You are on page 1of 5

Pharos University in Alexandria Communications and Computer Networks

Faculty of Engineering Sheet 5

Pharos University in Alexandria Communications and Computer Networks


Faculty of Engineering Course Code: EC 363
Computer Engineering Department Lecturer: Dr. Nagwa EL Meniawy
Fall 2023/2024

Sheet 5
1. Internet Control Message Protocol (ICMP) has been designed to
compensate ________
a)Error-reporting
b)Error-correction
c)Host and management queries
d) All of the mentioned
Answer: d
Explanation: IP by itself does not provide the features of error
reporting or error correction. So, to address these issues a
network layer protocol called Internet Control Message
Protocol is used. ICMP operates over the IP packet to provide
error reporting functionality.

2. During error reporting, ICMP always reports error messages to


________
a)Destination
b)Source
c)Next router
d) Previous router

Answer:b
Explanation: ICMP notifies the source about the error when an error is
detected because the datagram knows information about source and
destination IP address. The source can then retransmit the data again or
try to correct those errors.
Pharos University in Alexandria Communications and Computer Networks
Faculty of Engineering Sheet 5

3. When a router cannot route a datagram or host cannot deliver a


datagram, the datagram is discarded and the router or the host sends a
____________ message back to the source host that initiated the
datagram.
a)Destination unreachable
b)Source Quench
c)Router error
d) Time exceeded
Answer:a
Explanation: The Router sends a destination unreachable message if the
destination is not found. Destination unreachable is a type 3 error
reporting message. It is invoked when the router can’t find a path to the
intended destination to forward the packet through.

4. In case of time exceeded error, when the datagram visits a router, the
value of time to live field is _________

a)Remains constant
b)Decremented by 2
c)Incremented by 1
d) Decremented by 1
Answer:d
Explanation: This field will be decremented by 1 at every router, and
will be zero by the time it reaches the source. This error reporting
message is type 11 and is used to prevent the router from traveling
forever in case some unknown path anomaly occurs.
Pharos University in Alexandria Communications and Computer Networks
Faculty of Engineering Sheet 5

5. There are the following statements that are given below, which of
them are correct ARP?

1. The ARP protocol is used to get the destination MAC address from
the destination IP address.
2. The ARP protocol is used to get the destination IP address from the
destination MAC address.
3. The ARP stands for Address Resolution Protocol.

a) 1,2
b)2
c)1,3
d)3

6.The ARP protocol operates on which layer of the OSI model?

a)Physical Layer
b)Network Layer
c)Session Layer
d)Application

7. An ARP request is a?
a)Unicast
b)Broadcast

8. There are the following statements that are given below, which of
them are correct RARP?
a) The RARP protocol is used to get the IP address from the MAC
address.
b)It is the opposite of ARP.
c)The Inverse is used in only the Linux operating system.
d) a &b
Pharos University in Alexandria Communications and Computer Networks
Faculty of Engineering Sheet 5

9. The RARP reply packets are normally____ _____ .


a) broadcast
b) unicast
c) multicast
d) none of the above

10. IGMP stands for


a) Internet Group Management Package
b) Internet Group Management Path
c) Internet Group Management Protocol
d) Internet Group Management Ping

11. An Ethernet multicast physical address is in the range of


a) 01 :00:5e:00:oo:oo to 01:00:5e:7f:ff:ff
b) 2 :00:5e:00:oo:oo to 01:00:5e:7f:ff:ff
c) 3 :00:5e:00:oo:oo to 01:00:5e:7f:ff:ff
d) 4 :00:5e:00:oo:oo to 01:00:5e:7f:ff:ff
Pharos University in Alexandria Communications and Computer Networks
Faculty of Engineering Sheet 5

12. An IGMP query is sent from a _______ to a _______.


a) host; host
b) host; router
c) router; host or router
d) none of the above
13. A process called _______ sends a multicast packet through WANs
that do not support physical multicast addressing.
a) tunneling
b) delayed response
c) jamming
d) none of the above

You might also like