0% found this document useful (0 votes)
16 views2 pages

Computer Networks Important Questions Mid II

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

Computer Networks Important Questions Mid II

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Computer Networks Important Questions Mid II

1. Define Congestion. Write about congestion control policies.


2. Explain QOS in Network Layer
3. Write an example, demonstrate how to make routing table using distance vector
routing.
4. Explain in detail about hierarchical routing with an example
5. What are the services provided by transport layer to the upper layers?
6. Explain the connection establishment and release in transport layer
7. Explain TCP header with neat diagram.
8. Describe UDP header format
9. What is DNS? What are the services provided by DNS and explain how it works
10. What is electronic mail? Describe in brief about sending and receiving e-mail.
11. Explain about formats of HTTP Request and response messages and HTTP header
structure.
12. Write short notes on WWW.

Assignment Questions:- 5,7,8,10,12

1. Which of the following are transport layer protocols used in networking [ ]


a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP
2. Two broad categories of congestion control are [ ]
a) Open-loop and Closed-loop b) Open-control and Closed-control
c) Active control and Passive control d) Active loop and Passive loop
3. TCP is a _______________transport protocol [ ]
a) Unreliable b) best-effort delivery c) reliable d) none
4. Which of the following system calls results in the sending of SYN packets [ ]
a) Socket b) Bind c) Listen d) Connect
5. DNS database contains _______ [ ]
a) Name server records b) Hostname-to-address records
c) Hostname aliases d) All of the mentioned
6. If a server has no clue about where to find the address for a hostname then [ ]
a) Server asks to the root server b) Server asks to its adjacent server
c) Request is not processed d) None
7. In TCP, a SYN+ACK segment consumes-------sequence numbers [ ]
a) 2 b) 0 c) 1 d) 3
8. HTTP allows which response? [ ]
a) Multiplexing b) Serial c) Serial d) Binary
9. When displaying a web page, the application layer uses the _______ [ ]
a) HTTP protocol b) FTP protocol c) SMTP protocol d) TCP protocol
10. ICMP stands for ________ [
]
a) Internet Coordinate Message Protocol
b) Internet Control Message Protocol
c) Interconnect Control Message Protocol
d) Interconnect Coordinate Message Protocol
1. The technique in which a congested node stops receiving data from the immediate
upstream node or nodes is called as ___________________

2. UDP packets are called as _______________________

3. _________________________________ is the components of sender mail.


4. ___________is flow characteristic that applications can tolerate in different degrees.
5. ____________________________________ protocols are used to support electronic
mail.
6. Multiplexing is used in ____________________________

7. The “Three – way Handshake” is procedure used to __________________a connection.

8. The default connection type used by HTTP is _____________________

9. The time taken by a packet to travel from client to server and then back to the client is
called _____________________________

10. In the congestion avoidance algorithm, the size of the congestion window increases
____________ until congestion is detected.

1. C
2. B
3. C
4. D
5. D
6. A
7. C
8. A
9. A
10. B
1. Backpressure
2. User data grams
3. Mail user agent(MUA),Mail transfer agent(MTA), Mail delivery
agent(MDA)
4. Delay
5. SMTP,POP,IMAP
6. Circuit switching
7. Establish
8. Persistent
9. RTT stands for round-trip time.
10. additively

You might also like