Ans: A: 18Csc363J-Computer Networks Question Bank MCQ
Ans: A: 18Csc363J-Computer Networks Question Bank MCQ
Question Bank
MCQ
The pairs of OSI protocol layer/sub-layer and its functionality are given below, the
INCORRECT pair from among these are:
Ans: a
Which of these is a Transmission media that can be used in LAN?
fibre optics
coaxial cable
microwave
satellite
Ans: a
The Spread spectrum expands the required bandwidth for to each station from B to Bss by
adding _____________
noise
Spreading code
K-bit pattern
Frequency
Ans: B
The purpose of twisting the cable in twisted pair is_____________
Balance the noise
Cover more distance
Avoid refraction
Avoid reflection
Ans:A
Which of the following is not the fundamental characteristics of data communication?
Jitter
Timeliness
Accuracy
Redundancy
Ans: D
The ______ field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port
TCP process may not write and read data at the same speed. So we need __________ for
storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
In segment header, sequence number and acknowledgement number fields refer to _______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered
10001. What is the sequence number of the segment if all data is sent in only one segment?
a) 10000
b) 10001
c) 12001
d) 11001
Bytes of data being transferred in each connection are numbered by TCP. These numbers
start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s
The Minimum size of the process data that can be encapsulated in a user datagram
Protocol(UDP) datagram would be
0 Bytes
4 bytes
8 bytes
28 bytes
0
1
-1
-2
A leaky bucket algorithm shapes bursty traffic into fixed rate traffic by averaging the
a) data rate
b) average rate
c) traffic rate
d) traffic shaping
In Quality of Service (QoS) techniques, packets wait in a buffer (Queue) until the node is
ready to process them in
a) Out-of-order Ones
b) First-in First Out
c) Last-in First Out
d) First-in-Last Out
Integrated Services is based on flow based Quality of Service model is designed for
a) CPU
b) Data Node
c) IP
d) Traffic Shaping
The commands, from client to server, and replies, from server to client, are sent across the
control connection in ________ bit ASCII format.
a) 8
b) 7
c) 3
d) 5
The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is
________
a) Stream mode
b) Block mode
c) Compressed mode
d) Message mode
The number of objects in a Web page which consists of 4 jpeg images and HTML text is
________
a) 4
b) 1
c) 5
d) 7
The time taken by a packet to travel from client to server and then back to the client is called
__________
a) STT
b) RTT
c) PTT
d) JTT
In the process of fetching a web page from a server the HTTP request/response takes
__________ RTTs.
a) 2
b) 1
c) 4
d) 3
The values GET, POST, HEAD etc are specified in ____________ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
The __________ method when used in the method field, leaves entity body empty.
a) POST
b) SEND
c) GET
d) PUT
9. The HTTP response message leaves out the requested object when ____________ method
is used
a) GET
b) POST
c) HEAD
d) PUT
a) 255.243.240.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255
ICMP is primarily used for __________
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing
The Open Shortest Path First(OSPF) protocol is an intra-domain routing protocol based on
____________ routing.
a). distance vector
b). link state
c). path vector
d). non distance vector
The RIP protocol cannot have more than 15 hops if infinity is defined as
a). 13
b). 14
c). 15
d). 16
An endpoint of an inter-process communication flow across a computer network is called?
A. socket
B. pipe
C. port
D. machine
Unlike TCP, this alternative method of data exchange does not provide the service of
dividing a message into packets and reassembling it at the other end, but instead relies on the
application program to make sure that the entire message has arrived and is in the right order.
a. SMTP
b. UDP
c. DHCP
d. ARP
In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window
(A) does not increase
(B) increases linearly
(C) increases quadratically
(D) increases exponentially
Electronic mail uses this Application layer protocol:
A. SMTP
B. HTTP
C. FTP
D. SIP
3. Which one of the following statements is NOT correct about HTTP cookies?
(A) A cookies is a piece of code that has the potential to compromise the security of an
Internet user
(B) A cookie gains entry to the user’s work area through an HTTP header
(C) A cookie has an expiry date and time
(D) Cookies can be used to track the browsing pattern of a user at a particular site
The loss in signal power as light travels down the fiber is called
a) Attenuation
b) Propagation
c) Scattering
d) Interruption
If data rate of ring is 20 Mbps, signal propagation speed is 200 b/ms, then number of bits that
can be placed on the channel of 200 km is
a). 2000 bits
b) 20000 bits
c) 1000 bits
d) 4000 bits
Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
When 2 or more bits in a data unit has been changed during the transmission, the error is
called ____________
a) random error
b) burst error
c) inverted error
d) double error
A slotted ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What
is the throughput if the system (all stations together) produces 1000 frames per second?
a). 364
b). 368
c). 372
d). 380
a. Resolver
b. Mapper
c. Primary Server
d. Secondary Server
Transport layer aggregates data from different applications into a single stream before
passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
Which among the following are delivered by the transport layer in process-to-process
delivery mechanism?
a. Frames
b. Datagrams
c. Packets
d. Bits
Which of the following system calls results in the sending of SYN packets?
(A) socket
(B) bind
(C) listen
(D) connect
Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD) algorithm
where the window size at the start of the slow start phase is 2 MSS and the threshold at the
start of the first transmission is 8 MSS. Assume that a timeout occurs during the fifth
transmission. Find the congestion window size at the end of the tenth transmission.
(A) 8 MSS
(B) 14 MSS
(C) 7 MSS
(D) 12 MSS
Which of the following is/are example(s) of stateful application layer protocols?
(i) HTTP
(ii) FTP
(iii) TCP
(iv) POP3
a.(i) and (ii) only
b.(ii) and (iii) only
c.(ii) and (iv) only
d.(iv) only
The Application layer in TCP/IP contains the ___________ protocols.
a.Routing
b.Routed
c.Communication
d.Process-to-process
Telnet protocol is used to establish a connection to
a.TCP port number 21
b.TCP port number 22
c.TCP port number 23
d.TCP port number 24
If 5 files are transferred from server A to client B in the same session. The number of TCP
connection between A and B is
a.5
b.10
c.2
d.6
If you have to send multimedia data over SMTP it has to be encoded into
a.Binary
b.Signal
c.ASCII
d.HDB3
Descriptive Question
Discuss about physical properties and medium access protocol of Ethernet.
List the various categories of Multiplexing. Explain each.
Describe the CSMA/CD protocol and comment on its performances for medium access.
The message 11001001 is to be transmitted using CRC error detection algorithm. Assuming
the CRC polynomial to be x 3 + 1, determine the message that should be transmitted. If the
second left most bit is corrupted, show that it is detected by the receiver.
Explain in detail the operation of OSPF protocol by considering a suitable network.
i) A host with IP address 130.23.43.20 and physical address 0xB23455102210. Another host
with IP address 130.23.43.25 and physical address 0xA46EF45983AB. The two hosts are on
the same Ethernet network. Show the ARP request packet encapsulated in Ethernet frames.
ii) Explain the Packet format of RARP with neat sketch
Explain the congestion control techniques to improve the QOS of the computer Network
Discuss the need for name resolution. Illustrate the domain name hierarchy and the steps in
resolution
Discuss briefly about Electronic mail (SMTP, MIME and IMAP)
Discuss the functions of SNMP in detail
Explain in detail about OSI layer model with neat diagram
A)For n devices in a network, what is the number of cable links required for a mesh, ring,
bus, and star topology and I/O port required for mesh and star topology?
B)For each of the following four networks, discuss the consequences if a connection
fails.
a. Five devices arranged in a mesh topology
b. Five devices arranged in a star topology (not counting the hub)
c. Five devices arranged in a bus topology
d. Five devices arranged in a ring topology
How frame order and flow control is achieved using the data link layer? Explain.
i)Given the dataword 1010011010 and divisor 10111. Show the generation of the codeword
at the sender side and show the checking of the codeword at the receiver side.
ii) Explain steps involved in sender and receiver side in checksum
i) A slotted pure aloha network transmits 200 bit frames on a shared channel of 200 kbps.
What is the throughput if the system (all station together) produces a) 1000 frames per second
b) 500 frames per second c) 250 frames per second?
ii) Write short notes on ARP.
Explain the RIP algorithm with a simple example of your choice
Explain the principles of congestion control in TCP.
Explain the following:
(i) DEC bit
(ii) RED
Discuss in detail about HTTP operation
i. Explain Telnet in detail.
ii. Illustrate the role of POP3 in electronic mail applications.Explain in detail.
Explain the duties of transport layer?
Computer A has 19.5MB to send on a network and transmits the data in a burst @
6 Mbps. The maximum transmission rate across routers in the network is 4 Mbps.
If Computer A's transmission is shaped using a leaky bucket, how much capacity
must the queue in the bucket hold not to discard any data?
A leaky bucket is at the host network interface. The data rate on the network is 2MByte/s and
the data rate on the link from the host to the bucket is 2.5Mbyte/s.
In your view is there any alternative model to the OSI model? If yes, explain that model and
compare with OSI model. If no, explain OSI model in detail with each layer’s functionality.
B) How does the following Ethernet address appear on the line in memory?
a. 1A:3B:4C:6D:2E:1F
b. 47:20:1B:2E:08:EE
A) For n devices in a network, what is the number of cable links required for a mesh,
ring, bus, and star topology and I/O port required for mesh and star topology?
B) For each of the following four networks, discuss the consequences if a connection
fails.
a. Five devices arranged in a mesh topology
b. Five devices arranged in a star topology (not counting the hub)
c. Five devices arranged in a bus topology
d. Five devices arranged in a ring topology
A) i)Given the dataword 1010011010 and divisor 10111. Show the generation of the
codeword at the sender side and show the checking of the codeword at the receiver side.
ii) Explain steps involved in sender and receiver side in checksum
B) i) A pure aloha network transmits 200 bit frames on a shared channel of 200 kbps.
What is the throughput if the system (all station together) produces a) 1000 frames per second
b) 500 frames per second c) 250 frames per second?
ii) Explain stop and wait protocol
Hosts A and B are communicating over a TCP connection, and Host B has already received
from A all bytes up through byte 126. Suppose Host A then sends two segments to Host B
back-to-back. The first and second segments contain 80 and 40 bytes of data respectively. In
the first segment, the sequence number is 127, the source port number is 302, and the
destination port number is 80. Host B sends an acknowledgment whenever it receives a
segment from Host A.
a) In the second segment sent from Host A to B, what are the sequence number,
source port number, and destination port number?
b) If the first segment arrives before the second segment, in the acknowledgment
of the first arriving segments, what is the ACK number, the source port
number and the destination port number?
c) If the second segment arrives before the first segment, in the ACK of the first
arriving segment, what is the ACK number?
a) Encrypt "INTERNET" using a transposition cipher with the following key:
35214
12345
b) Encrypt the message "THIS IS AN EXERCISE" using a shift cipher with a key
of 20.
Ignore the space between words. Decrypt the message to get the original
plaintext.
In File Transfer Protocol transaction, assume a client with user name Alice needs to
retrieve his file named as “Computer Networks 5” from the server systems directory
/Course/Computer Networks/Unit5. After that, the client needs to upload the new file
named as “Computer Network 6” is to the above same directory path available in the
server. Show that, what are the commands used for the above transaction and also for
response messages exchanged between the FTP client and the FTP server. The client
system chosen ephemeral port number 58013 used for downloading the file from server
and ephemeral port number 59051 used for uploading the file from client to server. Draw
the necessary diagram to show the exact message exchange sequence.
Write the scenario for SMTP protocol services between for the Server and Client systems,
which shows the mail transaction done by Mani from host abc.com and also Babu, David
and Arun both have forwarded the same way from host imp.com. Here assume that, for
the above transaction the host abc.com contacts the host imp.com directly to exchange
email messages. The mail has been received and accepted by Babu and Arun. but, David
does not receive any email since he has not having mailbox at host imp.com. Explain the
following scenarios
In a TCP connection, the initial sequence number at the client site is 2171. The client opens the
connection, sends three segments, the second of which carries 1000 bytes of data, and closes
the connection. What is the value of the sequence number in each of the following segments
sent by the client?
a. The SYN segment
b. The data segment
c. The FIN segment
d. With neat sketch explain the sequence.
(a)How a client can directly connect to a server using TELNET, which logs into port 80?
(b)How a client can imposes the modification of data and time condition on a request?
Explain the following:
a) DEC bit
b) RED