0% found this document useful (0 votes)
3 views

Comp. Net. MCQ GPT MIDDTERM

The document contains a comprehensive set of midterm examination questions focused on discrete event simulation, network protocols, and performance metrics in computer networking. It includes original, additional, alternative, and advanced exam sections, with questions covering topics such as packet switching, TCP/IP model layers, queuing theory, and network security. Each question is accompanied by multiple-choice answers, with the correct answer indicated for each.

Uploaded by

ozcan8479
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Comp. Net. MCQ GPT MIDDTERM

The document contains a comprehensive set of midterm examination questions focused on discrete event simulation, network protocols, and performance metrics in computer networking. It includes original, additional, alternative, and advanced exam sections, with questions covering topics such as packet switching, TCP/IP model layers, queuing theory, and network security. Each question is accompanied by multiple-choice answers, with the correct answer indicated for each.

Uploaded by

ozcan8479
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Table of Contents

1. Exam 1: Original Midterm (15 Questions)


2. Exam 1 – Additional Questions (Questions 16–20)
3. Alternative Midterm Examination (10 Questions)
4. Advanced Midterm Examination (25 Questions)
5. Medium-Level Midterm Examination (22 Questions)

─────────────────────────────────────────────

1. Exam 1: Original Midterm (15 Questions)

1. Which statement best describes a discrete event simulator (DES)?


A. A simulator that updates system states continuously in real time.
B. A tool that models systems by representing changes as discrete events occurring at
specific time instants.
C. A system that primarily simulates fluid dynamics and continuous processes.
D. A framework that only models static network topologies.
Answer: B

2. One of the key benefits of using a discrete event simulator is:


A. It eliminates the need for physical network resources entirely.
B. It allows testing of various configurations without impacting a live system, thereby
reducing risk.
C. It always provides real-time feedback without any delay.
D. It automatically corrects errors in network protocols during simulation.
Answer: B

3. OMNeT++ is best described as:


A. A hardware device used for real-time network monitoring.
B. A continuous simulation framework primarily used for analog signal processing.
C. A discrete event simulation environment used to model and simulate complex networks
through modular components and message passing.
D. A tool exclusively designed for security analysis in computer networks.
Answer: C

4. The primary difference between packet switching and circuit switching is that packet
switching:
A. Requires a dedicated circuit to be established before any data is transmitted.
B. Transmits data in fixed time slots regardless of data availability.
C. Divides messages into packets that are transmitted independently over shared network
resources.
D. Guarantees circuit-like performance for each connection.
Answer: C

5. Which of the following lists the layers of the TCP/IP model in the correct order from top to
bottom?
A. Application, Transport, Network, Link
B. Application, Network, Transport, Physical
C. Transport, Application, Link, Network
D. Network, Transport, Application, Link
Answer: A

6. In the context of network protocols, which element is typically found in the header of an IP
packet?
A. The encryption key for the payload
B. The source and destination addresses
C. The complete routing table of the sender
D. A checksum for the entire network
Answer: B

7. Which pair of delays is correctly defined as follows: “Transmission delay is the time
required to push all the packet’s bits onto the link, while propagation delay is the time
required for a bit to traverse the link”?
A. dqueue and dproc
B. dproc and dtrans
C. dtrans and dprop
D. dqueue and dprop
Answer: C

8. In a packet-switched network, the delay incurred while packets wait in a router’s buffer for
their turn to be transmitted is known as:
A. Propagation delay
B. Processing delay
C. Queuing delay
D. Transmission delay
Answer: C

9. Which of the following best describes the role of a router in a packet-switched network?
A. It establishes dedicated circuits for each communication session.
B. It performs both local forwarding of packets based on headers and global routing
decisions via routing algorithms.
C. It exclusively manages wireless access points.
D. It only provides physical connectivity between two devices.
Answer: B

10. Which trio of performance metrics is most commonly used to evaluate a network’s
effectiveness?
A. Delay, packet reordering, and jitter
B. Loss, delay, and throughput
C. Bandwidth, modulation, and encryption
D. Signal strength, latency, and coding rate
Answer: B

11. In comparing the OSI and TCP/IP models, which of the following is true regarding the
TCP/IP stack?
A. It includes a dedicated presentation layer that the OSI model does not have.
B. It has four layers and does not include separate presentation and session layers as
defined in the OSI model.
C. It is identical to the OSI model in terms of the number of layers and their functions.
D. It replaces the application layer with the physical layer.
Answer: B

12. Packet switching employs a “store-and-forward” mechanism. This means that:


A. Each router begins forwarding a packet before it is completely received.
B. An entire packet must be received at a router before it is forwarded to the next hop.
C. Packets are fragmented and sent out of order to improve speed.
D. Data is continuously streamed without any intermediate storage.
Answer: B

13. A denial-of-service (DoS) attack is characterized by:


A. A systematic probing of network vulnerabilities to infiltrate a system.
B. An attacker sending a flood of bogus traffic to overwhelm a target’s resources, rendering
it unavailable to legitimate users.
C. The use of encryption to hide the identity of a sender.
D. A targeted interception of data packets between two hosts.
Answer: B

14. In circuit-switched networks, which of the following techniques is used to allow multiple
users to share the same transmission medium?
A. Packet fragmentation
B. Frequency Division Multiplexing (FDM) and Time Division Multiplexing (TDM)
C. Error correction coding
D. Dynamic routing protocols
Answer: B

15. The primary purpose of using a simulation framework like OMNeT++ in computer
network research is to:
A. Replace all physical network infrastructure in production systems.
B. Model and analyze network behaviors and protocols in a controlled, risk-free
environment.
C. Guarantee real-time performance in live networks.
D. Automatically generate network security policies without human intervention.
Answer: B

─────────────────────────────────────────────

2. Exam 1 – Additional Questions (Questions 16–20)

16. A packet of size L = 10 Kbits is transmitted over a link with rate R = 100 Mbps. What is
the one-hop transmission delay (in milliseconds)?
A. 0.1 ms
B. 1 ms
C. 10 ms
D. 0.01 ms
Answer: A

17. Given the propagation delay formula dₚ = d/s, where d is the distance and s is the
propagation speed, calculate the propagation delay if d = 1,000 km and s = 2×10⁸ m/s.
A. 5 ms
B. 50 ms
C. 0.5 ms
D. 500 ms
Answer: A

18. If the average packet arrival rate to a link is 10,000 bits/sec and the link’s transmission
rate is 100 Mbps, what is the traffic intensity (La/R)?
A. 0.0001
B. 0.1
C. 0.01
D. 1
Answer: A

19. In a simplified queueing model (M/M/1 queue), the average number of packets in the
system is given by L = λ/(μ − λ). If the arrival rate λ = 0.8 packets/sec and the service rate μ =
1 packet/sec, what is L?
A. 4 packets
B. 2 packets
C. 0.8 packets
D. 8 packets
Answer: A

20. Consider a simplified model for a network buffer where the number of packets N(t)
changes according to the differential equation
dN/dt = λ − μN(t),
with a constant arrival rate λ = 5 packets/sec, a constant departure rate μ = 1 sec⁻¹ per packet,
and an initial condition N(0) = 0. Which of the following is the solution for N(t) for t ≥ 0?
A. N(t) = 5(1 – e^(–t))
B. N(t) = 5e^(–t)
C. N(t) = 5t
D. N(t) = 5te^(–t)
Answer: A

─────────────────────────────────────────────

3. Alternative Midterm Examination (10 Questions)

1. Which of the following scenarios is most appropriately modeled using a discrete event
simulator (DES)?
A. Monitoring continuous temperature changes in a chemical reactor.
B. Simulating the arrival of vehicles at a traffic intersection at distinct times.
C. Modeling gradual changes in water levels in a reservoir.
D. Analyzing the continuous flow of electric current in a conductor.
Answer: B

2. OMNeT++ employs a modular architecture in which independent components (modules)


communicate via message passing. This design primarily supports:
A. Real-time error correction on physical hardware.
B. The scalability required to simulate complex, large-scale networks.
C. Continuous streaming of multimedia data without interruption.
D. Automatic integration with Internet Service Provider (ISP) infrastructures.
Answer: B

3. Which statement best distinguishes packet switching from circuit switching?


A. Packet switching establishes a dedicated circuit before transmission, while circuit
switching sends packets independently.
B. Packet switching divides messages into packets that are routed independently, whereas
circuit switching reserves an entire path for the session.
C. Packet switching guarantees fixed latency, whereas circuit switching does not.
D. Packet switching is only used in local networks, while circuit switching is used in wide-
area networks.
Answer: B

4. In the TCP/IP model, which layer is primarily responsible for ensuring reliable, end-to-end
data delivery?
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Answer: B

5. A network packet of length L bits is transmitted over a link with a transmission rate of R
bits per second. Which expression correctly represents the transmission delay?
A. R / L
B. L / R
C. L × R
D. R – L
Answer: B

6. The total end-to-end delay experienced by a packet in a network generally comprises


several components. Which of the following is NOT typically included as a delay component?
A. Transmission delay
B. Propagation delay
C. Processing delay
D. Encoding delay
Answer: D

7. Consider a network buffer modeled by the differential equation


dN/dt = λ – μN(t)
with a constant arrival rate λ = 4 packets/sec, a departure rate per packet μ = 0.5 sec⁻¹, and the
initial condition N(0) = 0. What is the steady-state number of packets in the buffer as t → ∞?
A. 2 packets
B. 4 packets
C. 8 packets
D. 0 packets
Answer: C

8. What is the primary function of an Internet Exchange Point (IXP) within the network of
networks?
A. To allocate IP addresses to end users.
B. To interconnect multiple ISPs, facilitating efficient exchange of traffic.
C. To serve as the central repository for global routing tables.
D. To act as a dedicated gateway for secure communications.
Answer: B

9. Resource sharing in packet-switched networks is particularly effective for handling bursty


traffic because:
A. Unused capacity can be dynamically allocated to active users during idle periods.
B. Each user is guaranteed a fixed bandwidth regardless of demand.
C. It eliminates the need for buffering during high-traffic periods.
D. It reserves the entire link capacity for a single transmission session.
Answer: A

10. In the context of network security, what is the primary objective of IP spoofing?
A. To increase the encryption strength of transmitted packets.
B. To disguise the true source of a packet by falsifying its source IP address.
C. To create dedicated secure channels between routers.
D. To optimize routing efficiency across the network.
Answer: B

─────────────────────────────────────────────

4. Advanced Midterm Examination (25 Questions)

1. A discrete event simulator (DES) is characterized primarily by:


A. Continuously updating the system state at every moment in time.
B. Updating the system state only when discrete events occur.
C. Using analog signals to model system behavior.
D. Running in real time without any event scheduling.
Answer: B

2. In a DES, the simulation clock advances:


A. In fixed time increments regardless of events.
B. Only when an external trigger is received.
C. Directly from one event to the next.
D. Continuously based on the system’s physical clock.
Answer: C

3. Which simulation framework is widely used for modeling communication networks using a
discrete event approach?
A. NS-2
B. OMNeT++
C. MATLAB/Simulink
D. OPNET
Answer: B

4. In OMNeT++, independent modules communicate primarily via:


A. Shared memory access.
B. Remote procedure calls (RPC).
C. Message passing.
D. Direct hardware interrupts.
Answer: C

5. Packet switching divides data into packets that are:


A. Sent in a continuous stream without fragmentation.
B. Transmitted sequentially over a reserved circuit.
C. Transmitted independently over shared network links.
D. Merged into a single large frame before transmission.
Answer: C

6. Compared to circuit switching, packet switching offers which key advantage?


A. Guaranteed constant bandwidth for each session.
B. Dedicated paths for each connection.
C. More efficient resource sharing during bursty traffic.
D. Lower protocol overhead in call setup.
Answer: C

7. In the TCP/IP model, which layer is responsible for providing end-to-end reliability?
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Answer: B

8. In an IP packet, which fields are essential for the routing process?


A. Source and destination IP addresses
B. Port numbers
C. Time-to-live and checksum only
D. Protocol type and encryption key
Answer: A

9. A packet is 1500 bytes in length. When transmitted over a link with a rate of 100 Mbps,
what is the transmission delay (in microseconds)?
A. 120 µs
B. 12 µs
C. 1.2 µs
D. 15 µs
Answer: A
(Hint: 1500 bytes = 12,000 bits)

10. Propagation delay on a link is determined by:


A. The packet’s length divided by the link rate.
B. The distance between endpoints divided by the propagation speed.
C. The processing time at routers.
D. The size of the router’s buffer.
Answer: B

11. In a router, the queuing delay is most directly influenced by:


A. The fixed processing time per packet.
B. The link’s transmission rate.
C. The traffic intensity (arrival rate relative to service rate).
D. The propagation speed on the link.
Answer: C

12. For an M/M/1 queue, stability requires that:


A. The arrival rate λ is equal to the service rate μ.
B. The arrival rate λ exceeds the service rate μ.
C. The arrival rate λ is less than the service rate μ.
D. The arrival rate λ is zero.
Answer: C

13. For an M/M/1 queue with λ = 800 packets/sec and μ = 1000 packets/sec, the average
number of packets in the system L is given by L = λ/(μ − λ). What is L?
A. 4 packets
B. 2 packets
C. 0.8 packets
D. 1.25 packets
Answer: A

14. In network security, IP spoofing refers to:


A. Encrypting the source IP address to hide it.
B. Falsifying the source IP address in a packet’s header.
C. Establishing a secure VPN tunnel.
D. Scanning for open ports on a network.
Answer: B

15. A denial-of-service (DoS) attack is primarily designed to:


A. Intercept and modify data packets in transit.
B. Overwhelm a target’s resources, rendering services unavailable.
C. Improve network throughput by rerouting traffic.
D. Authenticate users without using passwords.
Answer: B

16. Which physical transmission medium is most resistant to electromagnetic interference?


A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. Unshielded Ethernet cable
Answer: C

17. In circuit-switched networks, a major drawback is:


A. The need for complex packet headers.
B. Inefficient resource utilization during idle periods.
C. High probability of packet loss due to buffer overflow.
D. The inability to support real-time voice communications.
Answer: B

18. Which of the following is NOT an OSI layer?


A. Presentation layer
B. Session layer
C. Encryption layer
D. Transport layer
Answer: C

19. Which transport protocol is inherently connectionless?


A. TCP
B. SCTP
C. UDP
D. HTTP
Answer: C

20. Consider a network buffer modeled by the differential equation


dN/dt = λ – μN(t)
with λ = 5 packets/sec, μ = 1 sec⁻¹, and initial condition N(0) = 0. Which of the following is
the correct solution for N(t)?
A. N(t) = 5(1 – e^(–t))
B. N(t) = 5e^(–t)
C. N(t) = 5t
D. N(t) = 5te^(–t)
Answer: A

21. Based on the model in Question 20, what is the steady-state (long-term) number of
packets in the buffer?
A. 0 packets
B. 2.5 packets
C. 5 packets
D. Infinity
Answer: C

22. An Internet Exchange Point (IXP) primarily serves to:


A. Allocate IP addresses to end users.
B. Provide security filtering for Internet traffic.
C. Interconnect multiple ISPs for efficient traffic exchange.
D. Act as a central repository for DNS records.
Answer: C

23. In a packet-switched network, if the traffic intensity (λ/μ) approaches 1, you can expect:
A. Minimal queuing delay and zero packet loss.
B. Stable operation with constant throughput.
C. Exponential increases in queuing delay and a higher likelihood of packet loss.
D. A sudden drop in transmission delay.
Answer: C

24. The primary function of a router in an internetwork is to:


A. Encrypt data before transmission.
B. Connect end devices directly to the Internet.
C. Forward packets between networks using routing protocols.
D. Control access to a wireless network.
Answer: C
25. A modular, layered network architecture provides which main advantage?
A. It forces all layers to use the same protocol standards.
B. It allows independent upgrades and maintenance, with changes in one layer remaining
transparent to others.
C. It eliminates the need for error-checking at the physical layer.
D. It reduces the overall number of protocols required in the network.
Answer: B

─────────────────────────────────────────────

5. Medium-Level Midterm Examination (22 Questions)

1. A discrete event simulator (DES) updates the system state:


A. Continuously at every infinitesimal time step.
B. Only when a discrete event occurs.
C. According to a fixed clock regardless of events.
D. Only when the user intervenes.
Answer: B

2. Which of the following is a common simulation framework for modeling communication


networks using DES?
A. MATLAB/Simulink
B. OMNeT++
C. Microsoft Excel
D. AutoCAD
Answer: B

3. In OMNeT++, the primary means for independent modules to communicate is through:


A. Shared variables.
B. Message passing.
C. File I/O operations.
D. Direct memory mapping.
Answer: B

4. Packet switching divides application data into smaller units called:


A. Frames.
B. Circuits.
C. Packets.
D. Channels.
Answer: C

5. A key advantage of packet switching over circuit switching is:


A. Guaranteed dedicated bandwidth.
B. More efficient resource sharing during bursty traffic.
C. Lower delay in setting up a connection.
D. Elimination of any packet loss.
Answer: B

6. In the TCP/IP model, which layer is primarily responsible for end-to-end error detection
and reliability?
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Answer: B

7. Which transport protocol is connectionless?


A. TCP
B. UDP
C. SCTP
D. FTP
Answer: B

8. The Time-to-Live (TTL) field in an IP packet is used to:


A. Indicate the packet size.
B. Limit the packet’s lifetime in the network.
C. Encrypt the packet header.
D. Determine the packet’s priority.
Answer: B

9. Which factor does NOT directly affect the propagation delay on a link?
A. Distance between endpoints.
B. Propagation speed in the medium.
C. Packet length in bits.
D. Physical medium type.
Answer: C

10. The transmission delay for a packet is computed as:


A. Link rate divided by packet length.
B. Packet length divided by link rate.
C. Sum of propagation and processing delays.
D. The product of packet length and link rate.
Answer: B

11. In a router, queuing delay is most influenced by:


A. The fixed processing time per packet.
B. The number of packets waiting in the buffer.
C. The physical length of the link.
D. The encryption algorithm used.
Answer: B

12. For an M/M/1 queue, stability requires that:


A. Arrival rate λ equals service rate μ.
B. Arrival rate λ exceeds service rate μ.
C. Arrival rate λ is less than service rate μ.
D. Service rate μ is zero.
Answer: C

13. In an M/M/1 queue with λ = 50 packets/sec and μ = 100 packets/sec, the average number
of packets in the system L is given by L = λ/(μ – λ). What is L?
A. 1 packet
B. 0.5 packets
C. 2 packets
D. 50 packets
Answer: A

14. Consider a network buffer modeled by the differential equation


dN/dt = λ – μN(t)
with λ = 6 packets/sec, μ = 2 sec⁻¹, and initial condition N(0) = 0. Which expression
represents the number of packets N(t) at time t?
A. N(t) = 3(1 – e^(–2t))
B. N(t) = 3e^(–2t)
C. N(t) = 6t – 2t²
D. N(t) = 6(1 – e^(–t))
Answer: A

15. As t → ∞ in Question 14’s model, the buffer reaches a steady state of:
A. 0 packets
B. 2 packets
C. 3 packets
D. 6 packets
Answer: C

16. Which of the following best describes the Internet?


A. A single, centralized network.
B. A network of networks that interconnects numerous autonomous systems.
C. A system of dedicated circuits only.
D. A local area network (LAN) for a single building.
Answer: B

17. An Internet Exchange Point (IXP) is primarily used to:


A. Allocate IP addresses to users.
B. Interconnect multiple ISPs for efficient traffic exchange.
C. Monitor global DNS records.
D. Provide secure email services.
Answer: B

18. IP spoofing is a technique used to:


A. Encrypt data packets for secure transmission.
B. Falsify the source IP address in packet headers.
C. Increase the packet transmission rate.
D. Compress the packet size for faster delivery.
Answer: B

19. Which transmission medium is least affected by electromagnetic interference?


A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. Unshielded copper cable
Answer: C
20. In circuit-switched networks, a major disadvantage is:
A. Inefficient resource utilization during idle periods.
B. High probability of packet loss during congestion.
C. Complex packet header structures.
D. Unpredictable delay due to dynamic routing.
Answer: A

21. In the OSI model, the layer responsible for routing packets between networks is the:
A. Application layer
B. Session layer
C. Network layer
D. Physical layer
Answer: C

22. HTTP is a protocol that operates at which layer of the TCP/IP model?
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Answer: A

You might also like