CS610 Final Term Papers
CS610 Final Term Papers
Question # 1 of 20
BGP
IGP
EGP
none of the given
Question # 2 of 20
Due to revolutionalization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Scale is also dramatically changed. Size from a few tens to a few tens of millions
of computers has been revolutionized. Speed has increased from 56Kbps to 1Gbps. Also
there is an increased frame size in hardware
Question # 3 of 20
Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Select correct option:
True
False
COMPUTING THE CLASS OF AN ADDRESS:
Whenever it handles a packet, IP software needs to separate the destination
address into a prefix and suffix.
Question # 4 of 20
TTL stands for __________
Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given
Question # 5 of 20
IGPs stand for _________
Select correct option:
Logical address
Source port
Destination Port
None of the given
Field Destination Port identifies which application program on receiving computer should
receive the data. While field source port identifies the application programs that sent the data.
Question # 7 of 20
__________________encapsulates IP datagram as data area in hardware frame.
Select correct option:
Question # 11 of 20
______ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
Transport layer provides reliable delivery. Network layer – IP – can detect and
report errors without actually fixing them. It focuses on datagram delivery. Application
layer is not interested in differentiating among delivery problems at intermediate routers
Question # 12 of 20
The process of using a routing table to select a next hop for a given datagram is
called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given
The process of using a routing table to select a next hop for a given datagram is called routing or
forwarding.
Question # 13 of 20
The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False
The process of learning the path MTU is known as path MTU discovery.
Question # 14 of 20
As the Internet grew, the original Classful addressing scheme became a limitation. The IP
address space was being exhausted because all networks had to choose one of ________ possible
sizes.
Select correct option:
three
two
four
five
Three
As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose one of
three possible sizes. Many addresses were unused.
Two new mechanisms were invented to overcome the limitations, which are as
follows:
• Subnet addressing
• Classless addressing
Question # 15 of 20
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
Question # 16 of 20
EGP stands for _________
Select correct option:
Question # 17 of 20
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or
a key that represents the original string.
Select correct option:
True
False
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or
a key that represents the original string. Hashing is used to index and retrieve items in a database
because it is faster to find the item using the shorter hashed key than to find it using the original
value. It is also used in many encryption algorithms.
Question # 18 of 20
Although the ARP message format is sufficiently general to allow arbitrary protocol and
hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet
address.
Select correct option:
16-bit
48-bit
64-bit
128-bit
Although the ARP message format is sufficiently general to allow arbitrary protocol and
hardware addresses. ARP is almost always used to bind a 32-bit IP address to a 48-bit Ethernet
address
Question # 19 of 20
Reliability is not the responsibility of the Transport layer.
Select correct option:
True
False
Reliability is the responsibility of the Transport layer. In TCP/IP, TCP provides reliable
transport service. Most Internet applications use TCP as no other protocol has proved to work
better.
Question # 20 of 20
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
http://www.vuzs.net/
96
100
120
none of the given
IPv6 address with 96 leading zeros is interpreted to hold an IPv4 addressQuestion # 1 of 20
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the
same time.
Select correct option:
True
False
Question # 2 of 20
TCP uses the term segment to refer to a ________.
Select correct option:
packet
message
both (a) and (b)
None of the given
both a and b?
TCP uses single format for all messages. TCP uses the term segment to refer to a message. Each
message sent from TCP on one machine to TCP on another machine uses this format including
data and acknowledgement.
Question # 3 of 20
The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
False
UDP has the following characteristics.
• It is an end-to-end protocol. It provides application-to-application communication.
• It provides connectionless service.
• It is a Message-Oriented protocol.
• It uses best-effort delivery service.
• It follows arbitrary interaction.
• It is operating system independent
Question # 4 of 20
______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
The FRAGMENT OFFSET field tells a receiver how to order fragments within a given datagram
Question # 5 of 20
IP datagram can contains ________ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
Datagrams can have different sizes i.e.
Header area is usually fixed (20 octets) but can have options. Data area can contain
between 1 octet and 65.535 octets (216-1).
Usually, data area is much larger than header.
Question # 6 of 20
The amount of buffer space available at any time is called the window.
Select correct option:
True
False
Question # 7 of 20
_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
IPv6 source (not intermediate routers) is responsible for fragmentation. Routers
simply drop datagrams larger than network MTU (Maximum Transmission Unit). So
source must fragment datagram to reach destination.
Question # 8 of 20
Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow label
Destination address
none of the given
Routers use flow label to forward datagrams along prearranged path
Question # 9 of 20
_______ protocol uses three way handshake to begin a connection.
Select correct option:
UDP
TCP
IP
none of the given
Question # 10 of 20
Typical internet routing uses uses a combination of two metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count
Question # 14 of 20
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
True
False
Question # 18 of 20
The Network Layer Protocol ICMP stands for____________
Select correct option:
18 years
20 years
22 years
none of given
Question # 20 of 20 ( Start time: 11:05:43 AM ) Total M - 1
TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False
Header contains all information needed to deliver datagram to the destination computer.
But which one of the following is not included:
Network Layer
Question
________ field is used to identify a specific path through the network
Select correct option:
Flow label
Traffic class
Both a and b
Flow label is partitioned into a TRAFFIC CLASS field and a separate FLOW LABEL field used
to identify a specific path thorough the network.
Question
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
Although the ARP message format is sufficiently general to allow arbitrary protocol and
hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet
address.
48bit
Other options are missing
ARP is almost always used to bind a 32-bit IP address to a 48-bit Ethernet address
Question
For _____________, information about forwarding is stored in a routing table, which is
initialized at system initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies
For efficiency, information about forwarding is stored in a routing table, which is initialized at
system initialization and must be updated as network topology changes
Question
_______ is a technique used to Limit datagram size to small MTU of any network
Select correct option:
Segmentation
Fragmentation
Encapsulation
FRAGMENTATION:
One technique is to limit datagram size to smallest MTU of any network
Question
Class A mask is 255.0.0.0 which is used for ______
Select correct option:
Unicasting
Multicasting
Subnetting
Question
When one computer sends an ARP message to another the message travels inside the hardware
frame. Technically, placing a message inside a frame for transport is not called encapsulation.
Select correct option:
True
False
Technically, placing a message inside a frame for transport is called encapsulationQuestion
Which one of these is not a main feature of connectionless service:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It has universal addressing and the data is delivered in packets frames), without a header.
Question
Which protocol is used to test different tools
ICMP
IGMP
TCP/IP
none of the given
ICMP can also be used to test different tools.
Question
________ message is sent in response to incoming datagrams with problems.
Select correct option:
TCP/IP
IGMP
ICMP
Question
Which one is NOT the function of ping program
Traceability
Reach ability
Both a and b
Question
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
Question
A datagram cannot be larger than ________ of a network over which it is sent.
Select correct option:
MTU
Size
IP header
Datagram encapsulated in a hardware frame must be smaller than the MTU for that hardware
Question
The Source can configure outgoing datagram’s to avoid _________
Segmentation
Defragmentation
Fragmentation
Question
Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the ____________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame
Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the Maximum Transmission Unit (MTU).
Question
_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
Question
_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
The protocol address of the next hop must be _____________ to an equivalent hardware address
before a packet can be sent.
Encrypted
Decrypted
Translated
Non of these
A _____________ address-binding table is used for each physical network.
New
Similar
Separate
Old
UDP provides connection-oriented service.
True
False
TCP provides connection oriented reliable data streaming service, whereas UDP provides
connection-less unreliable messaging service.
The UDP stands for__________.
Universal Datagram Protocol
User Datagram Protocol
United Datagram Protocol
None of the given
In 3-way handshake TCP requires to generate a random ________ sequence number.
30 bit
32 bit
34 bit
none of the given
TCP stands for _______
Transport control protocol
Transmission control protocol
Terminal control protocol
None of the given