth used for data transfer.

7- Explain the sevices supported by DNS

.Host Aliasing. A host with a complicated hostname can have one or more alias names

Mail Server Aliasing. For obvious reasons, it is highly desirable that e-mail addresses
by mnemonic

Load Distribution

6
8- if a client requests an URL but it does not know the IP Address. Explain how this
problem in context of DNS solved.

9- What is the difference between network architecture and application architecture?

Network architecture: The process of organizing the communication process


into the layers is called network architecture. Or it can be considered as the
design of the communication network.

Application Architecture: The architecture which is designed by the application


developer is called Application Architecture. This type of architecture dictates the
complete or broad structure of an application.

10- What information is used by a process running on one host to identify a process
running on another host?

The IP address of the destination host and the port number of the destination socket

7
11- Explain the DNS records and messages.

When you enter an internet address in the browser, the system first has to look up
which IP address belongs to this domain. This sometimes occurs even in the
computer’s memory itself, often in the internet provider’s database or other DNS
servers, and in cases of uncertainty, via one of the large root servers that monitor the
entire Domain Name System as authority entities. In order to perform a name
resolution, the DNS records, specifically the resource records, must be searched for in
the DNS and/or name servers. Here, each IP address (known to the server) is assigned
a domain name.

The DNS has a hierarchical and decentralized structure. At each level, there is a
server that is responsible for its namespace. This means that in the search for
www.example.com’s IP address, the root server only helps if it knows which server is
responsible for the Top-Level Domain (TLD). In this way, the individual levels are
run through in order to perform the name resolution. This means that the IP address of
the actual web server or mail server resides solely with the host itself. For this reason,
it is important for website operators to understand the concept of resource records.

13- List the four broad classes of services that a transport protocol can provide. For
each of the service classes, indicate if either UDP or TCP (or both) provides such a
service

1. Reliability:

In TCP: TCP is a connection-oriented protocol.

• When a data file or message is sent from source to destination, there is a


guarantee that a packet will be delivered until the connection does not fail.

• The data transfer between client and server in the form of reliable byte
stream. Therefore, TCP is reliable.

In UDP: UDP is a connectionless protocol.

• When the data file or message is sent from source to destination there is no
chance for guaranteed delivery to destination.

• The data transfer is not possible in the form of byte stream in the case of
UDP. Therefore, UDP is unreliable.

8
2. Ordering of data:

In TCP:

• TCP protocol delivers the packets in an order. The source transmits the
second packet only after the first packet is received at the
destination. Therefore, TCP follows ordering of packets.

In UDP:

• UDP protocol does not deliver the packets in an order. The transmission of
packets from the source to destination follows no order. Therefore, UDP
follows no ordering.

3. Constant Throughput:

In TCP:

• The throughput for TCP protocol is much more than throughput for UDP
protocol because TCP is reliable.

• There is guarantee for constant throughput in TCP protocol. Therefore, TCP


also have certain throughput value.

In UDP:

• The throughput for UDP protocol is less than throughput for TCP protocol
because UDP is unreliable.

• There is guarantee for constant throughput in UDP protocol. Therefore,


UDP also have certain throughput value.

4. Timing:

In TCP:

• The fixed amount of delays occurs in receiving an acknowledgement from


the receiver to the client because it is connection orientated. That means no
jitter occurs in TCP.

• If packets is sent by client but not received any acknowledgement, then


client wait for timeout expiration and retransmit the same packet to
receiver. Therefore, the TCP protocol satisfies the timing services.

In UDP:

• As UDP is connectionless and does not send any acknowledgements upon


receiving the packets.

9
• Therefore, no time delay in receiving acknowledgements. But the client
doesn’t know, whether the packet was dropped or delayed. Therefore, UDP
protocol satisfies the timing property but it doesn’t give the guarantee
that packet delayed or not.

14- Is it possible for an organization’s Web server and mail server to have exactly the
same alias for a hostname (for example, foo.com)? What ould be the
type for the RR that contains the hostname of the mail server?

Yes an organization's mail server and Web server can have the same alias for a host
name. The MX record is used to map the mail server's host name to its IP address.

15- Consider an HTTP client that wants to retrieve a Web document at a given URL.
The IP address of the HTTP server is initially unknown. Describe how doese the
client retrieve the Web Document

10

You might also like