You are on page 1of 5

www.aktutor.

in
DATA COMMUINICATION AND NETWORKING

1. The _________ layer is the topmost layer in the subnet.


Ans. Network

2. The ________ routing is also referred to as non-adaptive.


Ans. Static

3. Stability is also an important goal for routing algorithms. (True/False)


Ans. True

4. The _______ routing algorithms change their routing decisions to reflect changes in topology and usually the
traffic as well.
Ans. Dynamic or adaptive

5. The set of optimal routes from source to a given destination form a tree rooted at the destination called a ___ tree.
Ans. Sink

6. ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it
arrives on. This method usually generates a vast number of duplicate packets.
Ans. Flooding

7. In ______ routing algorithm, each router knows all details about how to route packets to destinations within its
own region. But it does not have any idea about the internal structure of other regions.
Ans. Hierarchical

8. The Aloha protocol is an OSI layer 2 protocols for LAN networks with ________ topology.
Ans. Broadcast

9. Carrier Sense Multiple Access (CSMA) is a probabilistic protocol.


Ans. Media Access Control (MAC) protocol

10. In binary exponential algorithm to accommodate the longest path allowed by Ethernet (common for LAN) the
slot time has been set to __________ bit times.
Ans. 512

11. The IEEE committee created Ten-Gigabit Ethernet and called it as __________Standard
Ans. 802.3ae

12. Sending a packet to all destinations simultaneously is called _________.


Ans. broadcasting

13. Each frame in HDLC frame begins and ends with a __________.
Ans. Frame delimiter

14. Each frame in HDLC consists of three different frames. They are _____, _____&_____
Ans. I frames

15. Which Component of PPP is used for establishing, configuring, and testing the data-link connection?
Ans.
• Supervisory Frames
• U-Frames
• Link Control Protocol (LCP)
1
www.aktutor.in
16. Which Component of PPP I used for establishing and configuring different network-layer protocols?
Ans. Network Control Protocols (NCPs)

17. Data link layer is split into _______ and _______ sub layers.
Ans. MAC, LLC

18. A _______ is a subset of the subnet that includes all the routers but contains no loops.
Ans. spanning-tree

19. In ________ method when a broadcast packet arrives at a router, the router checks to see if the packet arrived on
the line that is normally used for sending packets to the source of the broadcast.
Ans. reverse path forwarding

20. In ________ routing, we send messages to well-defined groups that are numerically large in size but small
compared to the network as a whole.
Ans. Multicast

21. Flow control relates to the point-to-point traffic between a given sender and a given receiver. (True/False)
Ans. True

22. When too many packets are present in (a part of) the subnet, performance degrades. This situation is called ____.
Ans. Congestion

23. File transfer applications, including e-mail and video, are delay-sensitive. (True/False)
Ans. False

24. A stream of packets from a source to a destination is called a _______.


Ans. Flow.

25. The main IETF protocol for the integrated services architecture is _______.
Ans. RSVP

26. Flow-based algorithms or integrated services were aimed at both unicast and multicast applications. (True/False)
Ans. True

27. At any instant of time, an ad hoc network can be described by a _______.


Ans. Graph of the nodes (routers + hosts)

28. Networks of nodes that just happen to be near each other are called ________.
Ans. ad hoc networks

29. When a process sends a multicast packet to a group, the first router examines its spanning tree and prunes it,
removing all lines that do not lead to hosts that are members of the group. (True/False)
Ans. True

30. AODV (Ad hoc On-demand Distance Vector) routing algorithm is an on-demand algorithm. (True/False)
Ans. True

31. IP addresses are managed and created by the _______.


Ans. Internet Assigned Numbers Authority (IANA)

2
32. The IP address space should be divided intowww.aktutor.in
_______ different address classes.
Ans. five

33. Each Class A network address has an ______ network-prefix with the highest order bit set to 0.
Ans. 8-bit

34. Each Class C network address has a ______ network-prefix with the three highest-order bits set to 1-1-0.
Ans. 24-bit

35. ______ divides the address into a network prefix and local portion.
Ans. Subnetting

36. An organization cannot have a mixture of large and small networks to achieve higher utilization of address
space. (True/False)
Ans. False

37. Which class of networks use subnetting?


Ans. class B

38. A subnet mask should have ____ for all bits that correspond to the network portion of the address.
Ans. 1’s

39. The _______ address is a logical address because it is assigned at the Internet layer and has no relation to the
addresses that are used at the Network Interface layer.
Ans. IPV4

40. The IPV4 address 11000000101010000000001100011000 is expressed as ______ in dotted decimal notation.
Ans. 192.168.3.24

41. IPV4 addresses are represented in _______.


Ans. dotted decimal notation

42. A _______ address identifies a single interface within the scope of the type of unicast address.
Ans. unicast

43. ___ is the standard method for finding a host's hardware address when only its network layer address is known.
Ans. Address Resolution Protocol (ARP)

44. ARP reply Frame header is subdivided into ______ & ______.
Ans. The physical address, IP address

45. ________ is a network layer protocol used to obtain an IP address for a given hardware address (such as an
Ethernet address).
Ans. Reverse Address Resolution Protocol (RARP)

46. RARP reply frame also consists of two fields they are ______ & ______.
Ans. Frame header, RARP reply message

47. Symmetric release treats the connection as two separate unidirectional connections and requires each one to be
released separately. (True/False)
Ans. True

3
www.aktutor.in
48. In UDP protocol post __________ through ________ are registered posts.
Ans. 1024; 49151

49. List the computer network application that uses UDP.


Ans. DNS; VOIP; TFTP

50. What is the minimum & maximum Size of TCP Header?


Ans. The minimum is 5 words and the maximum is 15 words.

51. _______ happens in any system that involves Waiting.


Ans. Congestion, queues

52. Congestion in a network or internetwork occurs because routers and Switches having _____, ______ that hold
packets before and after processing.
Ans. buffers

53. TCP protocol is a connectionless protocol. State true or false.


Ans. False

54. List the problems that occur while establishing a connection.


Ans. The network can lose packets, store and duplicate packets these are the problems

55. List the ways by which Packet lifetime can be restricted to a known maximum value.
Ans.
a) Restricted Subnet design
b) Putting hop counter in each packet
c) Time-stamping each packet.

56. In _______ way the telephone system works.


Ans. Asymmetric release

57. TPDU is an acronym for ______.


Ans. Transport Protocol Data Unit

58. In telnet Commands are always introduced by a character with the decimal code ______ known as an Interpret
as command (IAC) character.
Ans. 255

59. In telnet what is the decimal code for echo? _______.


Ans. 1

60. Which service primitive is used to exchange data in connection-oriented services?


Ans. SEND and RECEIVE

61. The ___________ protocol is based on end-to-end delivery.


a) SMTP b) TCP c) IP d) SCTP
Ans. a

62. The client SMTP uses the _______ to determine the IP address of the destination mailbox.
Ans. Domain Name System

4
www.aktutor.in
63. The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send
a ____ Service ready message.
a) 420 b) 320 c) 220 d) 120
Ans. c

64. _______ is a command-line tool designed for most UNIX-like operating systems.
Ans. Sendmail

65. Sendmail uses a _______ system to manage inbound and outbound mail.
Ans. queuing

66. FTP is a commonly-used protocol for exchanging files over any network that supports the _______ protocol.
Ans. TCP/IP

67. FTP servers by default listen on port ______ for incoming connections from FTP clients.
Ans. 21

68. The idea of having one-page point to another is now called _______.
Ans. hypertext,

69. State true or false: People authenticate other people by faces, voices, and handwriting
Ans. true

70. Issues like authentication and non-repudiation can only be handled in the _______ layer.
Ans. application

71. List E-mail secure systems. Ans. PGP, PEM, and S/MIME

72. PGP encrypts data by using a block cypher called _______.


Ans. IDEA (International Data Encryption Algorithm)

73. PGP uses _______ bit keys. Ans. 128

74. The HTTP communication is initiated by the _________ requesting a resource on the origin server.
Ans. user

75. Because HTTP is a distributed information-based protocol, ______ can improve the performance significantly.
Ans. caching

76. What does the Web consist of?


Ans. a vast, worldwide collection of documents called Web pages

77. State true or false: Each page may contain links to other pages anywhere in the world. Ans. true

78. A Web browser, at a minimum, consists of a _______ and _______.


Ans. Hypertext Markup Language (HTML) interpreter and HTTP client

79. ______ is responsible for servicing requests for information from Web browsers. Ans. Web servers

80. HTTP is a stateless protocol because ________. Ans. it does not keep track of the connections

-----------------------The end----------------------------

You might also like