You are on page 1of 10

Computer Networks Midterm Quiz

Duration: 100 minutes


(Document is prohibited)

Computer Networks Architecture

1) What is Unicode? (A)

A) Represents symbol or characters used in any language


B) Only few languages are supported
C) Supports only few characters
D) Characters from A to Z

2) Correct method for full duplex mode of communication (A)

A) Both stations can transmit and receive data at the same time
B) One device can send other device can only accepts
C) One device sends and other device receives and vice versa
D) No of the above correct

3) Select correct type of line configuration (A)

A) Multipoint
b) Single point
c) Link
d) Dedicated point

4) If one link fails, only that link is affected. All other links remain active. Which topology does
this? (B)

A) Mesh topology
B) Star topology
c) Bus topology
D) Physical topology

5) Match the following (B)


6) In a fully connected mesh network with n devices, the total numbers of physical channels to link
all devices are.

(A) n(n–1)/2
(B) n(n+1)/2
(C) 2n
(D) 2n+1

7) Match the following: (C)

8) Decryption and encryption of data are the responsibility of which of the following layer? (C)

(A) Physical layer


(B) Data Link layer
(C) Presentation layer
(D) Session layer

9) Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a
speed of 1200 bps? (C)
A) 10
B) 12
C) 120
D) 1200
E) None of the above

10) HUB is a _________ Device and Switch is a ________ Device. (C)


A)Unicast, Multicast
B)Malticast, Unicast
C)Broadcast, Unicast
D)None of Above

Application layer

11) Alex is required to provide information on how many people are using the network at one time.
Which network will enable him to do so? (C)
A) Ethernet
B) Token ring
C) Server-based
D) Star

12) The protocol data unit (PDU) for the application layer in the Internet stack is (C )
(A) Segment
(B) Datagram
(C) Message
(D) Frame

13) Which is the main protocol used to access data on the World Wide Web (WWW)? (B)

A) FTP
B) HTTP
C) SMTP
D) RIP

14) Which client accesses the Web server by using a GET MESSAGE? (B)

A) FTP
B) HTTP
C) SMTP
D) IMAP

15) Simple Mail Transfer Protocol is used to transfer? (C)


A) Only image files
B) Only audio files
C) Only text files
D) Only video files

16) Which protocol differs from other client/server applications in that it establishes two
connections between the hosts? (A)

A) FTP
B) HTTP
C) UDP
D) IMAP

17) Which is used as a supplementary protocol that allows non-ASCII data to be sent through e-
mail? (A)

A) Multipurpose Internet Mail Extension


B) Message transfer agent
C) Mail transfer agent
D) None of the above

18) Which protocol runs on port number 25? (B)

A) FTP
B) SMTP
C) NNTP
D) TFTP

19) Find how many types of servers does DNS define? (C )

A) 3
B) 4
C) 2
D) 1

20) Which hierarchy is served by the servers to query when resolving a TLD? (C)

A) Client server
B) Name server
C) Root name server
D) Both A & B

21) In which resolution the client may send its request to multiple servers before getting an answer.
(A)
A) Iterative resolution
B) Recursive resolution
C) Reverse resolution
D) Name-address resolution

22) Which domain is used to map an address to a name? ( C )

A) Generic domains
B) Country domains
C) Inverse domain
D) None of the above

23) Resolution of the IP address in which the client sends its request to a server that eventually
returns a response? (B)

A) Iterative resolution
B) Recursive resolution
C) Specific resolution
D) Lowest resolution

24) Consider different activities related to email. (C )

m1: Send an email from a mail client to a mail server

m2: Download an email from mailbox server to a mail client

m3: Checking email in a web browser

Which is the application level protocol used in each activity?

(A) ml: HTTP m2: SMTP m3: POP


(B) ml: SMTP m2: FTP m3: HTTP
(C) ml: SMTP m2: POP m3: HTTP
(D) ml: POP m2: SMTP m3: IMAP

25) What is the maximum size of data that the application layer can pass on to the TCP layer below?
(A ) )
(A) Any size
(B) 216 bytes – size of TCP header
(C) 216 bytes
(D) 1500 bytes

26) Identify the correct order in which the following actions take place in an interaction between a web
browser and a web server. (A)

1. The web browser requests a webpage using HTTP.

2. The web browser establishes a TCP connection


with the web server.

3. The web server sends the requested webpage

using HTTP.

4. The web browser resolves the domain name

using DNS.

(A) 4,2,1,3
(B) 1,2,3,4
(C) 4,1,2,3
(D) 2,4,1,3

27) A graphical HTML browser resident at a network client machine Q accesses a static HTML webpage
from a HTTP server S. The static HTML page has exactly one static embedded image which is also at S.
Assuming no caching, which one of the following is correct about the HTML webpage loading (including the
embedded image)? (B)
(A) Q needs to send at least 2 HTTP requests to S, each necessarily in a separate TCP connection to server
S
(B) Q needs to send at least 2 HTTP requests to S, but a single TCP connection to server S is sufficient
(C) A single HTTP request from Q to S is sufficient, and a single TCP connection between Q and S is
necessary for this
(D) A single HTTP request from Q to S is sufficient, and this is possible without any TCP connection between
Q and S

28) In one of the pairs of protocols given below, both the protocols can use multiple TCP connections
between the same client and the server. Which one is that? (A)
(A) HTTP, FTP
(B) HTTP, TELNET
(C) FTP, SMTP
(D) HTTP, SMTP

29) Which one of the following statements is NOT correct about HTTP cookies? (A)
(A) A cookies is a piece of code that has the potential to compromise the security of an Internet user
(B) A cookie gains entry to the user’s work area through an HTTP header
(C) A cookie has an expiry date and time
(D) Cookies can be used to track the browsing pattern of a user at a particular site

30) Which of the following is/are example(s) of stateful application layer protocols? (C )
(i) HTTP

(ii) FTP

(iii) TCP
(iv) POP3

(A) (i) and (ii) only


(B) (ii) and (iii) only
(C) (ii) and (iv) only
(D) (iv) only

Transport Layer

31) Select the error which is not related to error detection (A)

A) Burst error
B) Parity checking
C) Cyclic Redundancy check
D) Check sum

32) In the TCP/IP architecture, the label assigned to a process is called a? ( C )

A) Logical Address
B) Physical Address
C) Port Address
D) Specific Address

33) Which is a stream-oriented protocol? (A)

A) TCP
B) UDP
C) SCTP
D) FTP

34) When data and acknowledgement are sent in the same segment, this technique is called as: (B)

(A) Piggy packing


(B) Piggy backing
(C) Back packing
(D) Good packing

35) In CRC there is no error if the remainder at the receiver is (B)


A) equal to the remainder at the sender
B) zero
C) nonzero
D) the quotient at the sender

36)Which of the following summation operation is performed on the bits to check an error detection
code ? (C)
A) Codec
B) Coder-decoder
C) Checksum
D) Attenuation

37) Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD) algorithm
where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of
the first transmission is 8 MSS. Assume that a timeout occurs during the fifth transmission. Find the
congestion window size at the end of the tenth transmission. (C)
(A) 8 MSS
(B) 14 MSS
(C) 7 MSS
(D) 12 MSS

38) Which of the following system calls results in the sending of SYN packets? (D)
(A) socket
(B) bind
(C) listen
(D) connect

39) In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window (D)
(A) does not increase
(B) increases linearly
(C) increases quadratically
(D) increases exponentially

40) Which one of the following uses UDP as the transport protocol? (C)
(A) HTTP
(B) Telnet
(C) DNS
(D) SMTP

41) Let the size of congestion window of a TCP connection be 32 KB when a timeout occurs. The
round trip time of the connection is 100 msec and the maximum segment size used is 2 KB. The
time taken (in msec) by the TCP connection to get back to 32 KB congestion window is _________.
( A)
(A) 1100 to 1300
(B) 800 to 1000
(C) 1400 to 1600
(D) 1500 to 1700

42) The maximum window size for data transmission using the selective repeat protocol with n-bit
frame sequence numbers is: (B)
(A) 2^n
(B) 2^(n-1)
(C) 2^n – 1
(D) 2^(n-2)
43) Which of the following functionalities must be implemented by a transport protocol over and
above the network protocol ? (D)
(A) Recovery from packet losses
(B) Detection of duplicate packets
(C) Packet delivery in the correct order
(D) End to end connectivity

44) Which of the following is not true about User Datagram Protocol in transport layer? (B)
(A) Works well in unidirectional communication, suitable for broadcast information.
(B) It does three way handshake before sending datagrams
(C) It provides datagrams, suitable for modeling other protocols such as in IP tunneling or Remote
Procedure Call and the Network File System
(D) The lack of retransmission delays makes it suitable for real-time applications

45) Suppose two hosts use a TCP connection to transfer a large file. Which of the following
statements is/are False with respect to the TCP connection? (B)
1. If the sequence number of a segment is m, then the sequence
number of the subsequent segment is always m+1.
2. If the estimated round trip time at any given point of time
is t sec, the value of the retransmission timeout is always
set to greater than or equal to t sec.
3. The size of the advertised window never changes during the
course of the TCP connection.
4. The number of unacknowledged bytes at the sender is always
less than or equal to the advertised window

(A) 3 only
(B) 1 and 3 only
(C) 1 and 4 only
(D) 2 and 4 only

46) Consider the following statements.


I. TCP connections are full duplex.
I. TCP has no option for selective acknowledgment
III. TCP connections are message streams. (A)

(A) Only I is correct


(B) Only I and II are correct
(C) Only II and III are correct
(D) All of I, II and III are correct

47) Consider a network connecting two systems located 8000 kilometers apart. The bandwidth of
the network is 500 × 106 bits per second. The propagation speed of the media is 4 × 106 meters per
second. It is needed to design a Go-Back-N sliding window protocol for this network. The average
packet size is 107 bits. The network is to be used to its full capacity. Assume that processing delays
at nodes are negligible. Then, the minimum size in bits of the sequence number field has to be (C)
________.
(A) 2
(B) 4
(C) 8
(D) 16
48) Identify the correct order in which a server process must invoke the function calls accept, bind,
listen, and recv according to UNIX socket API. (B)
(A) listen, accept, bind recv
(B) bind, listen, accept, recv
(C) bind, accept, listen, recv
(D) accept, listen, bind, recv

49) The transport layer protocols used for real time multimedia, file transfer, DNS and email,
respectively are: (C)
(A) TCP, UDP, UDP and TCP
(B) UDP, TCP, TCP and UDP
(C) UDP, TCP, UDP and TCP
(D) TCP, UDP, TCP and UDP

50) Which of the following transport layer protocols is used to support electronic mail? (C)
(A) SMTP
(B) IP
(C) TCP
(D) UDP

You might also like