hapter 5 Flashcards

1
Q

The network layer sits directly between the application layer and the data link layer in
the Internet five-layer network model.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The network layer provides guaranteed end-to-end delivery of the message.

A

F. The transport layer responsible moving messages from source to destination ( End-to-end delivery of message)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The transport layer routes messages through the network selecting the best path from
the source to the destination station.

A

F. The router ( network layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The transport layer process running on the destination computer, reassembles the
fragmented application message before passing it up to the application layer

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
a. physical
b. transport
c. session
d. presentation
e. data link

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________ is not an important function of the transport layer.
a. End-to-end delivery of the message
b. Taking messages from the application layer
c. Routing
d. Breaking long messages into smaller segments
e. Interfacing with the network layer

A

C. Router is in layer 3 ( network layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______ is the dominant network protocol today and is in use in virtually every LAN and WAN in the world.
a. SDLC
b. SNA
c. IPX/SPX
d. TCP/IP
e. X.25

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transmission Control Protocol/Internet Protocol was developed for ________ in
1974.
a. ARPANET
b. IBM
c. Hewlett-Packard
d. Kennesaw State University
e. Xerox

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Breaking a network into smaller parts is called network:
a. fragmentation
b. segmentation
c. localization
d. allocation
e. mitigation

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary function of the Transport layer?
a) Linking the application layer to the network
b) Segmenting data
c) Session management
d) Routing packets

A

A,B,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary responsibility of linking the application layer to the network?
a) Encoding data
b) Moving messages from source to destination
c) Authenticating users
d) Generating cryptographic keys

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does session management primarily involve in network communication?
a) Encrypting data during transmission
b) Establishing an end-to-end connection between sender and receiver
c) Managing network hardware devices
d) Monitoring network traffic patterns

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary function of the network layer (L3) in a computer network?
a) Encoding data for transmission
b) Handling physical connections
c) Routing messages through the network
d) Ensuring end-to-end delivery

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary responsibility of the network layer in a computer network?
a) Managing physical connections
b) Ensuring data encryption
c) Finding the address of the next computer
d) Establishing end-to-end connections

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What task does the network layer perform in relation to addressing?
a) Assigning IP addresses to devices
b) Converting domain names to IP addresses
c) Finding the address of the next hop
d) Managing MAC addresses

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary function of routing in a computer network?
a) Encrypting data packets
b) Managing physical connections
c) Selecting the best path from computer to computer
d) Formatting data for presentation

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which layer of the OSI model is responsible for ensuring
flow control so that the destination station does not
receive more packets that it can process at any given
time?
a. presentation Layer
b. transport Layer
c. physical Layer
d. session Layer
e. application Layer

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which layer of the OSI model is responsible for ensuring
that all packets sent are received by the destination
station by dealing with end-to-end issues?
a. presentation Layer
b. transport Layer
c. physical Layer
d. session Layer
e. application Layer

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The _________ layer is responsible for routing of messages
from the sender to the final destination.
a. data communication layer
b. resident layer
c. application layer
d. network layer
e. physical layer

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which set of protocols is widely used at the transport and network layers of the TCP/IP model?
a) UDP/IP
b) SMTP/POP3
c) TCP/IP
d) HTTP/HTTPS

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP/IP is a data link protocol that is used on the Internet

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Where is TCP/IP predominantly used?
a) In local area networks (LANs) only
b) In wide area networks (WANs) only
c) In the Internet and almost all backbone and wide area networks
d) In satellite communication networks only

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which protocol is capable of providing reasonably efficient and error-free transmission, performs error checking, transmits large files with end-to-end delivery assurance, and is compatible with a variety of data link layer protocols?

A) UDP/IP
B) FTP
C) TCP/IP
D) HTTP

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TCP/IP provides

A

reasonably efficient and error-free transmission, performs error checking, transmits large files with end-to-end delivery assurance, and is compatible with a variety of data link layer protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which component of the TCP/IP protocol suite handles error checking and segments data into segments?

A) TCP
B) IP
C) UDP
D) HTTP

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which aspect of the TCP/IP protocol suite manages the addressing and routing of data packets?

A) TCP
B) IP
C) UDP
D) HTTP

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

TCP software is only active at the sender and receiver, managing data at the application layer

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

IP is responsible for error-free delivery of packets on a TCP/IP network

A

F. TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The TCP portion of TCP/IP performs linking to the application layer

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to.

A

F. The destination port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What role does the source port play in TCP communication?
a) It identifies the type of packet
b) It directs the packet to the destination IP address
c) It indicates the destination application layer program
d) It identifies the application layer program from which the packet originates

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What information does the destination port provide to the TCP software at the destination?
a) The source IP address
b) The application layer program to which the packet should be directed
c) The encryption method used
d) The packet sequence number

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the typical size of control information in a TCP segment?
a) 192 bytes
b) 24 bytes
c) 192 bits
d) 24 bits

A

A. A typical TCP segment has a 192 b (24 B) of control information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

TCP includes a sequence number so that the packets can be reassembled at the
destination in the correct order.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Why is the sequence number crucial in TCP communication?
a) To determine the destination port
b) To ensure no segment is lost during transmission
c) To encrypt the data being sent
d) To identify the source IP address

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the size of the TCP header length when there is no “options” field?
a) 160 bytes
b) 160 bits
c) 20 bytes
d) 20 bits

A

B. ( 20 Bytes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What protocol, included in the Internet Protocol Suite, is used for sending single small packets without segmentation or reassembly?
a) Transmission Control Protocol (TCP)
b) User Datagram Protocol (UDP)
c) Internet Protocol (IP)
d) Hypertext Transfer Protocol (HTTP)

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

UDP is not a protocol used at the application layer

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which fields are included in the UDP header?

A) Destination port, Source port, Length
B) Destination port, Source port, Length, CRC-16
C) Destination port, Length, CRC-16
D) Source port, Length, CRC-16

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What protocol is commonly used for transmitting DNS requests?

A) TCP
B) HTTP
C) UDP
D) FTP

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What distinguishes User Datagram Protocol (UDP) from Transmission Control Protocol (TCP) in terms of message delivery?
a) UDP ensures reliable delivery of messages.
b) UDP checks for lost messages.
c) UDP does not check for lost messages, unlike TCP.
d) UDP retransmits lost messages automatically.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

UDP is not commonly used for:
a. network management control messages
b. RIP messages
c. DHCP addressing messages
d. HTTP requests
e. DNS requests

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which characteristic best describes the use of User Datagram Protocol (UDP) in the TCP/IP suite?
a) It employs acknowledgments (ACKs) for reliable data transfer.
b) It is connection-oriented with flow control mechanisms.
c) It operates on a connectionless basis without acknowledgments or flow control.
d) It guarantees the ordered delivery of packets.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

For what purpose is UDP commonly used within the TCP/IP suite?
a) Large data transfers requiring reliability
b) Video streaming with real-time playback
c) File transfer with congestion control
d) Control messages, particularly small ones like DNS queries

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What type of applications are suitable for using UDP due to its characteristics?
a) Applications requiring strict ordering of data packets
b) Applications with large data transfers and extensive error correction
c) Applications where occasional packet loss can be tolerated, such as video streaming
d) Applications involving secure and encrypted data transmission

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Who ultimately decides whether to use TCP or UDP for a particular application within the TCP/IP protocol suite?
a) The transport layer protocol
b) The network administrator
c) The engineer writing the application
d) The hardware manufacturer

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

TCP is the network layer protocol used on the Internet today

A

F. IP is the network layer protocol, and its PDUs are called packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

IP is responsible for error-free delivery of packets on a TCP/IP network.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the size of the header in bits for IP version 4 (IPv4)?
a) 192 bits
b) 24 bits
c) 32 bits
d) 64 bits

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How many bytes are there in the header of IPv4?
a) 192 bytes
b) 24 bytes
c) 32 bytes
d) 64 bytes

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What type of addresses does IPv4 use?
a) 16-bit addresses
b) 32-bit addresses
c) 64-bit addresses
d) 128-bit addresses

A

B. Source address: 32 bits
Destination: 32 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the size of the header in bits for IPv4 when the “Options” field is not utilized?
a) 160 bits
b) 192 bits
c) 20 bits
d) 24 bits

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits

A

F. the latest is IPv6: ( increased address size from 32 bits to 132 buts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A destination port number at the transport layer identifies which application on a
computer should receive the data transmission

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Source port address is the logical address used to identify the application that is
sending the data.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What advantage does IPv6 offer in terms of packet structure compared to IPv4?
a) Increased header size for added information
b) Enhanced error-checking mechanisms
c) Simpler packet structure facilitating routing
d) More complex packet structure for better security

A

A,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the size of the IPv6 header in bits?
a) 320 bits
b) 40 bits
c) 320 bytes
d) 40 bytes

A

A. ( 40 Bytes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the theoretical maximum number of addresses that IPv4 can accommodate?
a) 1.7 billion
b) 4.3 billion
c) 8.6 billion
d) 16.8 billion

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

How many addresses are reserved within the IPv4 address space?
a) 500,000
b) 500 million
c) 5 million
d) 5 billion

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What mathematical formula represents the calculation of the total number of combinations for IPv4 addresses?
a) 2^(# of bits) = # of combinations
c) # of combinations = 2 * (# of bits)
d) # of combinations = 2^2 * (# of bits)

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What conclusion is drawn regarding the necessity of IPv6 based on the statement?
a) IPv6 is essential due to the imminent depletion of IPv4 addresses.
b) IPv6 is unnecessary since there is little chance of exhausting the IPv6 address space.
c) IPv6 is critical for future network scalability and growth.
d) IPv6 adoption is irrelevant to the availability of IPv4 addresses.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

How many bytes are there in an IPv4 address?
a) 1 byte
b) 2 bytes
c) 3 bytes
d) 4 bytes

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is the purpose of using dotted decimal notation for IPv4 addresses?
a) To increase the security of IP addresses
b) To make IP addresses more confusing for humans
c) To break the address into 4 bytes and represent each byte in decimal form
d) To reduce the length of IP addresses

A

C

64
Q

How many bytes are represented in an IPv4 address using dotted decimal notation?
a) 1 byte
b) 2 bytes
c) 3 bytes
d) 4 bytes

A

A

65
Q

What does the dotted decimal notation 128.192.56.1 represent?
a) The binary equivalent of an IPv4 address
b) An IPv6 address
c) An IPv4 address broken into 4 bytes, each represented in decimal form
d) An encrypted form of an IP address

A

C

66
Q

What is the format used for representing IPv6 addresses?

a) Dotted decimal notation
b) Octal notation
c) Hexadecimal notation
d) Binary notation

A

C

67
Q

How many bytes are there in an IPv6 address?
a) 8 bytes
b) 12 bytes
c) 16 bytes
d) 20 bytes

A

C

68
Q

How are IPv6 addresses represented in hexadecimal notation?
a) Breaks the address into 4 blocks of 4-byte numbers
b) Breaks the address into 16 blocks of 8-bit numbers
c) Breaks the address into 8 blocks of 2-byte numbers
d) Breaks the address into 32 blocks of 4-bit numbers

A

C

69
Q

What is the significance of “compressed notation” in IPv6 addresses?
a) It reduces the address size to 32 bits
b) It eliminates leading zeros within each block and blocks that are all zeros
c) It increases the security of the IPv6 address
d) It allows for easier encryption of IPv6 addresses

A

C

70
Q

Which of the following is an example of an IPv6 address in compressed notation (2001:0890:0600:00d1:0000:0000:abcd:f010) ?
a) 2001:0890:0600:00d1:0000:0000:abcd:f010
b) 2001:890:600:d1: :abcd:f010
c) 192.168.1.1
d) 128.192.56.1

A

B

71
Q

What is one of the functions performed by the transport layer?
a) Routing
b) Linking to the application layer
c) Switching
d) Modulation

A

B. Linking to application layer
Segmentation
Session Management

72
Q

Which of the following is NOT a function of session management in the transport layer?
a) Connection-oriented messaging
b) Connectionless messaging
c) Quality of Service (QoS) routing
d) Segmenting data

A

D

73
Q

Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller segments.

A

T

74
Q

Assume that more than one application program is using the same communications
line on a particular computer. To be able to decide to which application program a
message should be delivered on this computer, TCP/IP relies on the:
a. data link layer address
b. port address
c. application layer address
d. network address
e. IP address

A

B

75
Q

How does TCP handle multiple Application Layer protocols simultaneously?
a) By assigning unique IP addresses to each protocol
b) By using different transport layer protocols for each protocol
c) By utilizing port addresses in the TCP header fields
d) By relying on physical layer addressing

A

C

76
Q

How does TCP solve the problem of determining which application layer program to send a message to?
a) By using unique IP addresses for each application
b) By incorporating source and destination IP addresses in the header
c) By employing port addresses (port identifiers) in the TCP header fields
d) By encrypting the application layer data

A

C

77
Q

What role do port addresses play in TCP communication?
a) They determine the physical location of the destination computer
b) They specify the type of network interface used for transmission
c) They help distinguish among many open applications on a computer
d) They regulate the flow of data packets between routers

A

C

78
Q

How does an application layer program inform TCP of its own port address and the port address of the destination computer?
a) By embedding the information within the application layer data
b) By setting flags in the TCP header
c) By using the IP address of the computer
d) By including the information in the TCP header fields

A

D

79
Q

How many bytes are port addresses (port identifiers) in the TCP header fields?
a) 1 byte each
b) 2 bytes each
c) 4 bytes each
d) 8 bytes each

A

B

80
Q

The newer form of IP, version 6 (IPv6):
a. Is running out of address space to support the growth of the Internet
b. has a 20 byte header
c. has an increased address size from 32 bits to 128 bits
d. does not include version number in its header
e. does not include hop limit in its header

A

C

81
Q

IP:
a. performs segmentation of the data
b. does not have a header
c. is currently in use with only one packet form or structure
d. is utilized during routing functions
e. performs error control functions

A

D

82
Q

The older version of IP has a ________ header of control information.
a. 128-bit
b. 192-bit
c. 1024-bit
d. 120-bit
e. 320-bit

A

B

83
Q

Which port is typically used by web servers?
a) Port 21
b) Port 23
c) Port 25
d) Port 80

A

D

84
Q

What service commonly utilizes port 21?
a) Telnet
b) SMTP
c) FTP
d) HTTP

A

C

85
Q

What is the standard port for Telnet?
a) Port 21
b) Port 23
c) Port 25
d) Port 80

A

B

86
Q

Which port is associated with SMTP (Simple Mail Transfer Protocol)?
a) Port 21
b) Port 23
c) Port 25
d) Port 80

A

C

87
Q

What condition must be met if nonstandard port addresses are used?
a) The client must use standard port addresses.
b) The server must specify the correct port address.
c) The application layer software on the client must specify the correct port address.
d) Nonstandard port addresses cannot be used.

A

C

88
Q

What is one reason for using nonstandard port addresses?
a) To simplify network configurations
b) To increase network speed
c) To enhance security from commonly known ports
d) To reduce network congestion

A

C

89
Q

How does using nonstandard port addresses enhance security?
a) By reducing the need for firewalls
b) By encrypting data transmissions
c) By hiding services from attackers who target commonly known ports
d) By limiting network access to authorized users only

A

C

90
Q

What action is required by application layer software on the client when using nonstandard port addresses?
a) It must specify the correct server IP address.
b) It must establish a secure tunnel.
c) It must communicate with the server using standard port addresses.
d) It must specify the correct port address along with the server’s IP address.

A

D

91
Q

The transport layer must break messages from the application layer into several
_____ that can be sent to the network layer.
a. bits
b. bytes
c. frames
d. segments
e. strings

A

D

92
Q

Which application layer software typically delivers packets one at a time?
a) Email clients
b) Web browsers
c) File transfer applications
d) Instant messaging clients

A

B

93
Q

What happens to incoming packets in applications like email clients?
a) They are discarded upon arrival.
b) They are delayed indefinitely.
c) They are delivered one at a time and held until all packets have arrived.
d) They are processed immediately.

A

C

94
Q

In which scenario are incoming packets held until all packets have arrived to complete the message?
a) Web browsing
b) Online gaming
c) Email communication
d) Video streaming

A

C

95
Q

Which of the following best describes the responsibility of TCP (Transmission Control Protocol) in data transmission?

A) Ensuring that data is securely encrypted during transmission.
B) Managing the routing of data packets across the network.
C) Guaranteeing that the receiver has received all sent segments through continuous automatic repeat request.
D) Controlling the physical layer connections between devices.

A

C

96
Q

What primarily determines the maximum TCP segment size in a communication?

A) Sender’s TCP configuration
B) Receiver’s TCP configuration
C) Data link layer protocol capabilities
D) Internet Protocol (IP) version being used

A

C

97
Q

The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n)
___________ between the sender and receiver.
a. network layer address resolution
b. one way handshake
c. SNA message
d. TCP connection
e. DNS server request

A

D

98
Q

When calculating the maximum TCP user data field size, which headers are subtracted from the maximum data field size of the data link layer?

A) Ethernet header and TCP header
B) TCP header and IPv4 header
C) IPv4 header and UDP header
D) Ethernet header and UDP header

A

B

99
Q

How does TCP handle negotiating the optimal segment size between sender and receiver?

A) By automatically adjusting segment size based on network conditions
B) By consulting the data link layer protocol specification
C) Through negotiation during the establishment of a TCP connection
D) By relying on the sender’s TCP configuration

A

C

100
Q

Which statement accurately describes the relationship between the data link layer and the transport layer in data transmission?

A) The data link layer breaks down packets received from the transport layer into smaller frames for transmission.
B) The transport layer determines the size limit of frames for transmission over the network.
C) The data link layer sets the maximum length of packets transmitted between nodes in a network.
D) The transport layer divides messages from the application layer into smaller packets due to the data link layer’s frame length limitation.

A

D

101
Q

What analogy best describes a “session” in computer networking?

A) A highway connecting two cities
B) A conversation between two computers
C) A library containing books and documents
D) A pipeline transporting water from one location to another

A

B

102
Q

There are three approaches of managing a session through:

A
  • Connection-Oriented Messaging ( provided by TCP)
  • Connectionless Messaging ( provided by UDP)
  • QoS Routing ( Provided by TCP)
103
Q

Which of the following accurately describes the characteristics of Connectionless Messaging?

A) It involves establishing a session with the receiver before sending data segments.
B) It ensures reliability through acknowledgment of received segments, provided by TCP.
C) It allows the sender to send data without prior session establishment, provided by UDP.
D) It optimizes routing decisions based on quality of service requirements.

A

C

104
Q

Which of the following accurately describes the characteristics of Connection-Oriented Messaging?

A) It guarantees the delivery of data by establishing a persistent connection between sender and receiver.
B) It is provided by UDP and involves sending a single short information message without establishing a session.
C) It ensures reliability through sequence numbering and acknowledgment of segments, provided by TCP.
D) It assigns different priorities to data packets based on their size, optimizing routing decisions.

A

C

105
Q

Quality of Service (Qos) routing is a special type of routing in which different connections
are assigned different priorities.

A

T

106
Q

TCP/IP operates only as connection-oriented

A

F

107
Q

A TCP three-way handshake is used to establish a/an ___________ messaging
method.
a. asynchronous
b. connection-oriented
c. frequency division
d. application net
e. connectionless

A

B

108
Q

Which protocol provides connection-oriented messaging?

A) UDP
B) TCP
C) ICMP
D) HTTP

A

B

109
Q

What does TCP do during connection-oriented messaging?

A) Sends packets without establishing a connection
B) Sets up a session between sender and receiver
C) Assigns different priorities to packets
D) Utilizes packet switching

A

B

110
Q

How does TCP handle packet transmission in connection-oriented messaging?

A) Sends packets randomly to optimize speed
B) Transmits packets out of order to reduce latency
C) Sends packets in sequence
D) Drops packets if congestion is detected

A

C

111
Q

Which of the following protocols commonly uses connection-oriented messaging?

A) DNS
B) DHCP
C) HTTP
D) SNMP

A

C. HTTP,SMTP,FTP,Telnet

112
Q

How does TCP establish a connection during connection-oriented messaging?

A) By sending a single SYN packet
B) By sending a SYN, ACK, and FIN packet
C) Through a three-way handshake involving SYN, SYN-ACK, and ACK packets
D) By sending an acknowledgment for received data

A

C

113
Q

Which term best describes the randomly generated number used in the SYN packet?

A) Sequence number
B) Acknowledgment number
C) Session identifier
D) Protocol identifier

A

A

114
Q

What additional functionalities does the TCP three-way handshake facilitate besides connection establishment?

A) Negotiating encryption algorithms
B) Establishing routing tables
C) Negotiating segment sizes and facilitating error correction
D) Determining packet prioritization

A

C

115
Q

______ is a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error.

a.) NAK
b.) ARQ
c.) MAC
d.) Echo

A

B

116
Q

What does “stop-and-wait” refer to in ARQ protocols?

A) The sender waits for an acknowledgment before sending the next segment.
B) The sender continuously sends segments without waiting for acknowledgment.
C) The receiver stops processing segments upon error detection.
D) The sender terminates the connection upon completion of data transmission.

A

A

117
Q

How do ‘Stop and Wait ARQ’ and ‘Continuous ARQ’ differ?

a.) With ‘Stop and Wait ARQ’ the receiver retransmits the message after the sender sends the data, while with ‘Continuous ARQ’ the receiver transmits the message before the sender send the data.
b.) With ‘Continuous ARQ’ the receiver retransmit the message after the sender sends the data, while with ‘Stop and Wait ARQ’ the receiver transmits the message before the sender send the data.
c.) With ‘Stop and Wait ARQ’ the sender pauses for a response from the receiver to alter each message or packet of data, while with ‘Continuous ARQ’ the sender immediately sends the next message or packet of data.
d.) With ‘Continuous ARQ’ the sender pauses for a response from the receiver to alter each message or packet of data, while with ‘Stop and Wait ARQ’ the sender immediately sends the next message or packet of data.

A

C

118
Q

Stop-and-wait ARQ uses ___________ type of data flow.
a. full simplex
b. half complex
c. full duplex
d. half duplex
e. full complex

A

D

119
Q

Another term for stop-and-wait ARQ is sliding window.

A

F. That is continuous ARQ term

120
Q

What are the two types of ARQ?
a. Stop-and-wait and continuous
b. Half and full duplex
c. Continuous and intermittent
d. Selective and continuous
e. Stop-and-wait and selective

A

A

121
Q

In ARQ, a NAK:

a.) is sent by the recipient if the message was received without error
b.) is sent by the sender at the same time as it sends a data packet
c.) is sent by the recipient if the message contains an error
d.) refers to non-asynchronous Kermit technique
e.) means that the sender should continue with sending the next message

A

A

122
Q

With __________ ARQ, the sender immediately sends the next message or packet of data.

a.) continuous
b.) immediate
c.) open window
d.) stop-and-wait
e.) halt and be recognized (HBR)

A

A

123
Q

What does the term “sliding window” refer to in data communication?

A) A technique for continuous acknowledgment of received segments
B) A temporary buffer used for storing data segments
C) A method for adjusting the transmission rate based on network congestion
D) A protocol for establishing connections between sender and receiver

A

B

124
Q

How does a TCP/IP connection terminate according to the provided information?

A) By sending a single FIN packet from the sender to the receiver.
B) Through a four-way handshake involving FIN and ACK exchanges.
C) By immediately terminating the connection upon completion of data transmission.
D) By requesting acknowledgment for each transmitted segment.

A

B

125
Q

What role does the sender (client) play in the termination of a TCP/IP connection?

A) Initiates termination by sending a FIN packet.
B) Acknowledges the receiver’s termination request.
C) Waits for the receiver’s acknowledgment before terminating.
D) Initiates termination by sending an ACK packet.

A

A

126
Q

How does the receiver (server) respond to the sender’s termination request in the TCP/IP connection?

A) By sending an ACK packet only.
B) By immediately terminating the connection.
C) By acknowledging the sender’s FIN and sending its own FIN packet.
D) By ignoring the sender’s termination request.

A

C

127
Q

When is the TCP/IP connection successfully terminated?

A) Upon the sender’s receipt of ACK for its FIN packet.
B) Upon the receiver’s receipt of ACK for its FIN packet.
C) Upon the sender’s acknowledgment of the receiver’s FIN packet.
D) Upon the receiver’s acknowledgment of the sender’s FIN packet.

A

B

128
Q

What is the primary goal of flow control in Automatic Repeat reQuest (ARQ) protocols?

A) Ensuring the security of transmitted data
B) Preventing data loss during transmission
C) Balancing the rate of data transmission between sender and receiver
D) Increasing the throughput of the network

A

C

129
Q

How does flow control operate in stop-and-wait ARQ?

A) The sender sends ACK or NAK messages to regulate the flow of data.
B) The receiver sends ACK or NAK messages to indicate readiness to receive more frames.
C) The sender adjusts the transmission rate based on network congestion.
D) The receiver discards excess frames to maintain flow control.

A

B

130
Q

How do the sender and receiver cooperate in flow control with continuous ARQ?
A) The sender adjusts the sliding window size independently of the receiver.
B) Both sender and receiver agree on the size of the sliding window.
C) The receiver controls the sliding window size without input from the sender.
D) The sender determines the sliding window size based on its own capacity.

A

B

131
Q

What is the purpose of the “sliding window” in flow control with continuous ARQ?

A) To prevent data corruption during transmission
B) To regulate the flow of data by controlling the transmission rate
C) To store received data temporarily before processing
D) To define the maximum number of messages that can be handled by the receiver

A

D

132
Q

Which statement best describes the concept of flow control in ARQ protocols?

A) It focuses on maintaining data integrity during transmission.
B) It ensures that the sender does not overwhelm the receiver with data.
C) It involves encrypting data to prevent unauthorized access.
D) It determines the optimal routing path for data packets.

A

B

133
Q

With _____________ messaging, each UDP segment makes its own way through the network without the use of sequence numbers or acknowledgements.

a.) frequency division
b.) connection-oriented
c.) PCMCIA
d.) connectionless
e.) application net

A

D

134
Q

Connectionless routing sets up a TCP connection, or virtual circuit between a sender
and receiver

A

F.

135
Q

______________ communication is most commonly used when the application data
or message can fit into one single packet.
a. Frame-oriented
b. Connection-oriented
c. Connectionless
d. Physical-oriented
e. Byte-oriented

A

C

136
Q

What characterizes Connectionless Messaging provided by UDP?

A) Sending packets in sequence with acknowledgment between sender and receiver.
B) Establishing a persistent connection before transmitting data packets.
C) Sending packets individually without establishing a connection.
D) Ensuring reliable delivery of data through continuous acknowledgment.

A

C

137
Q

How are packets sent in Connectionless Messaging?

A) In sequential order, ensuring they follow the same route and arrive simultaneously.
B) Independently of one another, routed separately, and potentially arriving at different times.
C) With continuous acknowledgment to guarantee receipt by the receiver.
D) In predefined batches to optimize routing efficiency.

A

B

138
Q

What ensures correct reassembly of packets in Connectionless Messaging?

A) Automatic retransmission of lost packets by the sender.
B) Sequential numbering of packets by the receiver’s network layer.
C) Assigning a sequence number to each packet by the sender’s network layer.
D) Real-time monitoring of packet delivery by the network infrastructure.

A

B

139
Q

Why is UDP preferred for connectionless messaging?

A) Due to its extensive error correction mechanisms.
B) Because of its support for reliable, ordered delivery of packets.
C) Because of its smaller header size compared to other protocols.
D) Because it guarantees the establishment of a connection before data transmission.

A

C

140
Q

Which type of data is commonly transmitted using Connectionless Messaging?

A) Large multimedia files
B) Continuous data streams
C) Short application data or messages that fit into a single packet
D) Synchronous communication signals

A

C

141
Q

What defines QoS (Quality of Service) Routing in network communication?

A) Prioritizing network traffic based on the size of the data packets.
B) Assigning different priorities to connections based on their importance.
C) Encrypting data packets to ensure secure transmission.
D) Regulating the flow of data between sender and receiver.

A

B

142
Q

What type of applications are typically assigned the highest priority in QoS Routing?

A) Large file transfers
B) Real-time applications like VoIP (Voice over Internet Protocol)
C) Email clients
D) Web browsing

A

B

143
Q

What is the main consideration for QoS Routing in terms of packet delivery?

A) Maximizing the throughput of the network
B) Ensuring the highest possible security for transmitted data
C) Delivering packets within a certain period of time to produce a smooth, continuous output
D) Minimizing latency in data transmission

A

C

144
Q

Why is timely delivery of packets particularly important in QoS Routing?

A) To ensure data confidentiality
B) To optimize network bandwidth usage
C) To prevent network congestion
D) To support real-time interactive applications like voice and video

A

D

145
Q

Which type of application typically has the lowest priority in QoS Routing?

A) Real-time video streaming
B) Large file transfers
C) Email delivery
D) Web browsing

A

C

146
Q

What is the primary function of QoS (Quality of Service) in network communication?

A) Ensuring maximum bandwidth utilization
B) Assigning priorities to classes of service based on their importance
C) Encrypting data packets for secure transmission
D) Regulating the flow of data between sender and receiver

A

B

147
Q

Which protocol is known for supporting Quality of Service (QoS) within the TCP/IP protocol suite?

A) HTTP
B) RTSP
C) FTP
D) SMTP

A

B. Real-time streaming protocol

148
Q

What is the primary function of the Real-Time Streaming Protocol (RTSP)?

A) Transferring files between client and server
B) Setting up connections for audio-video streaming applications
C) Sending and receiving emails
D) Resolving domain names to IP addresses

A

B

149
Q

What is the primary function of the Resource Reservation Protocol (RSVP)?

A) Transferring files between client and server
B) Setting up connections for general-purpose real-time applications
C) Sending and receiving emails
D) Resolving domain names to IP addresses

A

B

150
Q

What capability do protocols like RSVP and RTSP enable application layer software to request?

A) Maximum bandwidth utilization
B) Secure data encryption
C) Specific minimum data transfer capabilities
D) Priority routing for data packets

A

C

151
Q

What is the primary function of the Real-Time Transport Protocol (RTP) in network communication?

A) Establishing virtual connections between client and server
B) Adding sequence numbers and timestamps to facilitate synchronization
C) Regulating the flow of real-time data packets
D) Encrypting data packets for secure transmission

A

B

152
Q

When is Real-Time Transport Protocol (RTP) typically used in conjunction with other protocols?

A) Before establishing a virtual connection
B) After a virtual connection setup by RTSP or RSVP
C) During the negotiation of Quality of Service (QoS) parameters
D) When encrypting data packets for transmission

A

B

153
Q

Why does RTP use UDP as the transport protocol?

A) Because UDP provides built-in encryption for secure transmission
B) Because UDP offers reliable, ordered delivery of packets
C) Because UDP has a small header size and is suitable for real-time applications
D) Because UDP guarantees low latency and high throughput

A

C

154
Q

How are real-time packets created and transmitted using RTP?

A) Each packet is encapsulated within a TCP segment before transmission.
B) Each packet is encapsulated within an IP datagram before transmission.
C) Each packet is created using RTP and then encapsulated within a UDP datagram.
D) Each packet is transmitted directly without encapsulation.

A

C

155
Q

With QoS routing different __________ are defined, each with different priorities.
a. classes of service
b. domain names
c. application layer addresses
d. data link layer addresses
e. classes of Internet addresses

A

A

156
Q

Which of the following is not a protocol used at the application layer.
a. HTTP
b. SMTP
c. FTP
d. Telnet
e. UDP

A

E

157
Q
A