370 Midterm
Method(s) to move data through a network of links and switches
d) Both packet switching and Circuit switching
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
a) added
User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
c) Telnet
Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
c) Telnet
Which one is not true regarding the pipelined protocols in transport layer?
c) in Go-Back-N receiver individually acknowledges all correctly received packets
Which one is not true regarding the UDP checksum?
c) receiver puts checksum value into UDP checksum field
Which of the following is true regarding the protocols? a) They define the format and the order of messages sent among network entities. b) They define the format and the order of messages received among network entities c) They define the actions taken on message transmission d) A & B & C
d) A & B & C
The first Network
d) ARPANET
15. Which one of the following is not correct? a) application layer protocols are used by both source and destination devices during a communication session 3 b) HTTP is a session layer protocol c) TCP is an application layer protocol d) All of the mentioned
d) All of the mentioned
24. Which of the following is an application layer service ? a) Network virtual terminal b) File transfer, access, and management c) Mail service d) All of the mentioned
d) All of the mentioned
Transmission control protocol is
d) All of the mentioned
Transport services available to applications in one or another form
d) All of the mentioned
19. This is one of the architecture paradigm
d) Both Peer to Peer & Client Server
As the resources are reserved between two communicating end systems in circuit switching, this is achieved
guaranteed constant rate
The _______ is the physical path over which a message travels
B) medium
Frequency division multiplexing is a process in ... a) access network b) cable network c) DSL d) a & b & c
A & b & c
A local telephone network is an example of a _______ network
A) Packet switched
Which of this is not a network edge device?
D) Switch
Which one of the following is not true regarding the 'Internet'?
It is in network layer
Which one of the following is not true regarding the internet
It is in network layer
All communication activities in the internet is governed by..
Protocols
Which one of the following is a version of UDP with congestion control?
a) Datagram congestion control protocol
21. Application layer offers _______ service
a) End to end
16. When displaying a web page, the application layer uses the
a) HTTP protocol
A set of rules that governs data communication
a) Protocols
The IETF standards documents are called
a) RFC
Electronic mail uses this Application layer protocol
a) SMTP
11. The ASCII encoding of binary data is called
a) base 64 encoding
The ____________ translates internet domain and host names to IP address.
a) domain name system
Transport layer aggregates data from different applications into a single stream before passing it to
a) network layer
In _________ resources are allocated on demand.
a) packet switching
A _____ is a TCP name for a transport service access point.
a) port
14. Which protocol is a signalling communication protocol used for controlling multimedia communication sessions?
a) session initiation protocol
Which one of the following protocol delivers/stores mail to reciever server?
a) simple mail transfer protocol
An endpoint of an inter-process communication flow across a computer network is called
a) socket
Which one of the following is a transport layer protocol?
a) stream control transmission protocol
The structure or format of data is called
a) syntax
20. Application developer has permission to decide the following on transport layer side
b) Both transport layer protocol and maximum buffer size
The resources needed for communication between end systems are reserved for the duration of session between end systems in ________
b) Circuit switching
18. The packet of information at the application layer is called
b) Message
As the resouces are reserved between two communicating end systems in circuit switching, this is achieved
b) Packet switching
Most packet switches use this principle
b) Store and forward
Which one is true about TCP premature timeout?
b) it happens when timeout value is too short
Transport layer protocols deals with
b) process to process communication
12. Which one of the following is an internet standard protocol for managing devices on IP network?
b) simple newtwork management protocol
12. Which one of the following is an internet standard protocol for managing devices on IP network?
b) simple newtwork management protocol
Socket-style API for windows is called
b) winsock
Which one of the following is a transport layer protocol used in networking?
c) Both TCP and UDP
22. E-mail is
c) Elastic application
To deliver a message to the correct application program running on a host, the _______ address must be consulted
c) Port
23. Pick the odd one out
d) Internet telephony
26. This is a time-sensitive service
d) Internet telephony
17. This is not a application layer protocol
d) TCP
What is 'cwnd'? a) Congestion window size b) dynamic function of perceived network congestion c) It includes only in-flight segments d) a & b
d) a & b
What are the main components of a home network? a) wireless access point b) router. Firewall, NAT c) wired Ethernet, cable or DSL modem d) a & b & c & d
d) a & b & c & d
9. Application layer protocol defines a) types of messages exchanged b) message format, syntax and semantics c) rules for when and how processes send and respond to messages d) all of the mentioned
d) all of the mentioned
Which of the following is an application layer service? a) Network virtual terminal b) File transfer, access, and management c) Mail service d) All of the mentioned
d) all of the mentioned
Which of the following is an effective strategy for TCP flow control? a) additive increase and multiplicative decrease b) receiver advertises free buffer space by including rwnd value in TCP header of receiver-tosender segments c) sender limits amount of unacked ("in-flight") data to receiver's rwnd value
d) b & c
Which of the following is not true regarding the TCP congestion control?
d) in TCP TENO loss is indicated by 2 duplicate ACKs
Communication between a computer and a keyboard involves ______________ transmission
d) simplex
13. Which one of the following is not an application layer protocol?
resource reservation protocol