CN IMPs

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

IMPs

What are the general principles of congestion?what is the difference between open loop and
closed loop congestion? Explain congestion control in virtual circuit sub nets and datagram
subnets
What is the format of IPv4 header? Describe the significance of each field.
Discuss the internetworking of network layer in internet .Explain about Tunneling
Explain QOS in Network layer? Explain leaky bucket and token bucket algorithms.
Are the TCP Connections are half- duplex? How the Connections will release in TCP?
Illustrate the Scenarios for establishing a connection using a Three-Way Handshake.
Define UDP,diffrenec netween TCP and UDP? and discuss the different fields of the format
of a used datagram(UDP)
Discuss the following with respect to Transmission Control Protocol
i. TCP connection management modeling
ii. TCP segment header.

Describe importance of DNS in application layer


With neat sketch explain the architecture, services and message format of Electronic Mail.
Explain in detail about the SNMP

1. UDP and TCP are both transport layer protocols.


2. The packet sent by a node to the source to inform it of congestion is called _______
a) Explicit b) Discard c) Choke d) Backpressure
3. In the transport layer port address is needed for process to process communication.
4. Internet Control Message Protocol (ICMP) has been designed to compensate
_________
a) Error-reporting
b) Error-correction
c) Host and management queries
d) All of the mentioned
5. A piece of icon or image on a web page associated with another webpage is
called____

a. URL b. Hyperlink c. Plugin d. Extension


6. What is the header size of a UDP packet?

a.8 bytes b. 8 bits c.16 bytes d.124 b


7. The time taken by a packet to travel from client to server and then back to the
client is called ______

a.STT b. RTT c. PTT d. JTT


8. The application-level protocol in which a few manager stations control a set of
agents is called_____

a)HTML b. TCP c. SNMP d. SNMP/IP


9. DNS can obtain the____of host if its domain name

a. Station address b. IP address c. Port address d. Checksum


10. 7 bits network Id and 24 bit Host Id of IP address is_

a. Class A b. Class B c. Class C d. Class


11. Closed-Loop control mechanisms try to _________Congestion.
12. DNS database consists of_________
13. URL stands for____________
14. A collection of Web pages are called_______
15. Communication offered by TCP is______________
16. The default header size of a IPV4 is_____________

17. Closed loop Protocols that allow system to enter congested state, detect it, and
remove it.
18. To accomplish flow control, TCP uses a sliding window protocol.
19. Which is not a application layer protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP
20. In the transport layer _______ address is needed for process to process
communication.
A) Port B) IP C) MAC D) none of the above
21. Which of the following does TCP guarantee? flow control B) connection-oriented
delivery
22. The ports ranging from 0 to 1023 are assigned and controlled by IANA are called
well-known ports.
23. Which of the following does TCP guarantee?
24. A) flow control B) connection-oriented delivery C) both a & b D) none of
the above
25. __________ regulates the average rate and burstiness of a flow of data entering the
network
26. The technique in which a congested node stops receiving data from the immediate
upstream node or nodes is called as __ Backpressure _____
In web pages, which document script can run by the server?
A) Static documents B) Dynamic documents C) Active documents D) none of the
above
27. Electronic mail uses which Application layer protocol?
a) SMTP b) HTTP c) FTP d) SIP
28. __________joins multiple, different networks into a single larger network.
29. In Email, User agent does not support this__

a. Composing messages b. Reading messages


c. Replying messages d. Routing messages
30. In TCP, sending and receiving data is done as___

a. Stream of bytes b. Sequence of characters


c. Lines of data d. Packets
31. 20.. What is the default header size of a IPV4 packet?
32. a. 8 bytes b. 8 bits c.16 bytes d.20 Bytes

33. The packet of information at the application layer is called __________


a) Packet b) Message c) Segment d) Frame
34. . _______is a companion to IP that returns error information
A) ARP B) RARP C) ICMP D) DHCP
35. Which layer is responsible for process-to-process delivery?
a) Physical layer
b) Network layer
c) Transport layer
d) Application layer
36. Protocols that allow system to enter congested state, detect it, and remove it.
A) open-loop B) closed loop C) fixed loop D) none of these
37. Which of this is not a class of IP address?
a) Class E
b) Class C
c) Class D
d) Class F
38. To deliver a message to the correct application program running on a host, the
_______ address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
39. To accomplish flow control, TCP uses a ___________ window protocol.
A) limited-size B) sliding C) fixed-size D) none of the above
40. In the slow-start algorithm, the size of the congestion window increases __________
until it reaches a threshold.
a) exponentially
b) additively
c) multiplicatively
d) suddenly
41. In web pages, which document script can run by the client? [ ]
A) Static documents B) Dynamic documents C) Active documents D) none of the
above

42. 20.The combination of an IP address and port number is called as ________


a) Socket address
b) Port address c) MAC address d) Host address

43. SMTP Stands for_________


44. The IPV6 address size is_________
45. DNS Record Consists of_______________ number of attributes.
46. The ports ranging from 0 to 1023 are assigned and controlled by IANA are called
________ ports.
A) well-known B) registered C) dynamic D) none of the above
47. Traffic shappingregulates the average rate and burstiness of a flow of data entering
the network
48. Connection establishment in TCP is done by which mechanism?
a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronization
49. Expand SNMP__Simple network management protocol
50. In TCP, sending and receiving data is done as _______
a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets
51. TCP service is obtained by both the sender and receiver creating end points, called
Sockets
52. 27 Communication offered by TCP is ________
a) Full-duplex b) Half-duplex c) Semi-duplex
d) Byte by byte
53. 27. A TCP segment consists of a fixed 20-byte header (plus an optional part)
followed by zero or more data bytes.
54. 28. Typically the TCP port used by SMTP is _________
a) 25 b) 35 c) 50 d) 15
Persistent Timeris designed to prevent a deadlock situation where, the sender keeps
waiting for a window update from the receiver, which is lost
55. 30. Which of the following is false with respect to UDP?
a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
56. Domain name system used primarily for mapping host names to IP addresses
57. The ____________ translates internet domain and host names to IP address.
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
A Mail Agent is normally a program (sometimes called a mail reader) that accepts a
variety of commands for composing, receiving, and replying to messages
. In the network HTTP resources are located by
a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) union resource locator
58. Static web pages contain the same pre-written content each time the page is loaded
59. The ______ field is used to detect errors over the entire user datagram.
a) udp header b) checksumc) source port d) destination port
60. TCP service is obtained by both the sender and receiver creating end points, called
___________
61. A _______segment consists of a fixed 20-byte header (plus an optional part)
followed by zero or more data bytes.
62. ________is designed to prevent a deadlock situation where, the sender keeps waiting
for a window update from the receiver, which is lost
63. Quality of Service mechanisms let a network with less capacity meet application
requirements just as well at a lower cost
64. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags b) Offset c) TOS d) Identifier
65. When displaying a web page, the application layer uses the _____________
a) HTTP protocol b) FTP protocol c) SMTP protocol d) TCP protocol
66. Admission control takes a traffic flow specification and decides whether the network
can carry it.
67. User agent does not support this ___________
a) Composing messages b) Reading messages c) Replying messages d) Routing
messages
68. Dynamic web page ______
a) is same every time whenever it displays
b) generates on demand by a program or a request from browser
c) both is same every time whenever it displays and generates on demand by a
program or a request from browser
d) is different always in a predefined order
69. Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) CSS
70. In transport layer, Multiplexing is done at _________
a) Channel
b) Receiver site
c) Sender site
d) Packet
71. ___________________________used primarily for mapping host names to IP
addresses
72. A______________is normally a program (sometimes called a mail reader) that
accepts a variety of commands for composing, receiving, and replying to messages
73. ____________web pages contain the same pre-written content each time the page is
loaded
74. ___________________________ mechanisms let a network with less capacity meet
application requirements just as well at a lower cost
75. _____________________takes a traffic flow specification and decides whether the
network can carry it.
76. The size of an IP address in IPv6 is 128 bits.
77. Which of the following is the broadcast address for a Class B network ID using the
default subnetmask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
78. “otal length” field in UDP packet header is the length of _________
a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data
79. . What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number b) Acknowledgment number c) Checksum d) Both Sequence &
Acknowledgment number
80. HTTP________________________

You might also like