Professional Documents
Culture Documents
in
DATA COMMUINICATION AND NETWORKING
4. The _______ routing algorithms change their routing decisions to reflect changes in topology and usually the
traffic as well.
Ans. Dynamic or adaptive
5. The set of optimal routes from source to a given destination form a tree rooted at the destination called a ___ tree.
Ans. Sink
6. ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it
arrives on. This method usually generates a vast number of duplicate packets.
Ans. Flooding
7. In ______ routing algorithm, each router knows all details about how to route packets to destinations within its
own region. But it does not have any idea about the internal structure of other regions.
Ans. Hierarchical
8. The Aloha protocol is an OSI layer 2 protocols for LAN networks with ________ topology.
Ans. Broadcast
10. In binary exponential algorithm to accommodate the longest path allowed by Ethernet (common for LAN) the
slot time has been set to __________ bit times.
Ans. 512
11. The IEEE committee created Ten-Gigabit Ethernet and called it as __________Standard
Ans. 802.3ae
13. Each frame in HDLC frame begins and ends with a __________.
Ans. Frame delimiter
14. Each frame in HDLC consists of three different frames. They are _____, _____&_____
Ans. I frames
15. Which Component of PPP is used for establishing, configuring, and testing the data-link connection?
Ans.
• Supervisory Frames
• U-Frames
• Link Control Protocol (LCP)
1
www.aktutor.in
16. Which Component of PPP I used for establishing and configuring different network-layer protocols?
Ans. Network Control Protocols (NCPs)
17. Data link layer is split into _______ and _______ sub layers.
Ans. MAC, LLC
18. A _______ is a subset of the subnet that includes all the routers but contains no loops.
Ans. spanning-tree
19. In ________ method when a broadcast packet arrives at a router, the router checks to see if the packet arrived on
the line that is normally used for sending packets to the source of the broadcast.
Ans. reverse path forwarding
20. In ________ routing, we send messages to well-defined groups that are numerically large in size but small
compared to the network as a whole.
Ans. Multicast
21. Flow control relates to the point-to-point traffic between a given sender and a given receiver. (True/False)
Ans. True
22. When too many packets are present in (a part of) the subnet, performance degrades. This situation is called ____.
Ans. Congestion
23. File transfer applications, including e-mail and video, are delay-sensitive. (True/False)
Ans. False
25. The main IETF protocol for the integrated services architecture is _______.
Ans. RSVP
26. Flow-based algorithms or integrated services were aimed at both unicast and multicast applications. (True/False)
Ans. True
28. Networks of nodes that just happen to be near each other are called ________.
Ans. ad hoc networks
29. When a process sends a multicast packet to a group, the first router examines its spanning tree and prunes it,
removing all lines that do not lead to hosts that are members of the group. (True/False)
Ans. True
30. AODV (Ad hoc On-demand Distance Vector) routing algorithm is an on-demand algorithm. (True/False)
Ans. True
2
32. The IP address space should be divided intowww.aktutor.in
_______ different address classes.
Ans. five
33. Each Class A network address has an ______ network-prefix with the highest order bit set to 0.
Ans. 8-bit
34. Each Class C network address has a ______ network-prefix with the three highest-order bits set to 1-1-0.
Ans. 24-bit
35. ______ divides the address into a network prefix and local portion.
Ans. Subnetting
36. An organization cannot have a mixture of large and small networks to achieve higher utilization of address
space. (True/False)
Ans. False
38. A subnet mask should have ____ for all bits that correspond to the network portion of the address.
Ans. 1’s
39. The _______ address is a logical address because it is assigned at the Internet layer and has no relation to the
addresses that are used at the Network Interface layer.
Ans. IPV4
40. The IPV4 address 11000000101010000000001100011000 is expressed as ______ in dotted decimal notation.
Ans. 192.168.3.24
42. A _______ address identifies a single interface within the scope of the type of unicast address.
Ans. unicast
43. ___ is the standard method for finding a host's hardware address when only its network layer address is known.
Ans. Address Resolution Protocol (ARP)
44. ARP reply Frame header is subdivided into ______ & ______.
Ans. The physical address, IP address
45. ________ is a network layer protocol used to obtain an IP address for a given hardware address (such as an
Ethernet address).
Ans. Reverse Address Resolution Protocol (RARP)
46. RARP reply frame also consists of two fields they are ______ & ______.
Ans. Frame header, RARP reply message
47. Symmetric release treats the connection as two separate unidirectional connections and requires each one to be
released separately. (True/False)
Ans. True
3
www.aktutor.in
48. In UDP protocol post __________ through ________ are registered posts.
Ans. 1024; 49151
52. Congestion in a network or internetwork occurs because routers and Switches having _____, ______ that hold
packets before and after processing.
Ans. buffers
55. List the ways by which Packet lifetime can be restricted to a known maximum value.
Ans.
a) Restricted Subnet design
b) Putting hop counter in each packet
c) Time-stamping each packet.
58. In telnet Commands are always introduced by a character with the decimal code ______ known as an Interpret
as command (IAC) character.
Ans. 255
62. The client SMTP uses the _______ to determine the IP address of the destination mailbox.
Ans. Domain Name System
4
www.aktutor.in
63. The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send
a ____ Service ready message.
a) 420 b) 320 c) 220 d) 120
Ans. c
64. _______ is a command-line tool designed for most UNIX-like operating systems.
Ans. Sendmail
65. Sendmail uses a _______ system to manage inbound and outbound mail.
Ans. queuing
66. FTP is a commonly-used protocol for exchanging files over any network that supports the _______ protocol.
Ans. TCP/IP
67. FTP servers by default listen on port ______ for incoming connections from FTP clients.
Ans. 21
68. The idea of having one-page point to another is now called _______.
Ans. hypertext,
69. State true or false: People authenticate other people by faces, voices, and handwriting
Ans. true
70. Issues like authentication and non-repudiation can only be handled in the _______ layer.
Ans. application
71. List E-mail secure systems. Ans. PGP, PEM, and S/MIME
74. The HTTP communication is initiated by the _________ requesting a resource on the origin server.
Ans. user
75. Because HTTP is a distributed information-based protocol, ______ can improve the performance significantly.
Ans. caching
77. State true or false: Each page may contain links to other pages anywhere in the world. Ans. true
79. ______ is responsible for servicing requests for information from Web browsers. Ans. Web servers
80. HTTP is a stateless protocol because ________. Ans. it does not keep track of the connections
-----------------------The end----------------------------