Professional Documents
Culture Documents
A) Both stations can transmit and receive data at the same time
B) One device can send other device can only accepts
C) One device sends and other device receives and vice versa
D) No of the above correct
A) Multipoint
b) Single point
c) Link
d) Dedicated point
4) If one link fails, only that link is affected. All other links remain active. Which topology does
this? (B)
A) Mesh topology
B) Star topology
c) Bus topology
D) Physical topology
(A) n(n–1)/2
(B) n(n+1)/2
(C) 2n
(D) 2n+1
8) Decryption and encryption of data are the responsibility of which of the following layer? (C)
9) Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a
speed of 1200 bps? (C)
A) 10
B) 12
C) 120
D) 1200
E) None of the above
Application layer
11) Alex is required to provide information on how many people are using the network at one time.
Which network will enable him to do so? (C)
A) Ethernet
B) Token ring
C) Server-based
D) Star
12) The protocol data unit (PDU) for the application layer in the Internet stack is (C )
(A) Segment
(B) Datagram
(C) Message
(D) Frame
13) Which is the main protocol used to access data on the World Wide Web (WWW)? (B)
A) FTP
B) HTTP
C) SMTP
D) RIP
14) Which client accesses the Web server by using a GET MESSAGE? (B)
A) FTP
B) HTTP
C) SMTP
D) IMAP
16) Which protocol differs from other client/server applications in that it establishes two
connections between the hosts? (A)
A) FTP
B) HTTP
C) UDP
D) IMAP
17) Which is used as a supplementary protocol that allows non-ASCII data to be sent through e-
mail? (A)
A) FTP
B) SMTP
C) NNTP
D) TFTP
A) 3
B) 4
C) 2
D) 1
20) Which hierarchy is served by the servers to query when resolving a TLD? (C)
A) Client server
B) Name server
C) Root name server
D) Both A & B
21) In which resolution the client may send its request to multiple servers before getting an answer.
(A)
A) Iterative resolution
B) Recursive resolution
C) Reverse resolution
D) Name-address resolution
A) Generic domains
B) Country domains
C) Inverse domain
D) None of the above
23) Resolution of the IP address in which the client sends its request to a server that eventually
returns a response? (B)
A) Iterative resolution
B) Recursive resolution
C) Specific resolution
D) Lowest resolution
25) What is the maximum size of data that the application layer can pass on to the TCP layer below?
(A ) )
(A) Any size
(B) 216 bytes – size of TCP header
(C) 216 bytes
(D) 1500 bytes
26) Identify the correct order in which the following actions take place in an interaction between a web
browser and a web server. (A)
using HTTP.
using DNS.
(A) 4,2,1,3
(B) 1,2,3,4
(C) 4,1,2,3
(D) 2,4,1,3
27) A graphical HTML browser resident at a network client machine Q accesses a static HTML webpage
from a HTTP server S. The static HTML page has exactly one static embedded image which is also at S.
Assuming no caching, which one of the following is correct about the HTML webpage loading (including the
embedded image)? (B)
(A) Q needs to send at least 2 HTTP requests to S, each necessarily in a separate TCP connection to server
S
(B) Q needs to send at least 2 HTTP requests to S, but a single TCP connection to server S is sufficient
(C) A single HTTP request from Q to S is sufficient, and a single TCP connection between Q and S is
necessary for this
(D) A single HTTP request from Q to S is sufficient, and this is possible without any TCP connection between
Q and S
28) In one of the pairs of protocols given below, both the protocols can use multiple TCP connections
between the same client and the server. Which one is that? (A)
(A) HTTP, FTP
(B) HTTP, TELNET
(C) FTP, SMTP
(D) HTTP, SMTP
29) Which one of the following statements is NOT correct about HTTP cookies? (A)
(A) A cookies is a piece of code that has the potential to compromise the security of an Internet user
(B) A cookie gains entry to the user’s work area through an HTTP header
(C) A cookie has an expiry date and time
(D) Cookies can be used to track the browsing pattern of a user at a particular site
30) Which of the following is/are example(s) of stateful application layer protocols? (C )
(i) HTTP
(ii) FTP
(iii) TCP
(iv) POP3
Transport Layer
31) Select the error which is not related to error detection (A)
A) Burst error
B) Parity checking
C) Cyclic Redundancy check
D) Check sum
A) Logical Address
B) Physical Address
C) Port Address
D) Specific Address
A) TCP
B) UDP
C) SCTP
D) FTP
34) When data and acknowledgement are sent in the same segment, this technique is called as: (B)
36)Which of the following summation operation is performed on the bits to check an error detection
code ? (C)
A) Codec
B) Coder-decoder
C) Checksum
D) Attenuation
37) Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD) algorithm
where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of
the first transmission is 8 MSS. Assume that a timeout occurs during the fifth transmission. Find the
congestion window size at the end of the tenth transmission. (C)
(A) 8 MSS
(B) 14 MSS
(C) 7 MSS
(D) 12 MSS
38) Which of the following system calls results in the sending of SYN packets? (D)
(A) socket
(B) bind
(C) listen
(D) connect
39) In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window (D)
(A) does not increase
(B) increases linearly
(C) increases quadratically
(D) increases exponentially
40) Which one of the following uses UDP as the transport protocol? (C)
(A) HTTP
(B) Telnet
(C) DNS
(D) SMTP
41) Let the size of congestion window of a TCP connection be 32 KB when a timeout occurs. The
round trip time of the connection is 100 msec and the maximum segment size used is 2 KB. The
time taken (in msec) by the TCP connection to get back to 32 KB congestion window is _________.
( A)
(A) 1100 to 1300
(B) 800 to 1000
(C) 1400 to 1600
(D) 1500 to 1700
42) The maximum window size for data transmission using the selective repeat protocol with n-bit
frame sequence numbers is: (B)
(A) 2^n
(B) 2^(n-1)
(C) 2^n – 1
(D) 2^(n-2)
43) Which of the following functionalities must be implemented by a transport protocol over and
above the network protocol ? (D)
(A) Recovery from packet losses
(B) Detection of duplicate packets
(C) Packet delivery in the correct order
(D) End to end connectivity
44) Which of the following is not true about User Datagram Protocol in transport layer? (B)
(A) Works well in unidirectional communication, suitable for broadcast information.
(B) It does three way handshake before sending datagrams
(C) It provides datagrams, suitable for modeling other protocols such as in IP tunneling or Remote
Procedure Call and the Network File System
(D) The lack of retransmission delays makes it suitable for real-time applications
45) Suppose two hosts use a TCP connection to transfer a large file. Which of the following
statements is/are False with respect to the TCP connection? (B)
1. If the sequence number of a segment is m, then the sequence
number of the subsequent segment is always m+1.
2. If the estimated round trip time at any given point of time
is t sec, the value of the retransmission timeout is always
set to greater than or equal to t sec.
3. The size of the advertised window never changes during the
course of the TCP connection.
4. The number of unacknowledged bytes at the sender is always
less than or equal to the advertised window
(A) 3 only
(B) 1 and 3 only
(C) 1 and 4 only
(D) 2 and 4 only
47) Consider a network connecting two systems located 8000 kilometers apart. The bandwidth of
the network is 500 × 106 bits per second. The propagation speed of the media is 4 × 106 meters per
second. It is needed to design a Go-Back-N sliding window protocol for this network. The average
packet size is 107 bits. The network is to be used to its full capacity. Assume that processing delays
at nodes are negligible. Then, the minimum size in bits of the sequence number field has to be (C)
________.
(A) 2
(B) 4
(C) 8
(D) 16
48) Identify the correct order in which a server process must invoke the function calls accept, bind,
listen, and recv according to UNIX socket API. (B)
(A) listen, accept, bind recv
(B) bind, listen, accept, recv
(C) bind, accept, listen, recv
(D) accept, listen, bind, recv
49) The transport layer protocols used for real time multimedia, file transfer, DNS and email,
respectively are: (C)
(A) TCP, UDP, UDP and TCP
(B) UDP, TCP, TCP and UDP
(C) UDP, TCP, UDP and TCP
(D) TCP, UDP, TCP and UDP
50) Which of the following transport layer protocols is used to support electronic mail? (C)
(A) SMTP
(B) IP
(C) TCP
(D) UDP