You are on page 1of 17

NWC302C

Study online at https://quizlet.com/_8qi3wu

1. Which of the following networks use store-and-for- Computer net-


ward switching operation? works

2. There are similarities between message switching Supporting multi-


and packet switching. Which of following that applies ple applications
to packet switching but not to message switching?

3. A protocol is a set of precise and unambiguous rules All of above


that governs

4. Which of the following networks can be connec- Telephone net-


tion-oriented? works

5. DNS is a domain-name-service that responds to UDP


queries of domain name to IP address or IP address
to domain name. DNS uses services provided by

6. A network used to join the individual networks at VPN


different sites into one extended network is called

7. Upon receipt of a bad segment, UDP? It does not do flow


and error control

8. Which of following protocol is HTTP built upon? TCP

9. Which of following requirements are necessary for All of the above


packet networks to support multiple and diverse ap-
plications?

10. What was the concern of the telephone system that Vulnerability
motivated the ARPANET design?

11. Which of the following is an application layer proto- HTTP


col?

12. Which of the following are features of ARPANET de- All of the above
sign?

13. Bluetooth is an example of Personal Area


Network
1 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu

14. In the layer hierarchy as the data packet moves from Added
the upper to the lower layers, headers are

15. The ________ is the physical path over which a mes- Medium
sage travels

16. Three or more devices share a link in ________ con- Multipoint


nection

17. Which of the following is true for Transport Control .


Protocol Connection orient-
ed

18. Which OSI layer is responsible for providing Transport layer


end-to-end communication with reliable service?

19. Which OSI layer is responsible for dividing the trans- Data link layer
mitted bit stream into frames?

20. Which OSI layer is responsible for determining which Network layer
route through the network to use?

21. Which feature does the data link layer and transport Flow control
layer have in common?

22. Which protocol glues the network of networks togeth- IP


er as the Internet?

23. In a LAN, which address is used to transfer frames to Physical address


appropriate destination?

24. Suppose an application layer entity wants to send an 90%


L-byte message to its peer process, using an existing
TCP connection. The TCP segment consists of the
message plus 20 bytes of header. The segment is
encapsulated into an IP packet that has an additional
20 bytes of header. The IP packet in turn goes inside
an Ethernet frame that has 18 bytes of header and
trailer. What is the bandwidth utilization in terms of
2 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
the percentage of the transmitted bits in the physical
layer corresponds to message information if L = 500
bytes?

25. Of the following services, which service(s) does the None of the above
IP layer provides?

26. Which of the following is true about the ways in which All of the above
the OSI reference model and TCP/IP reference model
differ.

27. Which of following statements is true about how the Data link layer
data link layer and transport layer differ? is concerned with
framing and the
transport layer is
not

28. This layer is an addition to OSI model Presentation layer


and Session layer

29. The functionalities of presentation layer includes All of the above

30. Which of the following applications would you select File tranfers
TCP protocol for?

31. In BSD socket API, which type of socket is used to SOCK_STREAM


create a TCP socket?

32. In BSD socket API, which type of socket is used to SOCK_DGRAM


create a UDP socket?

33. In BSD socket API, which system call is used to as- bind()
sign a network address to the socket?

34. In BSD socket API, if a client knows the server name gethostbyname()
but not server's network address, what system call
should the client use to get server's network ad-
dress?

35.
3 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
In a transmission system, which of the following Converts received
statement is true for a receiver signal into a form
suitable for deliv-
ery to user

36. In digital transmission, long distance digital commu- true


nications require the use of a generator to recover
original data sequence and re-transmits on next seg-
ment

37. In twisted pair, a category 5 UTP cable can support a false


data rate of up to 16MHz

38. Which of the following statement is true for optical All of the above
fiber

39. Which of the following are advantages of optical fiber Noise immunity
No corrosion

40. In BSD socket API, which call is usually used for sendto()
transmitting data in the connectionless mode?

41. Which of following statement about TCP/UDP sockets TCP is faster than
is wrong? UDP

42. Which of following are commonly used as digital All of the above
communication medium?

43. Consider a network link that has distance of 100 4 x 10^-7 seconds
meters, and signal traverses at the speed of light
in cable 2.5 x 10^8 meters per second. The link has
transmission bandwidth of 100 megabits/second (100
x 10^6 bits per second). The packet size is 400 bits.
What is the signal propagation delay?

44. Consider a network link that has distance of 100 4 x 10^-6 seconds
meters, and signal traverses at the speed of light
in cable 2.5 x 10^8 meters per second. The link has
transmission bandwidth of 100 megabits/second (100

4 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
x 10^6 bits per second). The packet size is 400 bits.
What is the packet transmission delay?

45. An API allows application programs to access certain true


resources through a predefined interface?

46. In transport protocol, which of the following state- It enables connec-


ments is true for User Datagram Protocol tion-oriented reli-
able transfer of in-
dividual block of
information

47. Which of the following sentences are true for connec- Send/receive
tionless stream mode of service to/from multiple
peer processes,

No setup over-
head and delay,

Destination ad-
dress with each
block,

48. In transmission delay, in order to reduce the number true


of bits in a message we use data compression

49. Which of the following is true of data compression Represent the in-
algorithms formation using
fewer bits

Recover original
information exact-
ly

Recover informa-
tion approximately

50. Given a 7-bit information frame (0, 1, 0, 1, 1, 0, 1), what 0


is the even parity bit?

5 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
51. Which of following statements are true for single-bit It can detect all
parity error detection? single bit errors
in an information
frame

It can detect all


tripe bit errors
in an information
frame

52. Which of following statements are true for two-dimen- All of the above
sional parity error detection?

53. Assume bit errors occur at random. If each bit has 1/16
50% probability to be in error by transmission. What
is the probability of a four-bit frame to be in error by
transmission?

54. What is the binary sequence that corresponds to 1101


polynomial code X^3 + x^2 + 1?

55. A cyclic code can be generated using __________. Generator polyno-


mial

56. Which of the following is true for two-dimensional Arrange informa-


parity check tion in columns

More parity bit to


improve coverage

57. Polynomial codes are implemented using shift regis- True


ter circuits

58. What is the binary equivalent of the following polyno- 11100101


mial arithmetic

59. Using Euclidean Division, what will be the remainder 19


of 70 by 999 where 70 is the divisor and 999 is the
dividend

6 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
60. Block codes are generated using _____. Generator matrix

61. Given an information polynomial code I(x) = X^7 + 11000011


x^6 + x^1 + 1, which is its corresponding per-bit
information frame?

62. What is the remainder obtained by dividing x^7 + x^5 x^2 + x + 1


+ 1 by the generator polynomial x^3 + 1?

63. Given a generator polynomial g(x) = x^3 + x + 1. 1001110


Consider the information sequence 1001. By CRC
method, what is the resulted codeword for transmis-
sion?

64. Which of following generator polynomial can detect g(x) = x + 1


all single bit errors in an information frame?

65. Internet protocols use check bits to detect errors, in- Simplicity of im-
stead of using CRC polynomial. The primary rationale plementation
is

66. Find parity bit for 1001011 0

67. The divisor in a cyclic code is normally called the Generator


_________.

68. The checksum of 0000 and 0000 is 1111

69. In ASCII, a single parity bit code can detect ________ An odd number of
errors.

70. The two basic approaches in error control are error False
prevention and detection, and error correction and
re-transmission

71. In networks where errors are infrequent, which ap- End-to-end ap-
proach is favored for efficiency? proach

72. Which of the following statements is true about the Stop-and-wait is


stop-and-wait ARQ protocol? only efficient if the
7 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
link delay-band-
width product is
small

73. Consider a situation where an interactive application send an ACK


produces a packet to send each keystroke from the frame when the
client and the server echoes each keystroke that it next piggyback
receives from the client. Which of following strategies opportunity arises
for sending ACK frames in a Go-Back-N is appropri-
ate for the situation?

74. Consider a bulk data transfer application where a send an ACK


server sends a large file that is segmented in a num- frame after every
ber of full-size packets that are to be transferred to other frame is re-
the client. Assume the channel has a low probability ceived
of error. Which of following strategies for sending
ACK frames in a Go-Back-N is appropriate for the
situation?

75. Consider Selective Repeat ARQ flow control protocol. 4


In the following scenario, what should be the value of
frame number x at receiver B?

76. ARQ protocols combine error detection, retransmis- True


sion and sequence numbering to provide reliability

77. A service model specifies a level of performance that True


can be expected in the transfer of information.

78. A service offered at a given layer can include which All of the above
of the following feature(s)

79. Digital communication technologies may introduce TCP


errors in communication, which of the following can
be used to provide reliable communication HDLC
0 / 1 point

80. Ensuring that information is not altered during trans- Integrity


fer is associated with

8 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
81. Given 3 bits for sequence numbers, what is the max- 7
imum sliding window size at the receiver in Go Back
3 ARQ?

82. Given 3 bits for sequence numbers in Selective Re- None of the above
peat ARQ. If the sender already set the sliding window
size to be 4, what is the maximum sliding window size
at the receiver?

83. Consider Selective Repeat ARQ flow control protocol. 2


In the following scenario, what should be the value of
frame number x at receiver B?

84. In the scenario above, what should be the value of 7


frame number y at receiver B?

85. If the probability of error is very low in a communi- Go-back-N ARQ


cation link, which of the following statements is true and Selective Re-
about performance of ARQ protocol? peat ARQ proto-
cols have similar
performance

86. In peer-to-peer protocol, the purpose of Automatic to ensure a se-


Repeat Request is quence of infor-
mation packet is
delivered without
errors or duplica-
tion despite trans-
mission errors and
losses

to ensure a se-
quence of infor-
mation packet is
delivered in order

87. Which of the basic elements of ARQ is associated NAKs


with negative acknowledgement

88. Pipelining
9 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
In Go-Back-N ARQ, a procedure where transmission
of a new frame is begun before the completion of time
of the previous frame transmission is called

89. In Stop-and-Wait protocol, sequence number are not false


required

90. The disadvantage of Stop-and-Wait protocol All of the above

91. Which of the following statements are true for the All of the above
best-effort service of IP?

92. Which of following services belong to the data link All of the above
layer?

93. Which ARQ flow control protocol is used by TCP? Stop-and-await

94. By framing, frame boundaries can be determined us- All of the above
ing

95. Which of following statements are true about framing All of the above
protocols ?

96. In IP network, which of the following statement is Packets always ar-


incorrect rive on time

97. Framing involves identifying the beginning and end True


of a block of information within a digital stream

98. Which of the following statements are true for PPP All of the above
byte stuffing

99. In PPP authentication, which of the following is true Transmitted unen-


for Password Authentication Protocol crypted, suscepti-
ble to eavesdrop-
ping

After several at-


tempts, LCP clos-
es link
10 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu

Initiator must send


ID and password

100. In HDLC frame format, flag is used to identify sec- False


ondary station (1 or more octets)

101. Perform the bit stuffing procedure for the following 110111110110111110
binary sequence: 1101111111011111110101. What is
the outcome?

102. Perform bit de-stuffing for the following sequence: 000100000100000110


11101111101111100111110.

103. PPP is a data link protocol for point-to-point lines in Byte stuffing
Internet. Its framing is based on which of the follow-
ing?

104. HDLC is another data link control protocol widely in Bit stuffing
use. Its framing is based on which of the following?

105. Which of following statements are true for HDLC? All of the above

106. In PPP authentication, which of the following is Initiator and au-


true for Challenge-Handshake Authentication Proto- thenticator share a
col (CHAP) secret key

Authenticator can
reissue challenge
during session

107. In error detection and loss recovery, which of the All of the above
following statement is correct

108. In multiplexing, Last IN First Out (LIFO) is used to False


determine the order of packet transmission

109. Generic Framing Procedure (GFP) allows the imple- True


mentation of multiple transport modes that may co-
exist within the same transport channel
11 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu

110. In Generic Framing Procedure (GFP), which of the GFP uses an


following sentences are correct explicit payload
length indica-
tor provided in
its frame head-
er to accom-
modate variable
length PDUs

GFP provides flex-


ible encapsulation
framework that
supports either a
fixed or vari-
able length frame
structure

111. What is the primary function of medium access con- It is to minimize or


trol? eliminate the inci-
dence of collisions
of a shared com-
munication link.

112. What is the primary benefit provided by the Slotted Higher maximum
ALOHA compared to ALOHA? throughput

113. What is the vulnerable period of collisions in ALOHA? Two frame trans-
mission time

114. What is the vulnerable period of collisions in Slotted One frame trans-
ALOHA? mission time

115. What is the vulnerable period of collisions in Carrier One propagation


Sense Multiple Access (CSMA)? delay

116. The primary function of Media Access Control is to true


minimize or eliminate the instance of the collisions
to achieve a reasonable utilization of the medium

117.
12 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
In media sharing techniques, which of the following Frequency Divi-
are channelization approaches sion Multiple Ac-
cess

Time Division Mul-


tiple Access

Code Division
Multiple Access

118. Corresponding box of Carrier Sense Multiple Ac- Persistent process


cess/Collision Detection can be replaced by one of
the

119. Random access is also called the Contention meth-


ods

120. In Carrier Sense Multiple Access (CSMA), possibility Propagation delay


of collision still exist because of

121. Polling is a scheduling approach for dynamic medium All of the above
access control. Which of following statements are
correct?

122. 2) In a collision-free reservation system that has a Slotted ALOHA


large number of light-traffic stations, and the de-
lay-bandwidth product is larger than 1. Which of fol-
lowing MAC protocol is a good fit for stations to
reserve mini-slots?

123. In Carrier Sense Multiple Access with collision detec- Round-trip propa-
tion (CSMA-CD), how long will it take a collision to be gation delay
detected and resolved?

124. Suppose that the ALOHA protocol is used to share 10 frame per sec-
a 56 kbps satellite channel. Suppose that frames are ond
1000 bits long. What is the maximum throughput of
the system in number of frames per second.

125. 1250 Bytes


13 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
Consider building a CSMA/CD network running at
1Gbps over a 1-km cable. The signal speed in the
cable is 200,000 km/sec. What is the minimum frame
size?

126. In media access control, which of the following state- Inefficient for
ments are true for Channelization bursty traffic

Does not scale


well to large num-
bers of users

Inflexible in allo-
cating bandwidth
to users with
different require-
ments

127. Time-out period is equal to maximum possible prop- Round-trip


agation delay of

128. In Carrier Sense Multiple Access (CSMA), if station Reduced


senses medium before trying to use it then chance of
collision can be

129. Carrier Sense Multiple Access (CSMA) is based on Sense before


medium called transmit

130. Which of the following is not true for MAC scheduling Reduced compu-
tational or proce-
dural complexity

131. Which of following features are typically true for local All of the above
area networks?

132. Use HDLC and Ethernet to identify similarities be- Both contains
tween medium access control and data link control framing informa-
protocols. Which of following statements are true? tion that delin-
eates the begin-
ning and end of
14 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
each frame.

Both check the


CRC in the re-
ceived frames for
errors

133. Use IEEE 802.3 and IEEE 802.11 to discuss differ- All of the above
ences between wired and wireless LANs. Which of
following statements are true about the differences?

134. Which of following is not a primary responsibility of Reliable connec-


the MAC sublayer in LANs? tion-oriented ser-
vice

135. In Ethernet, slot time that is at least the round-trip All of the above
propagation delay, is the critical system parameter for

136. Which one of the following event is not possible in Collision detection
wireless LAN.

137. In 802.11 protocol, MAC can alternate between Con- True


tention Periods (CPs) and Contention-Free Periods
(CFPs)

138. CSMA/CD is not used in DCF because a station is un-


able to listen to the
channel for colli-
sions while trans-
mitting

139. In infrastructure network supporting voice and data False


traffic, data traffic is transported through the CP and
voice traffic through the CFP

140. In 802.11 protocol, which of the following statements Stations in BSS


are true for Basic Service Set (BSS) can communicate
with each other

Location in a Ba-
15 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
sic Service Area
(BSA)

141. Consider a Gigabit Ethernet hub with stations at a 0.122


100-meter distance and average frame size of 512
bytes. Assume the propagation speed is at 2/3 of light
speed. What is the value of normalized delay-band-
width product?

142. Wireless data communication is compelling, because Its easy and


of low-cost deploy-
ment

Its support to per-


sonal and mobile
devices

143. Why not use CSMA/CD in a wireless LAN? The prima- The hidden station
ry reason is problem

144. In IEEE 802.11 MAC for wireless LANs, which of fol- SIFS
lowing inter-frame space (IFS) is used to transmit
high-priority frames such as ACKs?

145. Which of following statements identifies the similar- Both contain fram-
ity between HDLC (data link control) and Ethernet ing information
(medium access control) that delineates the
beginning and end
of each frame

146. Which multiple access technique is used by IEEE CDMA*


802.11 standard for wireless LAN? ALOHA*

147. Which of the following are management services of- Power manage-
fered by the MAC sublayer in wireless LAN ment

Roaming within
ESS

148.
16 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
In CSMA/CA, An amount of time divided into slots Contention proce-
called dure*
Contention sig-
nals*

149. In medium access control sublayer, medium usage False


is mediated by the access control during contention
period

150. In Carrier Sense Multiple Access/Collision Detection Signal*


(CSMA/CD), to continue transmission process we use Station*
a

17 / 17

You might also like