0% found this document useful (0 votes)
18 views30 pages

Networks

The document is a question bank for CEAT examinations focused on Networks, containing multiple-choice questions covering various topics such as OSI layers, TCP/IP protocols, encoding techniques, and addressing modes. Each question presents a scenario or concept related to computer networks, requiring students to select the correct answer from provided options. The questions assess knowledge on protocols, data transmission, error rates, and network architecture among other subjects.

Uploaded by

kaishwarya978
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views30 pages

Networks

The document is a question bank for CEAT examinations focused on Networks, containing multiple-choice questions covering various topics such as OSI layers, TCP/IP protocols, encoding techniques, and addressing modes. Each question presents a scenario or concept related to computer networks, requiring students to select the correct answer from provided options. The questions assess knowledge on protocols, data transmission, error rates, and network architecture among other subjects.

Uploaded by

kaishwarya978
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 30

SETHU INSTITUTE OF TECHNOLOGY

(An Autonomous Institution | Accredited by NAAC with ‘A’ Grade)


PULLOOR, KARIAPATTI – 626 115.
DEPATMENT OF COMPUTER SCIENCE & ENGINEERING

QUESTION BANK FOR CEAT EXAMINATIONS


Networks

Multiple Choice Questions (1 mark):

1 In the following pairs of OSI protocol layer/sub-layer and its functionality,


the INCORRECT pair is

A. Network layer and Routing


B. Data Link Layer and Bit synchronization
C. Transport layer and End-to-end process communication
D. Medium Access Control sub-layer and Channel sharing

2 An IP machine Q has a path to another IP machine H via


three IP routers R1,R2 and R3

Q−R1−R2−R3−H

H acts as an HTTP server , and Q connects to H via HTTP and downloads


a file. Session layer encryption is used, with DES as the shared key
encryption protocol. Consider the following four pieces of information:

[I1] The URL of the file downloaded by Q


[I2] The TCP port numbers at Q and H
[I3] The IP addresses of Q and H
[I4] The link layer addresses of Q and H
Which of I1, I2, I3, and I4 can an intruder learn through sniffing
at R2 alone?

A. Only I1 and I2
B. Only I1
C. Only I2 and I3
D. Only I3 and I4

3 To send same bit sequence, NRZNRZ encoding require

a. Same clock frequency as Manchester encoding


b. Half the clock frequency as Manchester encoding
c. Twice the clock frequency as Manchester encoding
d. A clock frequency which depend on number of zeroes and
ones in the bit sequence

4 If there are nn devices (nodes) in a network, what is the number of cable


links required for a fully connected mesh and a star topology respectively

A. n(n−1)/2 , n−1
B. n, n−1
C. n−1, n
D. n−1, n(n−1)/2

5 How many characters per sec (7 bits + 1 parity) can be transmitted over a
2400 bps line if the transfer is synchronous ( 1 start and 1 stop bit)?

A. 300
B. 240
C. 250
D. 275

6 Consider a 50 kbps satellite channel with a 500 milliseconds round trip


propagation delay. If the sender wants to transmit 1000 bit frames, how
much time will it take for the receiver to receive the frame?

A. 250 milliseconds
B. 20 milliseconds
C. 520 milliseconds
D. 270 milliseconds

7 What is the maximum number of characters (7 bits + parity) that can be


transmitted in a second on a 19.219.2 Kbps line. This asynchronous
transmission requires 11 start bit and 11 stop bit.

A. 192
B. 240
C. 1920
D. 1966

8 One SAN switch has 24 ports. All 24 supports 8 Gbps Fiber Channel
technology. What is the aggregate bandwidth of that SAN switch?

A. 96 Gbps
B. 192 Mbps
C. 512 Gbps
D. 192 Gbps
9 Data is transmitted continuously at 2.0482.048 Mbps rate for 1010 hours
and received 512512 bits errors. What is the bit error rate?

A. 6.9 e-9
B. 6.9 e-6
C. 69 e-9
D. 4 e-9

10 How many bytes of data can be sent in 1515 seconds over a serial link with
baud rate of 96009600 in asynchronous mode with odd parity and two stop
bits in the frame?

A. 10,00010,000 bytes
B. 12,00012,000 bytes
C. 15,00015,000 bytes
D. 27,00027,000 bytes

11 Assume a two-level inclusive cache hierarchy, L1L1 and L2L2,


where L2L2 is the larger of the two. Consider the following statements.

 S1S1: Read misses in a write through L1L1 cache do not result in


writebacks of dirty lines to the L2L2
 S2S2: Write allocate policy must be used in conjunction with write
through caches and no-write allocate policy is used with writeback
caches.

Which of the following statements is correct?

A. S1S1 is true and S2S2 is false


B. S1S1 is false and S2S2 is true
C. S1S1 is true and S2S2 is true
D. S1S1 is false and S2S2 is false

12 Which of the following is/are true of the auto-increment addressing


mode?

I. It is useful in creating self-relocating code


II. If it is included in an Instruction Set Architecture, then an additional
ALU is required for effective address calculation
III. The amount of increment depends on the size of the data item
accessed

A. I only
B. II only
C. III only
D. II and III only
13 Which of the following addressing modes are suitable for program
relocation at run time?

I. Absolute addressing
II. Based addressing
III. Relative addressing
IV. Indirect addressing

A. I and IV
B. I and II
C. II and III
D. I, II and IV

14 Which of the following addressing modes permits relocation without any


change whatsoever in the code?

A. Indirect addressing
B. Indexed addressing
C. Base register addressing
D. PC relative addressing

15 Relative mode of addressing is most relevant to writing:

A. Co – routines
B. Position – independent code
C. Shareable code
D. Interrupt Handlers

16 Consider the main memory system that consists of 88 memory modules


attached to the system bus, which is one word wide. When a write request
is made, the bus is occupied for 100100 nanoseconds (ns) by the data,
address, and control signals. During the same 100100 ns, and for 500500 ns
thereafter, the addressed memory module executes one cycle accepting and
storing the data. The (internal) operation of different memory modules may
overlap in time, but only one request can be on the bus at any time. The
maximum number of stores (of one word each) that can be initiated
in 11 millisecond is ________

A. 5000 B. 10000 C. 2000 D. 8000


17 The microinstructions stored in the control memory of a processor have a
width of 26 bits. Each microinstruction is divided into three fields. a micro
operation field of 13 bits, a next address field (X), and a MUX select field
(Y). There are 8 status bits in the inputs of the MUX. How many bits are
there in the X and Y fields, and what is the size of the control memory in
number of words?
A. 10, 3, 1024
B. 8, 5, 256
C. 5, 8, 2048
D. 10, 3, 512

18 Consider a CPU where all the instructions require 77 clock cycles to


complete execution. There are 140140 instructions in the instruction set. It
is found that 125125 control signals are needed to be generated by the
control unit. While designing the horizontal microprogrammed control unit,
single address field format is used for branch control logic. What is the
minimum size of the control word and control address register?

A. 125,7
B. 125,10
C. 135,9
D. 135,10

19 An instruction set of a processor has 125 signals which can be divided


into 55 groups of mutually exclusive signals as follows:

Group 11 :: 20 signals, Group 22 :: 70 signals, Group 33 :: 22 signals,


Group 44 :: 10 signals, Group 55 :: 23 signals.

How many bits of the control words can be saved by using vertical
microprogramming over horizontal microprogramming?

A. 00
B. 103
C. 22
D. 55

20 Consider the following data path of a CPU.CPU.

The ALU,ALU, the bus and all the registers in the data path are of identical
size. All operations including incrementation of the PCPC and
the GPRsGPRs are to be carried out in the ALU.ALU. Two clock cycles
are needed for memory read operation – the first one for loading address in
the MARMAR and the next one for loading data from the memory bus into
the MDR.MDR.

The instruction ‘‘add R0, R1”‘‘add R0, R1” has the register transfer
interpretation R0⇐R0 + R1.R0⇐R0 + R1. The minimum number of clock
cycles needed for execution cycle of this instruction is:

A. 22
B. 33
C. 44
D. 5

21 Consider the three-way handshake mechanism followed


during TCP connection establishment between hosts P and Q.
Let X and Y be two random 32-bit starting sequence numbers chosen
by P and Q respectively. Suppose P sends a TCP connection request
message to Q with a TCP segment having SYN bit =1, SEQ number =X,
and ACK bit =0. Suppose Q accepts the connection request. Which one of
the following choices represents the information present in
the TCP segment header that is sent by Q to P?

A. SYN bit =1, SEQ number =X+1, ACK bit =0, ACK number =Y, FI
N bit =0
B. SYN bit =0, SEQ number =X+1, ACK bit =0, ACK
number =Y, FIN bit =1
C. SYN bit =1, SEQ number =Y, ACK bit =1, ACK number =X+1, FI
N bit =0
D. SYN bit =1, SEQ number =Y, ACK bit =1, ACK number =X, FIN b
it =0

22 Assuming that for a given network layer implementation, connection


establishment overhead is 100 bytes and disconnection overhead
is 28 bytes. What would be the minimum size of the packet the transport
layer needs to keep up, if it wishes to implement a datagram service above
the network layer and needs to keep its overhead to a minimum of 12.5%.
(ignore transport layer overhead)

a. 512 bytesbytes
b. 768 bytesbytes
c. 1152 bytesbytes
d. 1024 bytes

23 Consider a long-lived TCP session with an end-to-end bandwidth


of 1Gbps(=10^9 bits-per-second).). The session starts with a sequence
number of 1234. The minimum time (in seconds, rounded to the closet
integer) before this sequence number can be used again is

A. 35 B. 40 C. 50 D. 30
24

Consider the following statements regarding the slow start phase of the
TCP congestion control algorithm. Note that cwnd stands for the TCP
congestion window and MSS window denotes the Maximum Segments
Size:

i. The cwnd increases by 22 MSS on every successful


acknowledgment
ii. The cwnd approximately doubles on every
successful acknowledgment
iii. The cwnd increases by 11 MSS every round trip time
iv. The cwnd approximately doubles every round trip time

Which one of the following is correct?

A. Only (ii)) and (iii) are true


B. Only (i) and (iii) are true
C. Only (iv) is true
D. Only (i) and (iv) are true
25 Consider socket API on a Linux machine that supports connected UDP
sockets. A connected UDP socket is a UDP socket on
which connectconnect function has already been called. Which of the
following statements is/are CORRECT?

I. A connected UDP socket can be used to communicate with multiple


peers simultaneously.
II. A process can successfully call connectconnect function again for
an already connected UDP socket.

A. I only
B. II only
C. Both I and II
D. Neither I nor II
26 Consider a TCP client and a TCP server running on two different machines.
After completing data transfer, the TCP client calls close to terminate the
connection and a FIN segment is sent to the TCP server. Server-side TCP
responds by sending an ACK, which is received by the client-side TCP. As
per the TCP connection state diagram (RFC 793), in which state does the
client-side TCP connection wait for the FIN from the server-side TCP?

A. LAST-ACK
B. TIME-WAIT
C. FIN-WAIT-11
D. FIN-WAIT-2

27 Suppose two hosts use a TCP connection to transfer a large file. Which of

I. If the sequence number of a segment is m,m, then the sequence


number of the subsequent segment is always m+1.m+1.
II. If the estimated round trip time at any given point of time is tt sec,
the value of the retransmission timeout is always set to greater than
or equal to tt sec.
III. The size of the advertised window never changes during the course
of the TCP connection.
IV. The number of unacknowledged bytes at the sender is always less
than or equal to the advertised window.

A. III only
B. I and III only
C. I and IV only
D. II and IV only

28 Consider a TCP connection in a state where there are no outstanding ACKs.


The sender sends two segments back to back. The sequence numbers of the
first and second segments are 230 and 290 respectively. The first segment
was lost, but the second segment was received correctly by the receiver.
Let X be the amount of data carried in the first segment (in bytes), and Y be
the ACK number sent by the receiver.
The values of X and Y (in that order) are

A. 60 and 290
B. 230 and 291
C. 60 and 231
D. 60 and 230

29 A program on machine XX attempts to open a UDPUDP connection to


port 53765376 on a machine YY, and a TCPTCP connection to
port 86328632 on machine ZZ. However, there are no applications listening
at the corresponding ports on YY and ZZ. An ICMPICMP Port
Unreachable error will be generated by

A. YY but not ZZ
B. ZZ but not YY
C. Neither YY nor ZZ
D. Both YY and Z

30 On a TCP connection, current congestion window size is Congestion


Window = 44 KB. The window size advertised by the receiver is Advertise
Window = 66 KB. The last byte sent by the sender is LastByteSent
= 10240 and the last byte acknowledged by the receiver is LastByteAcked
= 8192. The current window size at the sender is:
A. 2048 bytes
B. 4096 bytes
C. 6144 bytes
D. 8192 bytes

31 What is the bit rate of a video terminal unit


with 80 characters/line, 88 bits/characterbits/character and horizontal sweep
time of 100 µs (including 20 µs of retrace time)?

A. 8 Mbps
B. 6.4 Mbps
C. 0.8 Mbps
D. 0.64 Mbps

32 Assume that each character code consists of 8 bits. The number of


characters that can be transmitted per second through an asynchronous
serial line at 2400 baud rate, and with two stop bits is

A. 109
B. 216
C. 218
D. 219

33 How many bytes of data can be sent in 15 seconds over a serial link with
baud rate of 9600 in asynchronous mode with odd parity and two stop bits
in the frame?

A. 10,000 bytes
B. 12,000 bytes
C. 15,000 bytes
D. 27,000 bytes
34 Let us consider a statistical time division multiplexing of packets. The
number of sources is 1010. In a time unit, a source transmits a packet
of 10001000 bits. The number of sources sending data for the
first 2020 time units
is 6,9,3,7,2,2,2,3,4,6,1,10,7,5,8,3,6,2,9,56,9,3,7,2,2,2,3,4,6,1,10,7,5,8,3,6,2,
9,5 respectively. The output capacity of multiplexer is 5000 bits per time
unit. Then the average number of backlogged of packets per time unit
during the given period is

A. 55
B. 4.45
C. 3.45
D. 0

35 A serial transmission T1 uses 8 information bits, 2 start bits, 1 stop bit


and 1 parity bit for each character. A synchronous
transmission T2 uses 3 eight-bit sync characters followed by 30 eight-
bit information characters. If the bit rate is 1200 bits/second in both cases,
what are the transfer rates of T1 and T2?

A. 100 characters/sec, 153 characters/sec


B. 80 characters/sec, 136 characters/sec
C. 100 characters/sec, 136 characters/sec
D. 80 characters/sec, 153 characters/sec

36 In serial communication employing 8 data bits, a parity bit and 22stop bits,
the minimum band rate required to sustain a transfer rate of 300 characters
per second is

A. 2400 band
B. 19200 band
C. 4800 band
D. 1200 band

37 Group-1 Group-2
P. Data link 1. Ensures reliable
layer transport of data
over a physical
point-to-point link
Q. Network 2.
layer Encodes/decodes
data for physical
transmission
R. Transport 3 . Allows end-to-
layer end
communication
between
two processes
4. Routes data
from one network
node to the next
A. P-1, Q-4, R-3
B. P-2, Q-4, R-1
C. P-2, Q-3, R-1
D. P-1, Q-3, R-2

Choose the best matching between Group 1 and Group 2

38 In an RSA cryptosystem, the value of the public modulus


parameter n is 3007. If it is also known as that ϕ(n)=2880 where ϕ() denotes
Euler’s Totient Function, then the prime factor of n which is greater
than 50 is
A. 71 B. 83 C. 97 D. 91
39 In cryptography, the following uses transposition ciphers and the keyword
is LAYER. Encrypt the following message. (Spaces are omitted during
encrypton)

WELCOME TO NETWORK SECURITY!

a. WMEKREETSILTWETCOOCYONRU!
b. EETSICOOCYWMEKRONRU!LTWET
c. LTWETONRU!WMEKRCOOCYEETSI
d. ONRU!COOCYLTWETEETSIWMEKR

40- A sender SS sends a message mm to receiver RR, which is digitally signed


by SS with its private key. In this scenario, one or more of the following
security violations can take place.

I. SS can launch a birthday attack to replace mm with a fraudulent


message
II. AA third party attacker can launch a birthday attack to
replace mm with a fraudulent message
III. RR can launch a birthday attack to replace mm with a fraudulent
message

Which of the following are possible security violations?

A. I and II only
B. I only
C. II only
D. II and III only

41
In a system an RSA algorithm with p=5p=5 and q=11q=11, is implemented
for data security. What is the value of the decryption key if the value of the
encryption key is 27?

A. 3
B. 7
C. 27
D. 40
42 Using public key cryptography, XX adds a digital signature σ to
message MM, encrypts <M,σ><M,σ>, and sends it to YY, where it is
decrypted. Which one of the following sequences of keys is used for the
operations?

A. Encryption: X′sX′s private key followed by Y′sY′s private key;


Decryption: X′sX′s public key followed by Y′sY′s public key;

B. Encryption: X′sX′s private key followed by Y′sY′s public key;


Decryption: X′sX′s public key followed by Y′sY′s private key;

C. Encryption: X′sX′s public key followed by Y′sY′s private key;


Decryption: Y′sY′s public key followed by X′sX′s private key;

D. Encryption: X′sX′s private key followed by Y′sY′s public key;


Decryption: Y′sY′s private key followed by X′sX′s public key
43 Assume that a 1212-bit Hamming codeword consisting of 88-bit data
and 44 check bits
is d8d7d6d5c8d4d4d3d2c4d1c2c1d8d7d6d5c8d4d4d3d2c4d1c2c1, where
the data bits and the check bits are given in the following tables:

Which one of the following choices gives the correct values of xx and yy?

A. x is 0 and y is 0
B. x is 0 and y is 1
C. x is 1 and y is 0
D. x is 1 and y is 1

44 Suppose that in an IP-over-Ethernet network, a machine X wishes to find


the MAC address of another machine Y in its subnet. Which one of the
following techniques can be used for this?

A. X sends an ARP request packet to the local gateway’s IP address


which then finds the MAC address of Y and sends to X
B. X sends an ARP request packet to the local gateway’s MAC address
which then finds the MAC address of Y and sends to X
C. X sends an ARP request packet with broadcast MAC address in its
local subnet
D. X sends an ARP request packet with broadcast IP address in its
local subnet

45 Consider a simple communication system where multiple nodes are


connected by a shared broadcast medium (like Ethernet or wireless). The
nodes in the system use the following carrier-sense based medium access
protocol. A node that receives a packet to transmit will carrier-sense the
medium for 55 units of time. If the node does not detect any other
transmission, it starts transmitting its packet in the next time unit. If the
node detects another transmission, it waits until this other transmission
finishes, and then begins to carrier-sense for 5 time units again. Once they
start to transmit, nodes do not perform any collision detection and continue
transmission even if a collision occurs. All transmissions last for 20 units of
time. Assume that the transmission signal travels at the speed of 10 meters
per unit time in the medium.

Assume that the system has two nodes P and Q, located at a


distance dd meters from each other. PP start transmitting a packet at
time t=0 after successfully completing its carrier-sense phase. Node Q has a
packet to transmit at time t=0 and begins to carrier-sense the medium.

The maximum distance d (in meters, rounded to the closest integer) that
allows Q to successfully avoid a collision between its proposed
transmission and P’s ongoing transmission is

A. 25 B. 50 C. 75 D.100
46

For the IEEE 802.11 MACIEEE 802.11 MAC protocol for wireless
communication, which of the following statements is/are TRUE?

I. At least three non-overlapping channels are available for


transmissions.
II. The RTS-CTS mechanism is used for collision detection.
III. Unicast frames are ACKed.

A. All I, II, and III


B. I and III only
C. II and III only
D. II only
47 In CRC if the data unit is 100111001 and the divisor is 1011 then what is
dividend at the receiver?

A. 100111001101
B. 100111001011
C. 100111001
D. 100111001110
48 Consider a network connecting two systems located 8000 Km apart. The
bandwidth of the network is 500×10^6 bits per second. The propagation
speed of the media is 4×10^6 meters per second. It needs to design a Go-
Back-N sliding window protocol for this network. The average packet size
is 107 bits. The network is to be used to its full capacity. Assume that
processing delays at nodes are negligible. Then, the minimum size in bits of
the sequence number field has to be _

A. 9 B. 6 C. 7 D. 8
49

A bit-stuffing based framing protocol uses an 8-bit8-bit delimiter pattern


of 01111110. . If the output bit-string after stuffing is 01111100101, then
the input bit-string is:

A. 0111110100
B. 0111110101
C. 0111111101
D. 0111111111
50

Consider the store and forward packet switched network given below.
Assume that the bandwidth of each link is 106 bytes / sec. A user on
host A sends a file of size 103 bytes to host B through routers R1 and R2 in
three different ways. In the first case a single packet containing the
complete file is transmitted from A to B. In the second case, the file is split
into 10 equal parts, and these packets are transmitted from A to B. In the
third case, the file is split into 20 equal parts and these packets are sent
from A to B. Each packet contains 100 bytes of header information along
with the user data. Consider only transmission time and ignore processing,
queuing and propagation delays. Also assume that there are no errors
during transmission. Let T1, T2 and T3 be the times taken to transmit the
file in the first, second and third case respectively. Which one of the
following is CORRECT?

A. T1<T2<T3
B. T1>T2>T3
C. T2=T3,T3<T1
D. T1=T3,T3>T2

51 Identify the correct sequence in which the following packets are transmitted
on the network by a host when a browser requests a webpage from a remote
server, assuming that the host has just been restarted.

A. HTTP GET request, DNS query, TCP SYN


B. DNS query, HTTP GET request, TCP SYN
C. DNS query, TCP SYN, HTTP GET request.
D. TCP SYN, DNS query, HTTP GET request.
52 In one of the pairs of protocols given below , both the protocols can use
multiple TCP connections between the same client and the server. Which
one is that?
A. HTTP, FTP
B. HTTP, TELNET
C. FTP, SMTP
D. HTTP, SMTP
53 A graphical HTML browser resident at a network client
machine Q accesses a static HTML webpage from a HTTP server S. The
static HTML page has exactly one static embedded image which is also
at S. Assuming no caching, which one of the following is correct about the
HTML webpage loading (including the embedded image)?

A. Q needs to send at least 2 HTTP requests to S, each necessarily in a


separate TCP connection to server S
B. Q needs to send at least 2 HTTP requests to S, but a single TCP
connection to server S is sufficient
C. A single HTTP request from Q to S is sufficient, and a single TCP
connection between Q and S is necessary for this
D. A single HTTP request from Q to S is sufficient, and this is possible
without any TCP connection between Q and S
54 Consider the different activities related to email.

 m1: Send an email from mail client to mail server


 m2: Download an email from mailbox server to a mail client
 m3: Checking email in a web browser

Which is the application level protocol used in each activity?

A. m1:HTTP m2:SMTP m3:POP


B. m1:SMTP m2:FTP m3:HTTP
C. m1:SMTP m2:POP m3:HTTP
D. m1:POP m2:SMTP m3:IMAP

55 Traceroute reports a possible route that is taken by packets moving from


some host AA to some other host BB. Which of the following options
represents the technique used by traceroute to identify these hosts:

A. By progressively querying routers about the next router on the path


to B using ICMP packets, starting with the first router
B. By requiring each router to append the address to the ICMP packet
as it is forwarded to B. The list of all routers en-route to B is
returned by B in an ICMP reply packet
C. By ensuring that an ICMP reply packet is returned to A by each
router en-route to B, in the ascending order of their hop distance
from A
D. By locally computing the shortest path from A to B

56 Consider the following statements:

I. telnet, ftp and http are application layer protocols.


II. EJB (Enterprise Java Beans) components can be deployed in a J2EE
(Java2 Enterprise Edition) application server.
III. If two languages conform to the Common Language Specification
(CLS) of the Microsoft.NET frame work, then a class defined in any
one of them may be inherited in the other.

Which statements are true?

A. I and II only
B. II and III only
C. I and III only
D. I, II and III

57 Which Project 802 standard provides for a collision-free protocol?

A. 802.2
B. 802.3
C. 802.5
D. 802.6
58 Data transmitted on a link uses the following 2D parity scheme for error
detection:
Each sequence of 28 bits is arranged in a 4×7 matrix (rows r0r0 through r3,
and columns d7 through d1) and is padded with a column d0d0 and
row r4 of parity bits computed using the Even parity scheme. Each bit of
column d0d0 (respectively, row r4) gives the parity of the corresponding
row (respectively, column). These 40 bits are transmitted over the data link.

The table shows data received by a receiver and has n corrupted bits. What
is the minimum possible value of n?

A. 11
B. 22
C. 33
D. 4

59 Station A needs to send a message consisting of 9 packets to


Station B using a sliding window (window size 3) and go-back-n error
control strategy. All packets are ready and immediately available for
transmission. If every 5th packet that A transmits gets lost (but no acks
from B ever get lost), then what is the number of packets that A will
transmit for sending the message to B?

A. 12
B. 14
C. 16
D. 18

60 A channel has a bit rate of 4 kbps and one-way propagation delay of 20 ms.
The channel uses stop and wait protocol. The transmission time of the
acknowledgment frame is negligible. To get a channel efficiency of at
least 50%, the minimum frame size should be

A. 80 bytes
B. 80 bits
C. 160 bytes
D. 160 bits
Multiple choice questions (MCQ) – 2 Marks
1 The protocol data unit(PDU) for the application layer in the Internet stack is
(A)Segment
(B)Datagram
(C)Message
(D) Frame

2 Which of the following transport layer protocols is used to support electronic mail?
(A) SMTP
(B) IP
(C) TCP
(D) UDP

3 In the IPv4 addressing format, the number of networks allowed under Class C addresses
is
(A) 2^14
(B) 2^7
(C) 2^21
(D) 2^24

4 An Internet Service Provider(ISP) has the following chunk of CIDR-based IP addresses


available with it:245.248.128.0/20. The ISP wants to give half of this chunk of addresses
to Organization A, and a quarter to Organization B, while retaining the remaining with
itself. Which of the following is a valid allocation of addresses to A and B?
(A) 245.248.136.0/21 and 245.248.128.0/22
(B) 245.248.128.0/21 and 245.248.128.0/22
(C) 245.248.132.0/22 and 245.248.132.0/21
(D) 245.248.136.0/22 and 245.248.132.0/21
5 The transport layer protocols used for real time multimedia, file transfer, DNS and email,
respectively are
(a) TCP, UDP, UDP and TCP
(b) UDP, TCP, TCP and UDP
(c) UDP, TCP, UDP and TCP
(d) TCP, UDP, TCP and UDP

6 The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of
IP addresses could belong to this network.
(a) 172.57.88.62 & 172.56.87.23
(b) 10.35.28.2 & 10.35.29.4
(c) 191.203.31.87 & 192.234.31.88
(d) 128.8.129.43 & 128.8.161.55

7 The routing table of a router is shown below


DESTINAT SUBNETM ETHERNET
ION ASK
128.75.43.0 255.255.255 Eth0
.0
128.75.43.0 255.255.255 Eth1
.128
192.12.17.5 255.255.255 Eth3
.255
Default Eth2

On which interface will router forward packets addressed to destinations 128.75.43.16


and 192.12.17.10 respectively?
a)Eth1 and Eth2 b)Eth0 and Eth2
c)Eth0 and Eth3 d)Eth1 and Eth3

8 One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the
following statements best explains the need for this field?(a) It can be used to priortize
packets
(b) It can be used to reduce delays
(c) It can be used to optimize throughput
(d) It can be used to prevent packet looping

9 Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively


and they both use the same netmask N. Which of the values of N given below should not
be used if A and B should belong to the same network?
(a) 255.255.255.0
(b) 255.255.255.128
(c) 255.255.255.192
(d) 255.255.255.224

10 Consider an instance of TCP’s Additive Increase Multiplicative Decrease(AIMD)


algorithm where the window size at the start of the slow start phase is 2 MSS and the
threshold at the start of the first transmission is 8 MSS. Assume that a time out occurs
during the fifth transmission. Find the congestion window size at the end of the tenth
transmission.
(a) 8 MSS (b) 14 MSS (c) 7 MSS (d) 12 MSS

11 In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window
(a) does not increase
(b) increases linearly
(c) increases quadratically
(d) increases exponentially

12 If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the
maximum number of hosts per subnet?
(a) 1022 (b) 1023 (c) 2046 (d) 2047

13 Which of the following system calls results in the sending of SYN packets?
(a) socket (b) bind (c) listen (d) connect

14 What is the maximum size of data that the application layer can pass on to the TCP layer
below?
(a) Any size
(b) 216 bytes-size of TCP header
(c) 216 bytes
(d) 1500 bytes

15 The protocol data unit(PDU) for the application layer in the Internet stack is
(a) Segment (b) Datagram (c) Message (d) Frame

16 Which of the following transport layer protocols is used to support electronic mail?
(a) SMTP (b) IP (c) TCP (d) UDP

17 In the IPv4 addressing format, the number of networks allowed under Class C addresses is
(a) 214(b) 27 (c) 221 (d) 224

18 An organization has a class B network and wishes to form subnets for 64 departments.
The subnet mask would be:
(a) 255.255.0.0
(b) 255.255.64.0
(c) 255.255.128.0
(d) 255.255.252.0

19 Assume that source S and destination D are connected through two intermediate routers
labeled R. Determine how many times each packet has to visit the network layer and the
data link layer during a transmission from S to D.

(a) Network layer – 4 times and Data link layer-4 times


(b) Network layer – 4 times and Data link layer-3 times
(c) Network layer – 4 times and Data link layer-6 times
(d) Network layer – 2 times and Data link layer-6 times
20 Consider a situation in which you are a system administrator on a NetWare network, you
are running NetWare 4.11 and you cannot communicate with your router. What is the
likely problem?
a) NetWare 4.11 defaults to 802.2 encapsulation
b) NetWare 4.11 defaults to 802.3 encapsulation
c) Cisco routers only work with NetWare 3.11
d) NetWare 3.11 defaults to 802.2 encapsulation

21 NetWare IPX addressing uses a network number and a node number. Which statement is
not true?
a) The network address is administratively assigned and can be up to 16 hexadecimal
digits long
b) The node address is always administratively assigned
c) The node address is usually the MAC address
d) If the MAC address is used as the node address, then IPX eliminates the use of ARP

22 What does the following series of commands “Router IGRP 71 network” accomplish?
10.0.0.0 router IGRP 109 network 172.68.7.0
a) It isolates networks 10.0.0.0 and 172.68.7.0
b) It loads IGRP for networks 109 and 71
c) It disables RIP
d) It disables all routing protocols

23 The “IPX delay number” command will allow an administrator to change the default
settings. What are the default settings?
a) For LAN interfaces, one tick; for WAN interfaces, six ticks
b) For LAN interfaces, six ticks; for WAN interfaces, one tick
c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks
d) For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
24 You want to enable both arpa and snap encapsulation on one router interface. How do you
do this?
a) The interface can handle multiple encapsulation types with no extra configuration
b) Assign two network numbers, one for each encapsulation type
c) Enable Novell-ether to run multiple encapsulation types
d) Both arpa and snap are enabled by default so you don’t have to configure anything

25 What is name of Transport Layer Protocol which is used to support the electronic mail ?
(a) SMTP
(b) IP
(c) TCP
(d) UDP

26 Firewall which supports 4 layer design can not


(a) Block All ICMP traffic
(b) Block HTTP traffic during 9:00 P.M to 5 A.M
(c) Stop packets incoming from a specific IP address.
(d) None

27 IP Header has a field TTL ( Time To Live). Which among the following statement best
explain the use of TTL
(a) It can be used to prioritize the packets
(b) It can be used to reduce the delay.
(c) It can be used to optimize the throughput.
(d) It can be used to prevent packet looping
28 A router receives an IP packet containing a data of 300 byte and it is forwarded to a
network with maximum transmission unit of 80 bytes. Assume that IP header is 10 Byte
long. Find the total fragment , more fragment and offset values
(a) 4, 1110,(0,10,20,30)
(b) 1,1110,(0,8.75,17.5,26.25,35)
(c) 5,1111,(0,8,17,26,35)
(d) none

29 Which protocol uses UDP as transport protocol?


(a)SMTP
(b)telnet
(c)DNS
(d)HTTP

30 Which of the following is false with regards to TTL


(a) TTL is used to avoid infinite looping
(b) TTL is used in debugging
( c ) TTL counts number of routers between source and destination
(d ) TTL used in likening
31 Here some activities related to email is given . Find the correct match for the protocol
used in appropriate activity.
A1: send an email from a mail client to mail server.
A2:download an email in mailbox from mail server to mail client
A3: checking mail in browser
(a) A1: HTTP, A2:SMTP, A3: POP
(b) A1:SMTP, A2: FTP , A3:HTTP
(c) A1:SMTP , A2:POP, A3:HTTP
(d) A1:POP, A2:SMTP, IA3:ICMP

32 All the routers use the distance vector based routing algorithm to update their routing
tables. Each starts with its routing table initialized to contain an entry for each neighbour
with the weight of the respective connecting link. After all the routing tables stabilize,
how many links in the network will never be used for carrying any data?
(a) 4
(b) 3
(c) 2
(d) 1

33 Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively


and they both use the same netmask N. Which of the values of N given below should not
be used if A and B should belong to the same network?
(a) 225.255.255.0
(b) 255.255.255.128
(c) 255.255.255.192
(d) 255.255.255.224

34 What is the minimum number of bits (l) that will be required to represent the sequence
numbers distinctly? Assume that no time gap needs to be given between transmission of
two frames.
(a) l = 2
(b) l = 3
(c) l = 4
(d) l = 5
35 Suppose that the sliding window protocol is used with the sender window size of 2l, where
l is the number of bits identified in the earlier part and acknowledgments is always
piggybacked. After sending 2l frames, what is the minimum time the sender will have to
wait before starting transmission of the next frame? (Identify the closest choice ignoring
the frame processing time)
(a) 6 ms
(b) 18 ms
(c) 20 ms
(d) 22 ms

36 While opening a TCP connection, the initial sequence number is to be derived using a
time-of-day (ToD) clock that keeps running even when the host is down. The low order 32
bits of the counter of TOD clock is to be used for the initial sequence numbers. The clock
counter increments once per millisecond. The maximum packet lifetime is given to be 64s.
Which one of the choices given below is closet to the minimum permissible rate at which
sequence numbers used for packets of a connection can increase?
(a) 0.015/s
(b) 0.064/s
(c) 0.135/s
(d) 0.327/s

37 In the RSA public key cryptosystem, the private and the public keys are (e, n) and (d, n)
respectively, where n = p* and p and q are large primes. Besides, n is public and p and q
are private. Let M be an integer such that 0 < M <nandφ(n) = (p − 1) (q − 1). Now
consider the following equations.
I. M' = Me mod n
M = (M')d mod n
II. ed ≡ 1mod n
III.ed ≡ 1modφ(n)
IV. M' = Memodφ(n)
M = (M')dmod φ(n)
Which of the above equations correctly represent RSA cryptosystem?
(a) I and II
(b) I and III
(c) II and IV
(d) III and IV
38 38)The probability that a single bit will be in error on a typical public telephone line using
4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the
residual error rate for a communication line using 9-bit frames is approximately equal to
A
0.003
.

B
0.009
.

C
0.991
.

D
0.999
.

39 39) Frames from one LAN can be transmitted to another LAN via the device
A
Router
.

B
Bridge
.

C
Repeater
.

D
Modem
.

40 40) What are the most commonly used transmission speeds in BPS used in data
communication?
A. 300

B. 1200

C. 2400

D. 9600

III. MULTIPLE SELECT QUESTIONS [MSQ] [ 2 MARKS]


1
Which can be valid class-c Network ID?
A. 200.200.200.200
B. 200.200.200.0
C. 200.0.0.0
D. 194.194.194.0

2
Which can be the possible header size (in byte) in IPV4 datagram
A. 20
B. 30
C. 50
D. 60

3
Consider the class-c network with 7 subnets and 25 hosts per sub net. What will be the subnet
mask for this network.
A. 255.255.255.224
B. 255.255.255.44
C. 255.255.255.63
D. 255.255.255.112

4
The following is a UDP header in hexadecimal format
5EFA 00 FD 001C 3297
Which of the following statement is/are correct?
A. Total length of datagram =28 byte and packet is going from client to server
B. Total length of datagram =28 byte and packet is going from server to client
C. Data size is 20 byte and packet is going from client to server
D. Data size is 20 byte and packet is going from server to client

5
If Direct Broadcast address is 200.200.200.31
Which of the following can be subnet mask?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.248
D. 255.255.255.128
6
Consider the block of IP addresses ranging from 150.10.20.64 to 150.10.20.127. Is it a CIDR
block? If yes what is the CIDR representation?

A. Given Block is not a CIDR block


B. 150.10.20.64 / 26
C. 150.10.20.127 / 26
D. None of these

7
Which of the following cache mappings may experience conflict miss?

A. Direct Mapping
B. 2-way set associate mapping
C. 4-way set associate mapping
D. Full associate mapping

8 Which of the following delay components are not affected by the congestion in the network?

A. Queuing Delay
B. Transmission Delay
C. Processing Delay
D. Propagation Delay

9 What are the properties of a source buffer used at the sender side of the transport layer in a connection-
oriented protocol?

A. Source buffer needs to be connection specific that is a buffer is maintained for every connection
from the device
B. OS maintains a global source buffer for all the connections from the device.
C. Source buffer is finite.
D. Source buffer is infinite.

10
What are the basic tasks of the network layer?
A. It provides reliable data transfer.
B. It delivers a packet to the destination.
C. It keeps the network congestion free.
D. It finds out the route from a node to another node
11
What is true for IPv6
A. It supports broadcasting
B. It supports extended IP header
C. It supports encapsulation
D. It is compatible with IPv4
12
Which of the following statements is (are) correct?
A. A server is a process that is offering some service.
B. A client is a process that is requesting the service.
C. A server can serve multiple clients simultaneously.
D. A client sends request to the server and gets back the response.
13
The Web Browser can act as an HTTP ________
A. Client
B. Server
C. Interpreter
D. host
14
Which option are true?
A. CSMA/CD should be used when the transmitter and receiver cannot be turned on
simultaneously.
B. CSMA/CD have a less collision probability than that of aloha.
C. slotted aloha does not sense before sending data
D. a node can start transmitting data only at beginning of a slot in slotted data.

15
Which is true for Forwarding Information Base (FIB)
A. It is resides at the RAM
B. In a specialized Hardware, it is implemented using TCAM
C. It is contain a subnet of the routing table
D. The routing table is a subnet of the FIB

16
Senders and Receivers needs to dynamically adjust buffer allocations for
A. Flow Control
B. Congestion Control
C. Reliability
D. Connection Establishment

17
The solution to silly window syndrome problem is/are
A. Nagle’s Algorithm
B. Clark’s Algorithm
C. Jacobson’s Algorithm
D. None of these
18
Why do we need IPv6 addresses when we already have IPv4 addresses?
A. The number of devices are grown beyond the capacity of IPv4.
B. IPv4 is not suitable for IoT devices.
C. IPv4 is not secure.
D. IPv4 does not provide QoS.
19 What is true for a resource reservation protocol?
A. It is a routing protocol
B. It tries to reserve the required resources throughout the path
C. RSVP domain talks to only remote routing protocol domain.
D. RSVP domain runs in all the devices including end hosts and intermediate routers.

20 In a transport layer, a connection-oriented protocol creates an uniquely identified connection


between two processes. Which of the following fields are used as identifier for such connections?
A. Source IP
B. Source MAC
C. Source Port
D. Source Initial Sequence Number
E. Destination IP
F. Destination MAC
G. Destination Port
H. Destination Initial Sequence Number

IV. NUMERICAL ANSWER TYPE QUESTIONS [Without Choice] [ 2 MARKS]


1 If an Internet Service Provider (ISP) has the following chunk of CIDR-based IP
addresses available with it:245.248.128.0/20 and the ISP wants to give half of this chunk
of address to Organization A, and a quarter to Organization B, while retaining the
remaining with itself. Then, which among the following is a valid allocation of addresses
to A and B?

2 firewall is installed at the point where the secure internal network and untrusted external
network meet, which is also known as_____

3 Identify the correct option for the given assertion and reason
Assertion: In IEEE 802.3 is not suitable for client server application
Reason: In Ethernet, there is a restriction on minimum size.

4 Consider that a computer on a 10Mbps network is regulated by a token bucket. The


token bucket is filled at a rate of 2Mbps. It is initially filled to capacity with 16
Megabits. What is the maximum duration for which the computer can transmit at the full
10Mbps?
5 What is the maximum number of subnets and the maximum number of hosts in each
subnet, if the address of a class B host is to be split into subnets with a 6-bit subnet
number?
6 If a CSMA/CD network that transmits data at a rate of 100 Mbps (10 8 bits second) over a
1 km(kilometer) cable with no repeaters and the minimum frame size required for this
network is 1250 bytes, what is the signal speed (km/sec) in the cable?
7 One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of
these below given statements best explains the need for this field?
8 A and B are the only two stations on an Ethernet. Each has a steady queue of frames to
send. Both A and B attempt to transmit a frame, collide, and A wins the first back off
race. At the end of this successful transmission by A, both A and B attempt to transmit
and collide. The probability that A wins the second back off race is_____

9 In a packet switching network, packets are routed from source to destination along a
single path having two intermediate nodes. If the message size is 24 bytes and each
packet contains a header of 3 bytes, then what is the optimum packet size?
10 Station B needs to send a message consisting of 9 packets to Station C using a sliding
window (window size 3) and go-back-n error control strategy. All packets are ready and
immediately available for transmission. If every 5 th packet that B transmits gets lost (but
no acks from C ever get lost), then what is the number of packets that B will transmit for
sending the message to C?
11 For an organization that has a class B network and wishes to form subnets for 64
departments, what will the subnet mask be?
12 If two computers C1 and C2 are configured as follows and C1 has IP address 203.197.2.53
and netmask 255.255.128.0, while C2 has IP address 203.197.75.201 and netmask
255.255.192.0, then which of the following statements is true?
Look at these three statements about link state and distance vector routing
protocols, for a
large network with 500 network nodes and 4000 links

 [S1] The computational overhead in link state protocols is higher than in distance
vector protocols.
 [S2] A distance vector protocol (with split horizon) avoids persistent routing
loops, but not a link state protocol.
 [S3] After a topology change, a link state protocol will converge faster than a
distance vector protocol.
Which one of the above is correct about S1, S2, and S3?

13 If the length of a Broadcast LAN is 2 Km and it has 107 bps bandwidth and uses
CSMA/CD and the signal travels along the wire at 2108m/s, then what is the minimum
size of the packet?

14 What is the number of 8-bit characters that can be transmitted per second over a 9600
baud serial communication link that use asynchronous mode of transmission with 8 data
bits, one start bit and one parity bit?

15 If everyone in a group of N people want to communicate secretly with the N – 1 others


using symmetric key cryptographic system and the communication between any two
persons should not be decodable by the others in the group, then what is the number of
keys required in the system as a whole to satisfy the confidentiality requirement?
Explanation: In Symmetric Key Cryptography , access of key is with both the parties.
It implies every person needs to communicate N-1 other users using different keys i.e
1+2+3…N-2+N-1
This is like number of edges needed in a complete graph with N vertices is
N(N-1)/2.

16 A sender B sends a message m to receiver A, which is digitally signed by B with its


private key. In this scenario, one or more of the following security violations can take
place.
I. B can launch a birthday attack to replace m with a fraudulent message
II. A third party attacker can launch a birthday attack to replace m with a fraudulent
messag
III. A can launch a birthday attack to replace m with a fraudulent message
Which of the above are possible security violations?

17 Take the example of 1 Mbps error-free line, with the maximum frame size of 1000 bits
and new packets generated about 1 second apart . Timeout interval is 10 m/sec if the
special acknowledgement timer were eliminated, unnecessary timeout would occur . In
the scenario, how any times average msg would have been transmitted

18 In a class C address, if 3 bits are borrowed for subnetting of host ID part, the total
possible number of subnet masks are _________________.
.
19 This is one of two protocols that let a network administrator supervise and distribute IP
addresses from a central point. It automatically sends a new IP address when a computer
is plugged into a different place in the network.

20 The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect
it from errors. The message that should be transmitted is______

You might also like