0% found this document useful (0 votes)
17 views7 pages

NWC203

Uploaded by

tuyenlmhe176260
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views7 pages

NWC203

Uploaded by

tuyenlmhe176260
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

networks use store-and-forward -> Computer networks, Telegraph networks

can be connection-oriented -> Computer networks, Telephone networks

similarities between message switching and packet switching -> Supporting multiple applications

DNS is a domain-name-service -> UDP


Upon receipt of a bad segment, UDP? -> It does not do flow and error control

A network used to join the individual networks at different sites into one extended network...-> VPN

Which of following protocol is HTTP built upon? -> TCP

concern of the telephone system that motivated the ARPANET design? -> Vulnerability
are features of ARPANET design? -> ALL

Which of the following is an application layer protocol? -> HTTP

Bluetooth is an example of -> Personal Area Network

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ->
Added

The ________ is the physical path over which a message travels -> Medium

Three or more devices share a link in ________ connection -> Multipoint

Which of the following is true for Transport Control Protocol -> Connection oriented

Which OSI layer is responsible for providing end-to-end communication with reliable service? ->
Transport layer
Which OSI layer is responsible for dividing the transmitted bit stream into frames? -> Data link layer

Which OSI layer is responsible for determining which route through the network to use?-> Network
layer

Which feature does the data link layer and transport layer have in common? -> Flow control

Which protocol glues the network of networks together as the Internet? -> IP

In a LAN, which address is used to transfer frames to appropriate destination? -> Physical address

(...) L = 500 bytes? -> 90%


Which of following statements is true about how the data link layer and transport layer differ?
-> Data link layer is concerned with framing and the transport layer is not

This layer is an addition to OSI model -> Presentation layer and Session layer

Which of the following applications would you select TCP protocol for? -> File transfer, Web browsing

In BSD socket API, which type of socket is used to create a TCP socket? SOCK_STREAM
In BSD socket API, which type of socket is used to create a UDP socket? SOCK_DGRAM
In BSD socket API, which system call is used to assign a network address to the socket? bind()
In BSD socket API, (...)what system call should the client use to get server's network address?
gethostbyname()

In a transmission system, which of the following statement is true for a receiver -> Receives energy from
medium, Converts received signal suitable for delivery to user ( KO CHỌN ALL )

Which of the following are advantages of optical fiber -> Noise immunity / No corrosion ( 2 ĐÁP ÁN )

Given a 7-bit information frame (0, 1, 0, 1, 1, 0, 1), what is the even parity bit? -> 0

Which of following statements are true for single-bit parity error detection? -> It can detect all single bit
errors in an information frame / It can detect all tripe bit errors in an information frame (KO CHỌN
NONE, 2 ĐÁP ÁN )

Assume bit errors occur at random. If each bit has 50% probability to be in error by transmission. What
is the probability of a four-bit frame to be in error by transmission? 1/16

What is the binary sequence that corresponds to polynomial code X^3 + x^2 + 1? -> 1101

Block codes are generated using _____. -> Generator matrix (KO CHỌN NONE)

Which of the following is true for two-dimensional parity check -> More parity bit to improve coverage /
Arrange information in columns ( 2 ĐÁP ÁN )

What is the binary equivalent of the following polynomial arithmetic


x^7 + x^6 + x^5 + x^2 + 1 -> 1100101

In networks where errors are infrequent, which approach is favored for efficiency? End-to-end approach

Which of the following statements is true about the stop-and-wait ARQ protocol? -> Stop-and-
wait is only efficient if the link delay-bandwidth product is small

If the probability of error is very low in a communication link, which of the following statements is
true about performance of ARQ protocol? -> Go-back-N ARQ and Selective Repeat ARQ
protocols have similar performance
Consider a situation where an interactive application produces a packet to send each keystroke
from the client and the server echoes each keystroke that it receives from the client. Which of
following strategies for sending ACK frames in a Go-Back-N is appropriate for the situation? ->
send an ACK frame when the next piggyback opportunity arises

Consider a bulk data transfer application where a server sends a large file that is segmented in
a number of full-size packets that are to be transferred to the client. Assume the channel has a
low probability of error. Which of following strategies for sending ACK frames in a Go-Back-N is
appropriate for the situation? -> send an ACK frame after every other frame is received

Digital communication technologies may introduce errors in communication, which of the following can
be used to provide reliable communication -> TCP, HDLC

Ensuring that information is not altered during transfer is associated with -> Integrity

Given 3 bits for sequence numbers, what is the maximum sliding window size at the receiver in Go Back
3 ARQ? -> 7 (“If the sender already set the sliding window size to be 4” – NẾU CÓ THÌ CHỌN NONE)

In the scenario above, what should be the value of frame number y at receiver B? -? 7

In peer-to-peer protocol, the purpose of Automatic Repeat Request is -> to ensure a sequence
of information packet is delivered in order, to ensure a sequence of information packet is
delivered without errors or duplication despite transmission errors and losses (2 ĐÁP ÁN)

Which of the basic elements of ARQ is associated with negative acknowledgement -> NAKs

In Go-Back-N ARQ, a procedure where transmission of a new frame is begun before the completion of
time of the previous frame transmission is called -> Pipelining

Which ARQ flow control protocol is used by TCP? Selective Repeat (KO CHỌN NONE)

In IP network, which of the following statement is incorrect -> Packets always arrive on time

In PPP authentication, which of the following is true for Password Authentication Protocol -> After
several attempts, LCP closes link / Transmitted unencrypted, susceptible to eavesdropping / Initiator
must send ID and password ( 3 ĐÁP ÁN )

PPP is a data link protocol for point-to-point lines in Internet. Its framing is based on which of the
following? -> Byte stuffing

In PPP authentication, which of the following is true for Challenge-Handshake Authentication Protocol
(CHAP) -> Initiator and authenticator share a secret key / Authenticator can reissue challenge during
session (2 ĐÁP ÁN)

HDLC is another data link control protocol widely in use. Its framing is based on which of the following?
-> Bit stuffing

Perform the bit stuffing procedure for the following binary sequence: 1101111111011111110101. What
is the outcome? 110111110110111110110101(Ở GIỮA NHIỀU SỐ 1 VÀ CÓ ĐUÔI 0101, KO CHỌN NONE

Perform bit de-stuffing for the following sequence: 11101111101111100111110. ->


11101111111111011111 (CHỈ CÓ 1 SỐ 0 Ở GẦN CUỐI(ĐÁP ÁN KHÁC CÓ 2 SỐ 0) VÀ 111111 Ở CUỐI, KO
CHỌN NONE)

In Generic Framing Procedure (GFP), which of the following sentences are correct -> GFP uses
a variation of HEC-based self delineation technique / GFP provides flexible encapsulation
framework that supports either a fixed or variable length frame structure / GFP uses an explicit
payload length indicator provided in its frame header to accommodate variable length PDUs ( 3
ĐÁP ÁN ) ( BỎ GFP rely on byte-stuffing mechanism to delineate protocol data units (PDUs) )

What is the primary function of medium access control? -> It is to minimize or eliminate the
incidence of collisions of a shared communication link. ( KO CHỌN NONE )

What is the primary benefit provided by the Slotted ALOHA compared to ALOHA? -> Higher maximum
throughput ( KO CHỌN NONE )

What is the vulnerable period of collisions in ALOHA? -> Two frame transmission time ( KO CHỌN NONE)

What is the vulnerable period of collisions in Slotted ALOHA? One frame transmission time ( KO CHỌN
NONE)

What is the vulnerable period of collisions in Carrier Sense Multiple Access (CSMA)? -> One propagation
delay

In media sharing techniques, which of the following are channelization approaches -> Data Division
Multiple Access / Code Division Multiple Access / Frequency Division Multiple Access ( 3 ĐÁP ÁN )

Corresponding box of Carrier Sense Multiple Access/Collision Detection can be replaced by one of the
-> Persistent process

Random access is also called the -> Contention methods

In Carrier Sense Multiple Access (CSMA), possibility of collision still exist because of -> Propagation delay

In a collision-free reservation system that has a large number of light-traffic stations, and the delay-
bandwidth product is larger than 1. Which of following MAC protocol is a good fit for stations to reserve
mini-slots? -> Slotted ALOHA
In Carrier Sense Multiple Access with collision detection (CSMA-CD), how long will it take a collision to
be detected and resolved? -> Round-trip propagation delay

NONE

Of the following services, which service(s) does the IP layer provides? -> NONE

Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already set the sliding window
size to be 4, what is the maximum sliding window size at the receiver? -> NONE

ALL:
Which of the following is true about the ways in which the OSI reference model and TCP/IP
reference model differ. -> ALL

The functionalities of presentation layer includes -> ALL

Which of the following statement is true for optical fiber -> ALL

Which of following statements are true for two-dimensional parity error detection? -> ALL

A service offered at a given layer can include which of the following feature(s) -> ALL

The disadvantage of Stop-and-Wait protocol -> ALL

Which of the following statements are true for the best-effort service of IP? -> ALL

Which of following services belong to the data link layer? -> ALL

By framing, frame boundaries can be determined using -> ALL

Which of following statements are true about framing protocols? -> ALL

Which of following statements are true for HDLC? -> ALL

In error detection and loss recovery, which of the following statement is correct -> ALL

Polling is a scheduling approach for dynamic medium access control. Which of following
statements are correct? -> ALL

TRUE:

1. In digital transmission, long distance digital communications require the use of a generator to recover
original data sequence and re-transmits on next segment
2. Polynomial codes are implemented using shift register circuits

3. ARQ protocols combine error detection, retransmission and sequence numbering to provide reliability
4. A service model specifies a level of performance that can be expected in the transfer of information.

5. Framing involves identifying the beginning and end of a block of information within a digital stream

6. Generic Framing Procedure (GFP) allows the implementation of multiple transport modes that may
coexist within the same transport channel

7. The primary function of Media Access Control is to minimize or eliminate the instance of the collisions
to achieve a reasonable utilization of the medium

FALSE:

1. In twisted pair, a category 5 UTP cable can support a data rate of up to 16MHz

2. In Stop-and-Wait protocol, sequence number are not required

3. In HDLC frame format, flag is used to identify secondary station (1 or more octets)

CHỌN NHIỀU ĐÁP ÁN:

1. Which of the following are advantages of optical fiber -> Noise immunity / No corrosion ( 2 ĐÁP ÁN )

2. Which of following statements are true for single-bit parity error detection? -> It can detect all single
bit errors in an information frame / It can detect all tripe bit errors in an information frame (KO CHỌN
NONE, 2 ĐÁP ÁN )

3. Which of the following is true for two-dimensional parity check -> More parity bit to improve
coverage / Arrange information in columns ( 2 ĐÁP ÁN )

4. In peer-to-peer protocol, the purpose of Automatic Repeat Request is -> to ensure a


sequence of information packet is delivered in order / to ensure a sequence of information
packet is delivered without errors or duplication despite transmission errors and losses (2 ĐÁP
ÁN)

5. In PPP authentication, which of the following is true for Password Authentication Protocol -> After
several attempts, LCP closes link / Transmitted unencrypted, susceptible to eavesdropping / Initiator
must send ID and password ( 3 ĐÁP ÁN )

6. In PPP authentication, which of the following is true for Challenge-Handshake Authentication Protocol
(CHAP) -> Initiator and authenticator share a secret key / Authenticator can reissue challenge during
session (2 ĐÁP ÁN)

7. In Generic Framing Procedure (GFP), which of the following sentences are correct -> GFP
uses a variation of HEC-based self delineation technique / GFP provides flexible encapsulation
framework that supports either a fixed or variable length frame structure / GFP uses an explicit
payload length indicator provided in its frame header to accommodate variable length PDUs ( 3
ĐÁP ÁN ) ( BỎ GFP rely on byte-stuffing mechanism to delineate protocol data units (PDUs) )

8. In media sharing techniques, which of the following are channelization approaches -> Data Division
Multiple Access / Code Division Multiple Access / Frequency Division Multiple Access ( 3 ĐÁP ÁN )

You might also like