NetWorking
UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00101010 and 11001100. What is the 1s complement of the sum of those two bytes?
00001001
UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00101010 and 11001100. What is the 1s complement of the sum of those two bytes?
00001001-
What is the 32-bit binary equivalent of the IP address 13.253.17.252?
00001101.1111101.00010001.11111100
What is the 32-bit binary equivalent of the IP address 13.253.17.252?
00001101.1111101.00010001.11111100-
What is the 32-bit binary equivalent of the IP address 13.253.17.253?
00001101.1111101.00010001.11111101
What is the 32-bit binary equivalent of the IP address 13.253.17.253?
00001101.1111101.00010001.11111101-
Assume the original message to be sent 101110, the generator is 1001. What is the remainder resulted during the CRC computation?
011
Assume the original message to be sent 101110, the generator is 1001. What is the remainder resulted during the CRC computation?
011-
UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00110111 and 01011100. What is the 1s complement of the sum of those two bytes?
01101100
UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00110111 and 01011100. What is the 1s complement of the sum of those two bytes?
01101100-
UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00111101 and 01010001. What is the 1s complement of the sum of those thow bytes?
01110001
UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00111101 and 01010001. What is the 1s complement of the sum of those thow bytes?
01110001-
UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00110111 and 01001100. What is the 1s complement of the sum of those two bytes?
01111100
UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00110111 and 01001100. What is the 1s complement of the sum of those two bytes?
01111100-
Which one is the flag used for framing in PPP?
01111110
flag used for framing in PPP
01111110
Which of the following can be an Ethernet physical address?
07:01:02:01:2C:4B
If an IPv6 address has digits of ________, we can abbreviate the address.
0s
At the CRC generate,...added the data unit before division process.
0s are
G At the CRC generate, ___ added the data unit before division process.
0s are
At the CRC generate, .... added the data unit before division process.
0s are-
G At the CRC generate, ___ added the data unit before division process.
0s are-
The target hardware address on an Ethernet is _______ in an ARP request.
0x000000000000
For control, NVT uses US ASCII characters with the highest order bit set to ______.
1
How many collision domains has the computer network with 88 computers, 10 hubs and 2 repeaters
1
There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 3Mbps, 2 Mbps, and 1 Mbps. What is the throughput between the client and the server?
1 Mbps
There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 3Mbps, 2 Mbps, and 1 Mbps. What is the throughput between the client and the server?
1 Mbps-
The default lease time of an IP address offer is ________.
1 hour
How many collision domains has the computer network with 88 computers, 10 hubs and 2 repeaters
1-
Consider sending a 5550-byte datagram into a link that has an MTU of 520 bytes (including IP header of 20 bytes). How many fragments are generated?
12
The VPI of an NNI is _______ bits in length.
12
The general header in SCTP is _______ bytes.
12
Consider sending a 5550-byte datagram into a link that has an MTU of 520 bytes (including IP header of 20 bytes). How many fragments are generated?
12-
What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/10?
12.0.0.0
What is the first address of a block of classless addresses if one of the addresses is 12.2.2.127/28?
12.2.2.112
What is the last address of a block of classless addresses if one of the addresses is 12.2.2.127/28?
12.2.2.127
What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/27?
12.2.2.64
What is the last address of a block of classless addresses if one of the addresses is 12.2.2.6/30?
12.2.2.7
If the segment has sequence number of 118 and length of 8 bytes, the receiving computer will send ACK with value of _________
126
If the segment has sequence number of 118 and length of 8 bytes, the receiving computer will send ACK with value of _________
126-
For a 1-byte length field, what is the maximum value for the data length?
127
A host with an IP address of 142.5.0.1 needs to test internal software. What is the destination address in the packet?
127.1.1.1
An IPv6 address is _________ bits long.
128
IPv6 has _______ -bit addresses.
128
How "big" is an IPv6 Internet address?
128 bits-
What is the total delay for transmission of 2000 Mb of text over fiber optic cable with distance of 3000 km with transmission rate of 2Gbps (ignore all other delay)?
12msec
What is the total delay for transmission of 2000 Mb of text over fiber optic cable with distance of 3000 km with transmission rate of 2Gbps (ignore all other delay)?
12msec-
If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of
136-
Consider an IP subnet with prefix 139.27.229.96/28. Which address belongs to the subnet?
139.27.229.100-
What is the result of ANDing 254 and 15?
14
Assume the RTT 50ms, the size of the Web object 0.4Mb and the transmission rate 10Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP??
140ms
Assume the RTT 50ms, the size of the Web object 0.4Mb and the transmission rate 10Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP??
140ms-
What is the result of ANDing 255 and 15?
15
A port address in TCP/IP is ______ bits long.
16
A port address in UDP is _______ long.
16
An IPv6 address consists of ________ bytes (octets);
16
An organization is granted a block of classless addresses with the starting address 199.34.76.64/28. How many addresses are granted?
16
The subnet mask for a class C network is 255.255.255.248. How many subnetworks are available?
16
The number of addresses in a class A block is _______.
16,777,216
SNMP uses the services of UDP on two well-known ports, _______ and _______.
161; 162
Given the subnet with address 201.14.78.0 and the subnet mask 255.255.255.0, which address belongs to that subnet?
201.14.78.64
Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address?
201.14.78.64-
Given the subnet with address 201.14.78.0 and the subnet mask 255.255.255.0, which address belongs to that subnet?
201.14.78.64-
FTP uses port____ for sending identification and password and port____ for sending data
21...20
FTP uses port____ for sending identification and password and port____ for sending data
21...20-
Assume the RTT 100ms, the size of the Web object 1kb and the transmission rate 100kbps, how long does it take to download that object from the Web Server to a client if using non-persistent HTTP?
210ms
Assume the RTT 100ms, the size of the Web object 1kb and the transmission rate 100kbps, how long does it take to download that object from the Web Server to a client if using non-persistent HTTP?
210ms-
In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection.
21; 20
Which of the following is not a valid acknowledgment number?
232
Which one is not an IP address?
251.222.258.1
Which one is not an IP address?
251.222.258.1-
Which one is not an IP address?
254.322.255.1
Which one is not an IP address?
254.322.255.1-
Which one is not a contiguous mask?
255.148.0.0
In a block, the prefix length is /15; what is the mask?
255.254.0.0
In a block, the prefix length is /22; what is the mask?
255.255.252.0
The IP broadcast address is
255.255.255.255
Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/24.
256
The number of addresses in a class C block is _______.
256
Which one is not an IP address?
256.222.255.1
Which one is not an IP address?
256.222.255.1-
What is the total delay for transmission of 1.25MB of images over fiber optic cable with distance of 4500 km with transmission rate of 1Gbps (ignore all other delays). Assume that the speed of propagation is 300,000km/sec.
25msec
What is the total delay for transmission of 1.25MB of images over fiber optic cable with distance of 4500 km with transmission rate of 1Gbps (ignore all other delays). Assume that the speed of propagation is 300,000km/sec.
25msec-
In classful addressing, the class of the address can be found by shifting the copy of the address ____ bits to the right.
28
How many duplicate ACKs to trigger the Fast Retransmission mode?
3
In classful addressing we need a routing table with at least ______ columns.
3
How many duplicate ACKs to trigger the Fast Retransmission mode?
3-
Assume that an image is about 1000 x 800 pixels with 1 byte/pixel and it is uncompressed. How long does it take to transmit it over a 2 Mbps channel?
3.2 sec
Assume that an image is about 1000 x 800 pixels with 1 byte/pixel and it is uncompressed. How long does it take to transmit it over a 2 Mbps channel?
3.2 sec-
A common value for MSL is between___ seconds and ___ minute(s).
30; 1
An IPv6 address can have up to __________ hexadecimal digits.
32
An organization is granted a block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted?
32
The checksum in SCTP is ________ bits.
32
Assume that the IP address has only 8 bits; first 5 bits are used for network and the remaining bits are used for host. How many subnets and hosts in each subnets can be addressed?
32 subnets and 8 hosts
assume that IP address has only 8 bits; first 5bit are used for subnet and the remaining bits are
32 subnets and 8 hosts
Assume that the IP address has only 8 bits; first 5 bits are used for network and the remaining bits are used for host. How many subnets and hosts in each subnets can be addressed?
32 subnets and 8 hosts-
In SCTP, chunks need to terminate on a _______boundary.
32-bit
While IPv4 address is ...bit-long, IPv6 address is ... bit-long
32....128
While IPv4 address is ...bit-long, IPv6 address is ... bit-long
32....128-
Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 50000 bytes
34
Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 50000 bytes
34-
A datagram of 1010 bytes needs _______ bytes of padding.
38
Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/30.
4
In classless addressing, we need a routing table with at least _______ columns.
4
Multiply the header length field by _______ to find the total number of bytes in the TCP header.
4
The subnet mask for a class C network is 255.255.255.192. How many subnetworks are available?
4
While IPv4 is ...byte-long, IPv6 is ... byte-long
4....16
While IPv4 is ...byte-long, IPv6 is ... byte-long
4....16-
The options field of the TCP header ranges from 0 to _______ bytes.
40
Slotted Aloha efficiency (useful transmission time) is approximately
40%
Slotted Aloha efficiency (useful transmission time) is approximately
40%-
Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 600,000 bytes
408
Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 600,000 bytes
408-
Assume the one-way propagation delay 100ms, the size of the Web object 0.2Mb and the transmission rate 10Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP?
420ms
Assume the one-way propagation delay 100ms, the size of the Web object 0.2Mb and the transmission rate 10Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP?
420ms-
The maximum amount of padding that can be added is _______ bytes.
47
While MAC address is ___bit long, IP address is___ bit long
48...32
While MAC address is ___bit long, IP address is___ bit long
48...32-
Assume a website has only 5 different images, using non-persistent HTTP, a client needs ______ to the server
5 TCP connections
Assume a website has only 5 different images, using non-persistent HTTP, a client needs ______ to the server
5 TCP connections-
Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 80000 bytes
55
Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 80000 bytes
55-
1500bytes including IP header of 20byte. UDP header is 8 byte, send an MP3 of 80000 bytes
56
DHCP client can be in one of ___________ states.
6
Ethernet uses a ______ physical address that is imprinted on the network interface card (NIC).
6-byte
The destination address field in an Ethernet frame is
6-byte long
the destination address field in an ethernet fram is
6-byte long
The destination address field in an Ethernet frame is
6-byte long-
Assume that an image is about 1000 x 800 pixels with 1 byte/pixel and it is uncompressed. How long does it take to transmit it over a 1 Mbps channel?
6.4sec
Assume that an image is about 1000 x 800 pixels with 1 byte/pixel and it is uncompressed. How long does it take to transmit it over a 1 Mbps channel?
6.4sec-
A subnet mask in class A has 14 1s. How many subnets does it define?
64
What is the result of ANDing 192 and 65?
64
An organization has been granted a class A address. If the organization has 256 subnets, how many addresses are available in each subnet (including special addresses)?
65,534
The number of addresses in a class B block is _______.
65,534
In BOOTP, the server uses the well-known port _______; the client uses the well-known port _______.
67; 68
An IPv6 address can have up to __________ colons.
7
An organization is granted a block of classless addresses with the starting address 199.34.76.128/29. How many addresses are granted?
8
An organization is granted a block; one address is 2.2.2.64/25. If the subnet prefix length is /28, what is the maximum number of subnets?
8
The VPI of a UNI is _______ bits in length.
8
The subnet mask for a class B network is 255.255.224.0. How many subnetworks are available?
8
UDP packets have a fixed-size header of _______ bytes.
8
a subnet mask in class B has 19 1s. How many subnets does it define?
8
Which is a protocol for wireless LAN
802.11
Which is a protocol for wireless LAN
802.11-
In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in length.
8: 4
A datagram of 402 bytes is divided into _______ cells.
9
Assume the RTT 40ms, the size of the Web object 0.2Mb and the transmission rate 20Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP??
90ms
Assume the RTT 40ms, the size of the Web object 0.2Mb and the transmission rate 20Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP??
90ms-
A sequence of 72 bits, after encoding using BASE64, become a sequence of
96 bits-
Suppose there are 3 routers between the source host and the destination host, 10ms is the processing delay at each router or host, 12ms is the propagation delay at each link, and 2ms is the transmission delay out of each router and the source, then the total delay is (ignore all other delays)
96ms
Suppose there are 3 routers between the source host and the destination host, 10ms is the processing delay at each router or host, 12ms is the propagation delay at each link, and 2ms is the transmission delay out of each router and the source, then the total delay is (ignore all other delays)
96ms-
Which organization has authority over interstate and international commerce in the communications field?
FCC
What are the two methods of circuit switching?
FDM and TDM
two famous techniques of channel partition
FDM and TDM
What are the two methods of circuit switching?
FDM and TDM-
The broadcast MAC address in LAN is
FF-FF-FF-FF-FF-FF
The broadcast MAC address in LAN is
FF-FF-FF-FF-FF-FF-
What flag is used to close TCP connection?
FIN
What flag is used to close TCP connection?
FIN-
In the _______ state, the client TCP has closed its connection to the server.
FIN-WAIT-2
If a label is terminated by a null string, it is called a __________.
FQDN
The HTTP request line contains a _______ method to get information about a document without retrieving the document itself.
HEAD
Which chunk probes the condition of an association?
HEARTBEAT chunk
The _______ field of the ATM header provides error control.
HEC
The second generation of cable networks is called a(n) _______ network.
HFC
_____________ is a language for creating Web pages.
HTML
_____________ is a language for creating Web pages.
HTML-
Protocol used to exchange email between email server is
HTTP
Which of the following is present in both an HTTP request line and a status line?
HTTP version number
Protocol used to exchange email between email server is
HTTP-
Which one is incorrect about UDP?
Has congestion control
Which one is incorrect about UDP?
Has congestion control-
This command identifies the sender of the message.
MAIL FROM
In _______, a logical tunnel is established by encapsulating the multicast packet inside a unicast packet.
MBONE
We can compare the task of network management to the task of writing a program. Both tasks need variable declarations. In network management this is handled by _________.
MIB
Which protocol helps to transfer non-plain text files such as image or audio files via SMTP email systems?
MIME
________ is a supplementary protocol that allows non-ASCII data to be sent through email.
MIME
_________ is a supplementary protocol that allows non-ASCII data to be sent through email.
MIME
Which protocol helps to transfer non-plain text files such as image or audio files via SMTP email systems?
MIME-
____________ is used to compress video.
MPEG
The actual mail transfer is done through ____________.
MTAs
When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.
MTU
IMAP and POP are_________
Mail access protocols
IMAP and POP are_________
Mail access protocols-
And encoding technique used in Ethernet that encodes bit 1 a transition from up to down and bit 0 a transition from down to up (of electrical signal) is called
Manchester encoding
And encoding technique used in Ethernet that encodes bit 1 a transition from up to down and bit 0 a transition from down to up (of electrical signal) is called
Manchester encoding-
A three-character data frame: A FLAG B when framing methods using Flag bytes with byte stuffing, the output will be
A ESC FLAG B
A three-character data frame: A FLAG B when framing methods using Flag bytes with byte stuffing, the output will be
A ESC FLAG B-
________ provides service to the user to make the process of sending and receiving a message easier.
A UA
To connect to two similar LANs you use
A bridge
To connect to two similar LANs you use
A bridge-
Dijkstra's algorithm is
A link-state routing algorithm
_______ runs the SNMP client program; _______ runs the SNMP server program.
A manager; an agent
_________ address defines a group of computers.
A multicast
At the CRC checker,______if the data unit is damaged.
A nonzero remainder
Which of the following is an appropriate description concerning mobile network users?
A notebook computer used in a class
Which of the following is an appropriate description concerning mobile network users
A notebook computer used in a class-
Assume a website has only 15 different objects, using persistent HTTP, a client needs ______ to the server
A single TCP connection
Assume a website has only 15 different objects, using persistent HTTP, a client needs ______ to the server
A single TCP connection-
What is the combination of an IP address and a port number called?
A socket
What is the combination of an IP address and a port number called?
A socket-
hat is the combination of an IP address and a port number called
A socket-
Ethernet is
A type of LAN (Local Area Networks)
Ethernet is
A type of LAN (Local Area Networks)-
Which one is correct about P2P network?
A user computer can be both client and server
Which one is correct about P2P network?
A user computer can be both client and server-
In classless addressing,_______is assigned to an organization.
A variable-length block-
To find the physical address of the exiting-point router, ATM uses the services of _________.
ATMARP
In classless addressing, the prefix length defines the _____________.
C) mask
The number of addresses assigned to an organization in classless addressing _______.
C) must be a power of 2
The first address assigned to an organization in classless addressing _______.
B) must be evenly divisible by the number of addresses
A _______ certifies the binding between a public key and its owner.
CA
In TCP congestion control, two important variables the sender has to keep track are
Congestion window and the threshold
In TCP congestion control, two important variables the sender has to keep track are
Congestion window and the threshold-
Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNECT are for implementing
Connection-Oriented services in the Transport Layer
Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNECT are for implementing
Connection-Oriented services in the Transport Layer-
What type of service that VC network provide?
Connection-oriented
What type of service that Virtual Circuit network provide?
Connection-oriented
What type of service that VC network provide?
Connection-oriented-
What type of service that Virtual Circuit network provide?
Connection-oriented-
Although HTTP is stateless, if the webserver wants to identify the users, ____is used
Cookies
Although HTTP is stateless, if the webserver wants to identify the users, ____is used
Cookies-
In the file distribution of the client-server model, the server has to send ____ of file to many hosts, consuming a large amount of_____
Copies...bandwidth
In the file distribution of the client-server model, the server has to send ____ of file to many hosts, consuming a large amount of_____
Copies...bandwidth-
Reliable data transfer in TCP ensures that data is delivered from sending process to receiving process__________
Correctly and in order
Reliable data transfer in TCP ensures that data is delivered from sending process to receiving process__________
Correctly and in order-
If the router's buffer memory is empty and no other packet is currently being transmitted, then the packet's____ will be zero
Queueing delay
If the router's buffer memory is empty and no other packet is currently being transmitted, then the packet's____ will be zero
Queueing delay-
Which delay mainly depends on the congestion of the network?
Queuing delay
Which delay mainly depends on the congestion of the network?
Queuing delay-
_______ is a dynamic mapping protocol in which a logical address is found for a given physical address.
RARP
This command identifies the receiver of the message in email.
RCPT TO
This command identifies the recipient of the mail.
RCPT TO
This command identifies the receiver of the message in email.
RCPT TO-
The metric used by _______ is the hop count.
RIP
In ________, the multicast packet must reach only those networks that have active members for that particular group.
RPM
Pruning and grafting are strategies used in _______.
RPM
_______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.
RPM; RPB
In TFTP, what type of message is sent to establish a connection to retrieve a file?
RRQ
___________ is a protocol for controlling the flow and quality of dat
RTCP
__________ is the protocol designed to handle real-time traffic on the Internet.
RTP
CSMA/CA belong to______ group, one of three broad classes of MAC protocols.
Random access
CSMA/CA belong to______ group, one of three broad classes of MAC protocols.
Random access-
The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with
Randomly generated number
The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a
Randomly generated number-
Which one is not in UDP segment header?
Receiving Windows
Which one is not in UDP segment header?
Receiving Windows -
In______resolution, the resolver expects the server to supply the final answer.
Recursive
In __________ resolution, the resolver expects the server to supply the final answer.
Recursive-
Which one best describes the advantage(s) of using cache in proxy server?
Reduce the delay time to download content from the remove a remove web server
Which one best describes the advantage(s) of using cache in proxy server?
Reduce the delay time to download content from the remove a remove web server-
In Congestion avoidance of TCP congestion control, if timeout occurs while the current congestion window size is 16, the congestion window will_______________
Reduce to 1
In Congestion avoidance of TCP congestion control, if timeout occurs while the current congestion window size is 16, the congestion window will_______________
Reduce to 1-
In Congestion avoidance of TCP congestion control, when timeout occurs, the congestion window_______________
Reduces to 1
In Congestion avoidance of TCP congestion control, when timeout occurs, the congestion window_______________
Reduces to 1-
in congestion controlCongestion avoidance of TCP congestion control, when timeout occurs, the congestion window_______________
Reduces to 1-
TCP is a (an) _______ transport protocol.
Reliable
TCP is a (n)__________transport protocol.
Reliable
That an application can rely on the connection to deliver all of its data without error and in the proper order is called
Reliable data transfer
______ in the Internet is achieved through the use of acknowledgments and retransmissions.
Reliable data transfer
That an application can rely on the connection to deliver all of its data without error and in the proper order is called
Reliable data transfer-
______ in the Internet is achieved through the use of acknowledgments and retransmissions.
Reliable data transfer-
_____ in link layer guarantees to move each _____ datagrams across the link without error
Reliable delivery.....network
_____ in link layer guarantees to move each _____ datagrams across the link without error
Reliable delivery.....network-
TCP is a (an) _______ transport protocol.
Reliable-
IMAP is designed to allow users to manipulate______, so it is more_______ than POP3
Remote mailboxes.... Complex
IMAP is designed to allow users to manipulate______, so it is more_______ than POP3
Remote mailboxes.... Complex-
In OSI model, as data packet moves from the lower to the upper layer header are¡..
Removed
In the OSI model, as a data packet moves from the lower to the upper layers, headers are____
Removed
In the OSI model, as a data packet moves from the lower to the upper layers, headers are____
Removed-
Which is the function of NAT router?
Replacing source IP address and port # with NAT IP address and new port # for every outgoing datagram and doing vice verse for every incoming datagram
Which is the function of NAT router?
Replacing source IP address and port # with NAT IP address and new port # for every outgoing datagram and doing vice verse for every incoming datagram-
Which the following is the individual characteristic of rdt3.0?
Requires countdown timer.
Which the following is the individual characteristic of rdt3.0?
Requires countdown timer.-
An SNMP agent can send _______ messages.
Response, Trap
Who can send ICMP error-reporting messages?
Routers and destination hosts
Who can send ICMP error-reporting messages?
Routers and destination hosts-
_______ deals with the issues of creating and maintaining routing tables.
Routing
IPSec requires a logical connection between two hosts using a signaling protocol called ____________.
SA
Which chunk is not involved in association establishment?
SACK chunk
_______ is suitable for businesses that require comparable upstream and downstream data rates.
SDSL
AAL5 is sometimes called the _________.
SEAL
___________ is an application protocol that establishes, manages, and terminates a multimedia session
SIP
A set of rules or guidelines that govern interactions between two computer systems in a computer network is called_____
Network protocols
.... are sets of rules or guidelines that govern interactions between two computer systems in a computer network
Network protocols-
Which layer does ICMP reside in?
Network-
The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.
Next
The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.
Next-
Which of the following is true about ICMP messages?
No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.
In a Datagram networks,
No call setup and packets may take different paths for the same source-destination pair
In a Datagram networks,
No call setup and packets may take different paths for the same source-destination pair-
SMTP, POP3, and IMAP protocols run on the following layer:
None of them
Skype is a
None of them
With the following Manchester encoding, the bit stream transmitted is _____
None of them
Which layer in the Internet that connects directly to wire?
None of them, physical
SMTP, POP3, and IMAP protocols run on the following layer:
None of them-
Skype is a
None of them-
With the following Manchester encoding, the bit stream transmitted is _____
None of them-
What is the throughput of a link in a network?
Number of bits travelling through the link in a unit time
IP Version 5 was a proposal based on the ______ model. This version never went beyond the proposal stage due to extensive layer changes and the projected expense.
OSI
The _______ model shows how the network functions of a computer ought to be organized.
OSI
We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________.
SMI
________ defines the general rules for naming objects, defining object types, and showing how to encode objects and values.
SMI
__________ creates a collection of named objects, their types, and their relationships to each other in an entity to be managed.
SMI
SNMP uses two other protocols:________ and _________.
SMI; MIB
We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is handled by _______.
SMNP
The formal protocol that defines the MTA client and server in the Internet is called ___________.
SMTP
Which one is correct about SMTP?
SMTP restricts the body of all mail messages to be in simple seven-bit ASCII.
Which one is correct about SMTP?
SMTP restricts the body of all mail messages to be in simple seven-bit ASCII.-
To distinguish between different data chunks belonging to the same stream, SCTP uses ___________.
SSNs
The request and reply message can be used to bind a physical address to an IP address in a(n) _______ situation.
SVC
What network device decreases collision?
SWITCH-
The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
SYN flooding
The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
SYN flooding-
The ability of P2P networks to handle many peers is called
Scalability
The ability of P2P networks to handle many peers is called
Scalability-
What is the data unit used in TCP?
Segment
What is the data unit used in TCP?
Segment-
Which of the following is the pipelining protocol:
Selective Repeat
Which of the following is the pipelining protocol:
Selective Repeat-
Switch has a characteristic of
Self-learning
Switch has a characteristic of
Self-learning-
________ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
Semantics
_______ are used to number the packets of a real-time transmission.
Sequence numbers
One of the most importance purposes of computer networks is to (select one BEST answer)
Share the common resource
One of the most importance purposes of computer networks is to (select one BEST answer)
Share the common resource-
SMTP stands for
Simple Mail Transfer Protocol
If ASCII character H is sent and the character I is received, what type of error is this?
Single-bit
Which of the following is hybrid of client-server and P2P?
Skype
Which of the following is hybrid of client-server and P2P?
Skype-
To accomplish flow control, TCP uses a ___________ window protocol.
Sliding-
In the ________ algorithm of the TCP congestion control, the size of the congestion window increases exponentially until timeout
Slow start
The higher the _____ of the router, the lower the ______
Speed....processing delay
The lower the _____ of the router, the higher the ______
Speed....processing delay
The higher the _____ of the router, the lower the ______
Speed....processing delay-
The lower the _____ of the router, the higher the ______
Speed....processing delay-
The most popular Ethernet network topology today is
Star
The most popular Ethernet network topology today is
Star-
Although HTTP is____, if the webserver wants to identify the users, ____is used
Stateless...Cookies
Although HTTP is____, if the webserver wants to identify the users, ____is used
Stateless...Cookies-
A_____document is created by a Web server whenever a browser requests the
Static-
NAT table in router
Store pairs of the host's IP address and the port number
NAT table in router
Store pairs of the host's IP address and the port number-
TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes.
Stream; stream
___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.
Streaming live
________ audio/video refers to on-demand requests for compressed audio/video files.
Streaming stored
_____audio/video refers to on-demand requests for compressed audio/video files.
Streaming stored
audio/video refers to on-demand requests for compressed audio/video files.
Streaming stored-
What is the difference between the switch and the bridge?
Switch can handle multiple data flow while bridge can handle single one
What is the difference between the switch and the bridge?
Switch can handle multiple data flow while bridge can handle single one-
_________ cryptography is often used for long messages.
Symmetric-key
Which one is best correct about symmetric-key cryptography and asymmetric-key cryptography?
Symmetric-key cryptography has the same key for both sender and receiver while asymmetric-key cryptography not
Which one is best correct about symmetric-key cryptography and asymmetric-key cryptography?
Symmetric-key cryptography has the same key for both sender and receiver while asymmetric-key cryptography not-
Manchester encoding is to
Synchronize between the sender and the receiver
Manchester encoding is to
Synchronize between the sender and the receiver-
SONET is an acronym for _______ Network.
Synchronous Optical
_______ refers to the structure or format of the data, meaning the order in which they are presented..
Syntax
FTP uses the services of ________.
TCP
HTTP uses the services of _________ on well-known port 80.
TCP
HTTP, FTP, SMTP and POP3 run on top of...
TCP
_____ provides reliable, in-order transfer of bytes between client and server
TCP
_________ is not suitable for interactive multimedia traffic because it retransmits packets in case of errors.
TCP
__________ provides full transport layer services to applications.
TCP
Those followings: a) Slow start; b) Congestion avoidance c) Fast retransmit; d) Fast recovery, are mechanisms of____________
TCP -
c) Fast retransmit; d) Fast recovery, are mechanisms of____________
TCP congestion control-
Which one is correct about TCP and UDP?
TCP is reliable transmission and it has congestion control and flow control while UDP is not
BGP messages are encapsulated in _______.
TCP segments
The different between TCP and UDP is
TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections
The different between TCP and UDP is
TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections-
FTP uses ____ connection to the server with port numbers ____.
TCP ¡. 20 and 21
HTTP uses the services of _________ on well-known port 80.
TCP-
HTTP, FTP, SMTP and POP3 run on top of...
TCP-
Electronic mail uses ____ while streaming multimedia typically uses___________________
TCP........UDP
Electronic mail uses ____ while streaming multimedia typically uses___________________
TCP........UDP-
_______ is the protocol suite for the current Internet.
TCP/IP
Which of the following is true of the IP address 231.1.2.3?
The class is D.
In ________, if timeout occurs while the current congestion window size is 64, the congestion window will reduce to 1
The congestion avoidance phase of TCP congestion control
In ________, if timeout occurs while the current congestion window size is 64, the congestion window will reduce to 1
The congestion avoidance phase of TCP congestion control-
In the congestion avoidance phase of TCP congestion control, if ____ occurs while the current congestion window size is 32, the congestion window will____
Timeout......reduce to 1
In the congestion avoidance phase of TCP congestion control, if ____ occurs while the current congestion window size is 32, the congestion window will____
Timeout......reduce to 1-
_______ refers to two characteristics: when data should be sent and how fast it can be sent.
Timing
Which statement is correct about tracert program?
To determine a router on the path, the program sends three packets with the same TTL
Which statement is correct about tracert program?
To determine a router on the path, the program sends three packets with the same TTL-
What is the purpose of the IEEE 802 commitlee?
To develop LAN standards
What is the purpose of the IEEE 802 commitlee
To develop LAN standards-
What is tracert (in Windows machine) or traceroute (in Linux machine) program for?
To find the route path between the sender and receiver and to measure transit times of packets along the path
What is tracert or traceroute program for?
To find the route path between the sender and receiver and to measure transit times of packets along the path
What is tracert (in Windows machine) or traceroute (in Linux machine) program for?
To find the route path between the sender and receiver and to measure transit times of packets along the path-
What is tracert or traceroute program for?
To find the route path between the sender and receiver and to measure transit times of packets along the path-
One important role of the Transport Layer is to
To multiplex and de-multiplex messages
One important role of the Transport Layer is to
To multiplex and de-multiplex messages-
In DNS, TLD is short for
Top-Level Domain
In DNS, TLD is short for
Top-Level Domain-
____ are responsible for domains such as com, org, gov, and all of the country domains such as uk, fr, ca, and jp
Top-level domain servers
____ are responsible for domains such as com, org, gov, and all of the country domains such as uk, fr, ca, and jp
Top-level domain servers-
In TCP, what can happen if timeout is much larger than the round-trip time?
When a segment is lost, TCP would not quickly retransmit the segment, resulting in long data transfer delays into the application-
In TCP, what can happen if timeout is much larger than the round-trip time?
When a segment is lost, TCP would not quickly retransmit the segment, resulting in long data transfer delays into the application.
Regarding TCP, what can happen if timeout is much larger than the round-trip time?
When a segment is lost, TCP would not quickly retransmit the segment, resulting in long data transfer delays into the application.
Regarding TCP, what can happen if timeout is much larger than the round-trip time?
When a segment is lost, TCP would not quickly retransmit the segment, resulting in long data transfer delays into the application.-
In _______ delivery, packets of a message are logically connected to one another.
a connection-oriented
In _______ delivery, a packet is not connected to any other packet.
a connectionless
To prevent unnecessary traffic, IGMP uses ______________ strategy.
a delayed response
In _______ delivery, both the deliverer of the IP packet and the destination are on the same network.
a direct
IGMP is _______ protocol.
a group management
At the CRC checker, __________ if the data unit is damaged.
a nonzero remainder
At the CRC checker, __________ if the data unit is damaged.
a nonzero remainder-
In TFTP, A DATA block is sent in response to a _______ message.
a or b
On a network that uses NAT, the router can use _______ global address(es).
a pool of
When a mobile host wants to register with its foreign agent, it sends _______ message.
a registration request
An HTTP request message always contains _______.
a request line and a header
An HTTP request message always contains _______.
a request line and a header-
A response message always contains _______.
a status line and a header
When the IP layer of a receiving host receives a datagram, _______.
a transport layer protocol takes over
Ethernet is
a type of lan-
In IPv6, _______ address defines a single computer.
a unicast
The association identifier in SCTP is __________________ .
a unique verification tag
In classless addressing, __________ is assigned to a organization.
a variable-length block
In classless addressing, __________ is assigned to an organization.
a variable-length block
In classless addressing, __________ is assigned to an organization.
a variable-length block-
In BOOTP, the client uses ________ port and the server uses _________port.
a well-known; a well-known
TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port.
a well-known; an ephemeral
For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.
active
The main problem that must be solved in providing mobile communication using the IP protocol is ____________.
addressing
If a router acts as an agent, it advertises its presence in a network by appending an agent _______ message to an ICMP router advertisement.
advertisement
In the _______ phase, a mobile host must learn the address of its foreign agent.
agent discovery
In the _______ phase, a mobile host must learn the address of its home agent.
agent discovery
The first phase in mobile communication is called _________.
agent discovery
Which of the following services is not provided by a UA?
all are
What does the URL need to access a document
all are correct-
Distance vector routing algorithm requires
all nodes to know link costs to their neighbours
In the OSI model, which of the following is an application layer service?
all of the above
SCTP strategies for congestion control include _______.
all of the above
An ICMP message has _____ header and a variable-size data section.
an 8-byte
A TCP segment is encapsulated in __________.
an IP datagram
UDP packets are encapsulated in ___________ .
an IP datagram
To distinguish between different streams, SCTP uses ___________.
an SI
TCP uses _________________ to check the safe and sound arrival of dat
an acknowledgment mechanism
TCP uses _________________ to check the safe and sound arrival of dat
an acknowledgment mechanism-
An applet is _______ document application program.
an active
In IPv6, ____ address defines a group of computers with addresses that have the same prefix.
an anycast
The RSA algorithm uses _______ cryptography method.
an asymmetric-key
To determine whether or not a node is reachable, _______ message can be sent.
an echo-request
The root of the DNS tree is _______.
an empty string
In _______ delivery, the deliverer of the IP packet and the destination are on different networks.
an indirect
On a network that uses NAT, _______ initiates the communication.
an internal host
In the DNS, the names are defined in ___________ structure
an inverted-tree
In the DNS, the names are defined in ___________ structure.
an inverted-tree
In the DNS, the names are defined in ___________ structure
an inverted-tree-
A proxy firewall filters at the __________ layer.
application
In the sending computer, UDP receives a data unit from the _______ layer.
application
The job of gathering data at the source host from different.....,enveloping the data with header information to create ....is called multiplexing
application processes.... segments
The job of gathering data at the source host from different.....,enveloping the data with header information to create ....is called multiplexing
application processes.... segments-
Options in SCTP ____________________________.
are handled by defining new chunk types
During an FTP session the data connection is opened _______.
as many times as necessary
A connection in SCTP is called an ____________.
association
In SCTP, TSN is a cumulative number identifying the _______; SI defines the _______; SSN defines the ________.
association; stream; chunks in a stream
In __________ cryptography, everyone has access to everyoneís public key.
asymmetric-key
What type of DNS Server has the IP addresses of all names in the Autonomous?
authoritative
What type of DNS Server has the IP addresses of all names in the Autonomous?
authoritative-
For purposes of routing, the Internet is divided into ___________.
autonomous systems
In SCTP, duplicate messages are _______.
b and c
What is needed to determine the number of the last byte of a fragment?
b and c
In IPv6, options are inserted between the _________ and the ___________ dat
base header; upper-layer data
In the _______ encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits.
base64
In the _______ encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits.
base64-
In fixed-length subnetting, the number of subnets must _______.
be a power of 2
In an SCTP packet, control chunks come ___________ data chunks.
before
In computer networking, hosts are sometimes divided into two categories:
clients and servers
In computer networking, hosts are sometimes divided into two categories
clients and servers-
When the mobile host acts as a foreign agent, the care-of address is called a _______ care-of address.
co-located
what are the communication links
coaxial cable, copper wire, fiber optic, an radio spectrum-
There are two types of user agents: _________ and ___________.
command-driven and GUI-based
In the __________ algorithm the size of the congestion window increases additively until congestion is detected.
congestion avoidance
In the congestion detection algorithm, if detection is by three ACKs, a new _______ phase starts.
congestion avoidance
In the congestion avoidance phase of TCP congestion control, if the timeout occurs while the current______ size is 64, the ____size will reduce to 1
congestion window.... congestion window
In the congestion avoidance phase of TCP congestion control, if the timeout occurs while the current______ size is 64, the ____size will reduce to 1
congestion window.... congestion window-
What is the first step in establishing a virtual connection on an ATM network?
connecting to an ATMARP server
The value of the window scale factor can be determined during __________.
connection establishment
those five primitivesv(operation): listen, connect, receive, send and disconnect are for implementing
connection-oriented services-
The Internet provides two types of services to its applications:
connectionless service and connection-oriented service.
The Internet provides two types of services to its applications:
connectionless service and connection-oriented service.-
UDP is called a ________________transport protocol.
connectionless, unreliable
The MIME _______ header uses text to describe the type of data in the body of the message.
content-description
Urgent data requires the urgent pointer field as well as the URG bit in the _______ field.
control
In SCTP, the acknowledgment number and window size are part of each ________.
control chunk
The control information in SCTP is included in the ________.
control chunks
in the file distribution of the client-server model, the server has to send
copies..large-
The value of the ________ subfield in an option controls the presence of the option in fragmentation.
copy
Both private and hybrid networks have a major drawback: _________.
cost
The ____________ domain section uses two-character country abbreviations.
country
The acknowledgment number in TCP segment is ________.
cumulative
The acknowledgment number is ________.
cumulative
According to the PPP transition state datagram, exchange of user control and data packets occurs in the...state
d. Establishing-
K x 512 bit times befor sesing
dai nhat
is the individual chracteristic of switch
dai nhat
CSMA/CD stands for
dai nhi
An SCTP sequence number (TSN) is located in the _______.
data chunk header
The third phase of JPEG is ___________.
data compression
In FTP, which category of commands sets the attributes (file type, data structure, and transmission modes) of a file to be transferred?
data formatting commands
The ______ layer is responsible for moving frames from one hop (node) to the next.
data link
In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.
data structures
The third phase in mobile communication is called _________.
data transfer
MOSPF is a _______ protocol.
data-driven
NVT uses two sets of characters, one for _____and one for __________.
data; control
In OSPF, the ________ message does not contain complete database information; it only gives an outline, the title of each line in the database.
database description
what is the data unit used in Internet Protocol
datagram
There are two broad classes of packet-switched networks are:
datagram network and virtual-circuit network
Packets in the IP layer are called _________ .
datagrams
Lost acknowledgments may create a _______ if they are not handled properly.
deadlock
In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table.
default
In the _______ mode, the echoing is done by the client.
default
Jitter is introduced in real-time data by the _______________.
delay between packets
Jitter is introduced in real-time data by the _______________.
delay between packets-
UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.
demultiplexing
The SYN flooding attack belongs to a group of security attacks known as a _____ attack.
denial of service
PIM-DM is used in a _______ multicast environment, such as a LAN.
dense
In SCTP, control information and data information are carried in _______ chunks.
different chunks
In classful addressing, when an indirect delivery is made, the deliverer and receiver have _______.
different netids
The IP header field formerly known as the service type field is now called the _______ field.
differentiated services
In ________, each node maintains a vector (table) of minimum distances to every node.
distance vector
The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing.
distance vector
in _______ routing, the least cost route between any two nodes is the route with the minimum distance.
distance vector
As leamed in class, computer networks a classified base on
distance, switching-
The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server.
distributed
In IGMP, the general query message ___________________ group.
does not define a particular
A _________ is a subtree of the domain name space.
domain
To have a hierarchical name space, a ______________ was designed.
domain name space
A full domain name is a sequence of labels separated by ________.
dots
A traditional TV network transmits signals _______.
downstream
A proposed standard is elevated to ________ standard status after at least two successful tries.
draft
A _______ document is created by a Web server whenever a browser requests the document.
dynamic
A _______ routing table is updated periodically using one of the adaptive routing protocols.
dynamic
A _______ routing table is updated periodically using one of the dynamic routing protocols.
dynamic
The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.
dynamic
routing table is updated periodically using one of the adaptive routing protocol
dynamic
A _______ document is created by a Web server whenever a browser requests the document.
dynamic-
In the domain name chal.atc.fhdedu, _______ is the least specific label.
edu
DNS can use the services of ________ using the well-known port 53.
either a or b
Tunneling is a technique in which the IP datagram is first _______ and then _______.
encrypted; encapsulated in another datagram
In the asymmetric-key method of cryptography, which key is publicly known?
encryption key only
Flow control _____.
ensures the sender does not too much data that may overwhelm the receiver+ has two techniques: Stop and Wait and Sliding window-
In ___________, the entity identity is verified once for the entire duration of system access.
entity authentication
The ________ usually contains the sender address, the receiver address, and other information
envelope
The ________ usually contains the sender address, the receiver address, and other information.
envelope
The ________ usually contains the sender address, the receiver address, and other information
envelope-
The _______ field in the SNMP PDU is an offset that points to the variable in error.
error index
The _______ field in the SNMP PDU reports an error in a response message.
error status
To make addresses more readable, IPv6 specifies ____________notation.
hexadecimal colon
In a _________name space, each name is made of several parts.
hierarchical
In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.
his or her own private key
The registration reply is sent by the _______ agent to the foreign agent.
home
The _________ acts on behalf of the mobile host when a remote host sends a packet to the mobile host.
home agent
The ___________ is usually a router attached to the home network of the mobile host.
home agent
A mobile host normally uses two addresses. The host has its original address, called the _______ address and a temporary address, called the _________address.
home; care-of
The _______ field in the base header restricts the lifetime of a datagram.
hop limit
In a URL, the ______ is the computer on which the information is located.
host
A _______ can learn about network _______ by sending out a router-solicitation packet.
host, routers
In _______ forwarding, the full IP address of a destination is given in the routing table.
host-specific
IP is responsible for _______ communication while TCP is responsible for _______ communication.
host-to-host; process-to-process
Using the limited broadcast address, a _______ sends a packet to _______ on the network.
host; all other hosts
A _______ network allows an organization to have its own private internet and, at the same time, access the global Internet.
hybrid
A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication.
hybrid
The total length field defines the total length of the datagram _________.
including the header
When the DHCP client first starts, it is in the _______ state.
initializing
The _______ module receives an IGMP report or query.
input
The ARP component that sends an ARP reply to the data link layer is the _______.
input module
Routing between autonomous systems is referred to as ____________.
interdomain routing
based on distance, two most important types of computer networks are
internet and local area networks-
Routing inside an autonomous system is referred to as _______________.
intradomain routing
An _______ is a private network with no external access that uses the TCP/IP protocol suite.
intranet
A pointer query involves the _______ domain.
inverse
The _________ domain is used to map an address to a name.
inverse
the ability to inject packets into the internet with a false source ip address
ip spoofing-
The IP header size _______.
is 20 to 60 bytes long
In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.
iterative
In __________ resolution, the resolver expects the server to supply the final answer.
iterative-
In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.
its immediate neighbors
To prevent _________, we can timestamp the packets and separate the arrival time from the playback time.
jitter
The _______ timer prevents a long idle connection between two TCPs.
keepalive
The routers running the BGP protocols exchange _______ messages regularly to tell each other that they are alive.
keepalive
Each node in the tree has a _______, which is a string with a maximum of ___ characters.
label; 63
When we use IP over ATM, only the ________ cell carries the 8-byte trailer added to the IP datagram.
last
When we use IP over ATM, padding can be added only to the _____ or the _______.
last cell; last two cells
The acknowledgment in SCTP defines the cumulative TSN, the TSN of the ____________ .
last data chunk received in order
The number of states in the state transition diagram of SCTP is __________ the number of states in the state transition diagram of TCP.
less than
The _________ ordering enables a manager to access a set of variables one after another by defining the first variable.
lexicographic
In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client.
line
A _______ address is used if a LAN uses the Internet protocols but is not connected to the Internet for security reasons.
link local
The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is based on _______ routing.
link state
The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing.
link state
The _________ routing uses the Dijkstra algorithm to build a routing table.
link state
In OSPF, a _________ message is sent by a router that needs information about a specific route or routes.
link state request
When a user logs into a local time-sharing system, it is called ________ login.
local
In the Internet, the email address consists of two parts: a _______ and a _______.
local part; domain name
IGMP operates __________.
locally
A _______ address is an internetwork address with universal jurisdiction.
logical
When a host on network A sends a message to a host on network B, which address does the router look at?
logical
The principle of ________ states that the routing table is sorted from the longest mask to the shortest mask.
longest mask matching
applications typically uses
loss-tolerant..udp-
In a _______ attack, an intruder comes between two communicating parties, intercepting and replying to their messages.
man-in-the-middle
The inclusion of the checksum in the TCP segment is ________.
mandatory
A _________ address comprises 80 bits of zero, followed by 16 bits of one, followed by the 32-bit IPv4 address.
mapped
The inverse request and inverse reply can also be used to build the server _______ table.
mapping
In classless addressing, the prefix length defines the _____________.
mask
In classless addressing, the prefix length defines the _____________.
mask-
Which option defines the maximum number of bytes in a TCP segment?
maximum segment size
In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server.
minimize delay
In TCP, the size of the window is the ________ of rwnd and cwnd.
minimum
A _______ adds signals from different sources to create a single signal.
mixer
IPv6 allows _________ security provisions than IPv4.
more
A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends _______ minutes watching the performance.
more than 10
A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication.
multicast
IGMP helps a ________ router create and update a list of loyal members related to each router interface.
multicast
In a real-time video conference, data from the server is _______ to the client sites.
multicast
The least significant 23 bits in a 48-bit Ethernet address identify a ________.
multicast group
In _______, the router may forward the received packet through several of its interfaces.
multicasting
Real-time traffic needs the support of ____________.
multicasting
Emulation of ________ through ___________ is not efficient and may create long delays.
multicasting; multiple unicasting
The association identifier in SCTP cannot be a combination of logical and port addresses because of ________________.
multihoming service
SCTP association allows _____________ for each end.
multiple IP addresses
UDP uses ________ to handle outgoing user datagrams from multiple processes on one host.
multiplexing
the job of gathering data at the source host from different
multiplexing-
SCTP allows __________ service in each association.
multistream
The number of addresses assigned to an organization in classless addressing _______.
must be a power of 2
The number of addresses assigned to an organization in classless addressing _______.
must be a power of 2-
The first address assigned to an organization in classless addressing _______.
must be evenly divisible by the number of addresses
The first address assigned to an organization in classless addressing _______.
must be evenly divisible by the number of addresses-
SMI emphasizes three attributes to handle an object: _____, ________, and _________.
name; data type; encoding method
The ARP function in version 4 is part of _______ in version 6.
neighbor solicitation and advertisement
To request the physical address of a host whose IP address is known, a _______ message is sent.
neighbor-solicitation
In classful addressing, when a direct delivery is made, both the deliverer and receiver have the same _______.
netid
ICMP is a _________ layer protocol.
network
IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.
network
Routers operate in the _______ layers.
network
The ______ layer adds a header to the packet coming from the upper layer that includes the logical addresses of the sender and receiver.
network
The routing processor of a router performs the ________ layer functions of the router.
network
In OSPF, a ________ defines the links of a network.
network link
In _______ forwarding, the destination address is a network address in the routing table.
network-specific
A packet-filter firewall filters at the ________ or ___________ layer.
network; transport
Control chunks in SCTP ___________________.
never use a TSN, IS, or SSN number
The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.
next
in _______ forwarding, the routing table holds the address of just the next hop instead of complete route information.
next-hop
An ACK segment, if carrying no data, consumes ______ sequence number(s).
no
In TCP, ________ retransmission timer is set for an ACK segment.
no
TCP delivers _______ out-of-order segments to the process.
no
In SCTP, ___________ can be carried in a packet that carries an INIT chunk.
no other chunk
ACK segments consume _______ sequence number(s) and _______ acknowledged.
no; are not
A _______ is a large number used only once that helps distinguish a fresh authentication request from a repeated one.
nonce
Which of the following is true about ICMP messages?
none is true
A SYN + ACK segment cannot carry data; it consumes _____ sequence numbers.
none of the above
A ___________ address is an address of 96 bits of zero followed by 32 bits of IPv4 address.
none of the above
A best-effort delivery service such as IP includes _______.
none of the above
An MTU field is found on the _______ error message to inform the sender about packet size.
none of the above
An RFC, during its lifetime, falls into one of _______ maturity levels.
none of the above
An organization has been granted a class C address. If the organization has 4 subnets, how many addresses are available in each subnet (including special addresses)?
none of the above
Connection establishment in TCP is called __________ handshaking.
none of the above
IGMP is a companion to the ______ protocol.
none of the above
IPSec defines two protocols: _________ and __________.
none of the above
In BGP, a _______ message is sent by a router whenever an error condition is detected or a router wants to close the connection.
none of the above
In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.
none of the above
In OSPF, when the link between two routers is broken, the administration may create a _________ link between them using a longer path that probably goes through several routers.
none of the above
In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon.
none of the above
In a block, the mask is 255.255.255.224; what is the prefix length?
none of the above
OSPF uses the _______ message to create neighborhood relationships and to test the reachability of neighbors.
none of the above
RPF eliminates the ________ in the flooding process.
none of the above
RPF guarantees that each network receives only ____ of the multicast packet.
none of the above
The FIN segment consumes ____ sequence numbers if it does not carry dat
none of the above
The Internetworking Protocol (IP) is a ________ protocol.
none of the above
The first level in the generic domains section allows ______ possible labels.
none of the above
The loopback address is used to send a packet from the _______ to _______.
none of the above
The process of transferring a mail message occurs in ________ phases.
none of the above
Which address could be the beginning address of a block of 16 classless addresses?
none of the above
Which of the following does UDP guarantee?
none of the above
Which version 4 protocols are still viable and known by their same names in version 6?
none of the above
_______ is the standard mechanism provided by TCP/IP for copying a file from one host to another.
none of the above
_______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.
none of the above
__________means that the sender and the receiver expect confidentiality.
none of the above
Which address could be the beginning address of a block of 16 classless addresses
none of the above-
about manchester code
none of them
In a ___________ connection, one TCP connection is made for each request/response.
nonpersistent
A DATA chunk arrives with its B/E bits equal to 11. It is ___________.
not fragmented.
In SCTP, the number of padding bytes are _________ in the value of the length field.
not included
The value of the ________ subfield defines the types of an option.
number
A SYN segment cannot carry data; it consumes _____ sequence number(s).
one
In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of _____ byte(s) after the window is shut down.
one
Only ______ end of option option can be used in a datagram.
one
The FIN + ACK segment consumes _____ sequence number(s) if it does not carry dat
one
RPB guarantees that each destination receives _________ of the packet.
one copy
the difference between flow control and congestion control
one is to avoid overflowing..one is to avoid congestion-
A multicast message is sent from _______ to _______.
one source; multiple destinations
AAL5 accepts an IP packet of no more than 65,536 bytes and adds _________ in addition to padding.
one trailer
In SCTP, acknowledgment numbers are used to acknowledge _____________.
only data chunks
In TCP, there can be ______ RTT measurement(s) in progress at any time.
only one
In the group-shared tree approach, _________ involved in multicasting.
only the core router is
ICMP packets are the input to _______.
only the input module
To create a neighborhood relationship, a router running BGP sends an ________ message.
open
An HFC network uses _______ as the medium from the cable TV office to the fiber node.
optical fiber
To make control characters effective in special situations, TELNET uses ______ signaling.
out-of-band
because ftp uses a separate control connection different
out-of-band-
The _______ module sends out an IGMP report.
output
The ARP component that sends an IP packet to a queue is the _______.
output module
which error-reporting message is found in version 6 but not in version 4?
packet too big
Today's Internet is a _______________network.
packet-switched
Today's Internet is a _______________network.
packet-switched-
Errors in the header or option fields of an IP datagram require a _______ error message.
parameter-problem
In error reporting, a destination can send a _______ message if an option is not recognized.
parameter-problem
An area is _______.
part of an AS
In a URL, the _______ is the full name of the file where the information is located.
path
In ________ routing, we assume that there is one node (or more) in each autonomous system that acts on behalf of the entire autonomous system.
path vector
one important role of the network layer is to
perform the network routing-
In RIP, the ________ timer controls the advertising of regular update messages.
periodic
The home address is ______.
permanent
When a _______ exists between two routers on an ATM network, an ATMARP server is not needed.
permanent virtual circuit
A special segment called a probe is sent by a sending TCP when the _______ timer goes off.
persistence
The _______ timer is needed to handle the zero window-size advertisement.
persistence
HTTP version 1.1 specifies a _________connection by default.
persistent
In a ___________connection, the server leaves the connection open for more requests after sending a response.
persistent
In a ___________connection, the server leaves the connection open for more requests after sending a response.
persistent-
A ________ is a local address. Its jurisdiction is over a local network.
physical
A bridge has access to the _______ address of a station on the same network.
physical
Repeaters function in the _______ layer.
physical
The ________ address, also known as the link address, is the address of a node as defined by its LAN or WAN.
physical
Bridges function in the _______ layers.
physical and data link
PPP is a _______ layer protocol.
physical and data link
The input and output ports of a router perform the ________ layer functions of the router.
physical and data link
Frame Relay operates in the _______.
physical and data link layers
Examples of _______include copper wire, coaxial cable, optical fiber, and satellite radio.
physical transmission media
Examples of _______include copper wire, coaxial cable, optical fiber, and satellite radio.
physical transmission media-
There are two categories of__________: Guided medium and unguided medium
physical transmission medium
There are two categories of__________: Guided medium and unguided medium
physical transmission medium-
Routers function in the _______ layers.
physical, data link, and network
If a segment carries data along with an acknowledgment, this is called _______.
piggybacking
Before a message is encrypted, it is called _______.
plaintext
A ________buffer is required for real-time traffic.
playback
In OSPF, a ________ link connects two routers without any other host or router in between.
point-to-point
To deliver a message to the correct application program running on a host, the _______ address must be consulted.
port
UDP needs the _______ address to deliver the user datagram to the correct application process.
port
The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ .
port addresses
In FTP, which category of commands defines the port number for the data connection on the client site?
port defining commands
In ________ encoding, the differences between the samples are encoded instead of encoding all the sampled values.
predictive
In classless addressing, the ______ is another name for the common part of the address range.
prefix
In classless addressing, the ______ is another name for the common part of the address range.
prefix-
In the OSI model, encryption and decryption are functions of the ________ layer.
presentation
In the OSI model, encryption and decryption are functions of the ________ layer.
presentation-
A ________ server loads all information from the disk file.
primary
When a datagram needs to be discarded in a congested network, the decision is based on the _______ field in the base header.
priority
Digital signature does not provide _________.
privacy
Private networks, hybrid networks, and virtual private networks can provide _________ for organizations
privacy
A _______ network is totally isolated from the global Internet.
private
In the asymmetric-key method of cryptography, the receiver has possession of the _______.
private key
VPN is a network that is _______ but ________.
private; virtual
One of the responsibilities of the transport layer protocol is to create a ______ communication.
process-to-process
UDP does not add anything to the services of IP except for providing _______ communication.
process-to-process
Which of the following functions does UDP perform?
process-to-process communication
In the OSI model, what is the main function of the transport layer?
process-to-process message delivery
In the OSI model, what is the main function of the transport layer?
process-to-process message delivery-
The _______ module discards datagrams with a TTL value of zero.
processing
In a URL, the _______ is the client-server program used to retrieve the document.
protocol
A set of rules or guidelines that govern interactions among people, between people and machines, and among machines is called_____
protocols-
In IPv6, the___________ address is generally used by a normal host as a unicast address.
provider-based unicast
In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.
proxy
A _______ is an ARP that acts on behalf of a set of hosts.
proxy ARP
A technique called ______ is used to create a subnetting effect.
proxy ARP
In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.
proxy-
A _______ message tells an upstream router to stop sending multicast messages for a specific group through a specific router.
prune
The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server.
pseudoterminal driver
A VPN is physically ________ but virtually ________.
public; private
In cryptography, the encryption/decryption algorithms are ________; the keys are ________.
public; secret
The third stage in an email transfer needs a ________ protocol.
pull
SMTP is a __________protocol.
push
The second phase of JPEG is ___________.
quantization
A router sends a _______ message to the host to monitor group membership.
query
ICMP messages are divided into two broad categories:
query and error reporting messages
To prevent unnecessary traffic, IGMP designates one router as the __________ for each network.
query router
In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.
quoted-printable
In Kerberos, the ___________ provides services for the entity.
real server
Kerberos allows the global distribution of ASs and TGSs, with each system called a ________
realm
The _______ module takes fragments of a message and puts them back in order.
reassembly
The output of the _______ module is an IP packet destined for an upper-layer protocol.
reassembly
After the renewing state, a DHCP client can go to the __________ state.
rebinding
Clark's solution can solve the silly window syndrome created by the _________.
receiver
Delayed acknowledgment can solve the silly window syndrome created by the _________.
receiver
In __________ resolution, the resolver expects the server to supply the final answer.
recursive
In __________ resolution, the resolver expects the server to supply the final answer.
recursive-
A router can send a _______ message to a host to inform it of a more efficient path.
redirection
The use of hierarchy in routing tables can ________ the size of the routing tables.
reduce
The ports ranging from 1,024 to 49,151 are not assigned or controlled by ICANN. They are called ___________ ports.
registered
The second phase in mobile communication is called _________.
registration
If BOOTP client and server are on different networks, there is a need for an intermediary called a _______.
relay agent
TCP is a(n) _______ transport protocol.
reliable
Stream Control Transmission Protocol (SCTP) is a new _____________protocol.
reliable, message-oriented
When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
remote
In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.
removed
After the bound state, a DHCP client can go to the __________ state.
renewing
In a _______ attack, a message captured by an intruder is illegally sent a second time.
replay
After the selecting state, a DHCP client can go to the ________state.
requesting
An RFC is labeled ________ if it must be implemented by all Internet systems.
required
The flow-control mechanism in TFTP _______.
requires an ACK for every DATA message
the dns servers that together implement the dns distributed database
resource record..ip address-
Karn's algorithm is used in calculations by the _______ timer.
retransmission
a _______ is a server whose zone consists of the whole tree.
root server
On a network that uses NAT, the _______ has a translation table.
router
The _______ packet contains information about a router.
router advertisement
In OSPF, a ________ defines the links of a true router.
router link
If a host needs information about routers on the network, it sends a _______ message.
router-solicitation
Using the direct broadcast address, a _______ sends a packet to _______ on the network.
router; all other hosts
An IGMP query is sent from a _______ to a _______.
router; host or router
A ________ server loads all information from the primary server
secondary
A ________ server loads all information from the primary server.
secondary
A ________ server loads all information from the primary server
secondary-
TCP groups a number of bytes together into a packet called a ___________.
segment
TCP has ____________; SCTP has ____________.
segments; packets
After sending the DHCPDISCOVER message, the client goes to the _______ state.
selecting
If a member of a group wishes to terminate membership, it can _______ in response to a group membership query.
send a group membership termination
Nagle's algorithm can solve the silly window syndrome created by the _________.
sender
In Sliding Window Flow Control with window size of W, the source______________
sends up to W frames without ACK
In Sliding Window Flow Control with window size of W, the source______________
sends up to W frames without ACK-
SMI defines two structured data types: ________ and _________.
sequence; a sequence of
An agent is a host or computer that runs the SNMP _______ process.
server
Dynamic documents are sometimes referred to as _________ dynamic documents.
server-site
The Response PDU is sent from the ______ to the ______ in response to GetRequest or GetNextRequest.
server; client
The Trap PDU is sent from the ______ to the _______ to report an event.
server; client
A cookie is made by the ________ and eaten by the _________.
server; server
In the OSI model, when data is transmitted from device A to device B, the header from Aís layer 5 is read by Bís _______ layer.
session
The OSI model consists of _______ layers.
seven
an SCTP packet can carry __________.
several data chunks
one of the most importance purposes of computer networks is to
share common resource-
In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router.
shortest
In multicast routing, each involved router needs to construct a ________ path tree for each group.
shortest
In unicast routing, each router in the domain has a table that defines a ______ path tree to possible destinations.
shortest
In TCP, the window should not be _________.
shrunk
A serious problem can arise in the sliding window operation when either the sending application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______.
silly window syndrome
The _______ data types are atomic data types.
simple
SMI has two broad categories of data type: _______ and _______.
simple; structured
If ASCII character H is sent and the character I is received, what type of error is this (H: 01001000 and I: 01001001)?
single -bit
If ASCII character H is sent and the character I is received, what type of error is this (H: 01001000 and I: 01001001)?
single -bit-
The ______ address is used if a site with several networks uses the Internet protocols but is not connected to the Internet for security reasons.
site local
To accomplish flow control, TCP uses a ___________ window protocol.
sliding
To accomplish flow control, TCP uses a ___________ window protocol.
sliding-
In the ________ algorithm of the TCP congestion control, the size of the CONGWIN (congestion window) increases exponentially.
slow start
In the ________ algorithm the size of the congestion window increases exponentially until it reaches a threshold.
slow start
In the ________ stage of the TCP congestion control, the size of the congestion window increases exponentially until timeout occurs.
slow start
In the congestion detection algorithm, if detection is by a time-out, a new _______ phase starts.
slow start
In the ________ algorithm of the TCP congestion control, the size of the CONGWIN (congestion window) increases exponentially.
slow start-
In the ________ algorithm the size of the congestion window increases exponentially until it reaches a threshold.
slow start-
In the ________ stage of the TCP congestion control, the size of the congestion window increases exponentially until timeout occurs.
slow start-
The combination of an IP address and a port number is called a _________.
socket
The combination of an IP address and a port number is called a ____________.
socket address
The combination of an IP address and a port number is called a _________.
socket-
A mobile host can send an agent _______ message if it has not received any agent advertisements.
solicitation
Which error-reporting message from version 4 has been eliminated in version 6?
source quench
In the _______ extension header, the destination address changes from router to router.
source routing
DVMRP is a ________routing protocol, based on RIP.
source-based
In the _______ tree approach, each router needs to have one shortest path tree for each group.
source-based
Multicast link state routing uses the _______ tree approach.
source-based
One method to alert a source host of congestion is the _______ message.
source-quench
PIM-SM is used in a _______multicast environment such as a WAN.
sparse
The _______ is used by a router in response to a received leave report.
special query message
Why was the OSI model developed?
standards were needed to allow any two systems to communicate
Why was the OSI model developed?
standards were needed to allow any two systems to communicate-
A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.
static
A _______ routing table contains information entered manually.
static
BOOTP is a ________ configuration protocol.
static
In _______, a table associating a logical address with a physical address is updated manually.
static mapping
The IP addresses are designed to work with ________ hosts because part of the address defines the network to which the host is attached.
stationary
The original IP addressing was based on the assumption that a host is ________.
stationary
When a receiver must acknowledge every block of data before the next block is sent, the _____ type of flow control is being used
stop-and-wait
When a receiver must acknowledge every block of data before the next block is sent, the _____ type of flow control is being used
stop-and-wait-
In FTP, when we _______, it is copied from the client to the server.
store a file
TCP is a __________protocol.
stream-oriented,Connection-oriented
TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes.
stream; stream
TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes..
stream; stream
TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes.
stream; stream-
Which IP option is used if exactly four specific routers are to be visited by the datagram?
strict source route
In OSPF, a ________ link is a network is connected to only one router.
stub
In classless addressing, the _______ is the varying part (similar to the hostid).
suffix
In classless addressing, the _______ is the varying part (similar to the hostid).
suffix-
In OSPF, an area border router advertises a ____________ LS
summary link to network
The task of moving the packet from the input queue to the output queue in a router is done by _________.
switching fabrics
In _________ cryptography, the same key is used in both directions.
symmetric-key
In __________cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption).
symmetric-key
When there is more than one source, the _______ identifier defines the mixer.
synchronization source
To talk with a mail server (with name serverName), we can use command
telnet serverName 25
To talk with a mail server (with name serverName), we can use command
telnet serverName 25-
The care-of address is _______.
temporary
TELNET is an abbreviation for ____________.
terminal network
An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encapsulates the ICMP packet contains _______.
the ICMP header plus 8 bytes of datagram A
When the sender and the receiver of an email are on the same system, we need only ___________.
two UAs
When the sender and the receiver of an email are on different systems, we need only _____________.
two UAs and one pair of MTAs
When the sender is connected to the mail server via a LAN or a WAN, we need only ______________.
two UAs and two pairs of MTAs
When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________.
two UAs, two pairs of MTAs, and a pair of MAAs
If four hosts on a network belong to the same group, a total of _______ sent in response to a general query message.
two membership reports are
In IPv6, the ________ prefix defines the purpose of the address.
type
The _______ field of the IGMP message is 17 for a query message.
type
What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?
type
A one-to-one communication between one source and one destination is classified as a _______ communication.
unicast
An ARP reply is normally _______.
unicast
The RARP reply packets are normally_________ .
unicast
In ______, the router forwards the received packet through only one of its interfaces.
unicasting
In BGP, the _______ message is used by a router to withdraw destinations that have been advertised previously, or to announce a route to a new destination, or both.
update
If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.
user B
UDP packets are called __________ .
user datagrams
Because the sending and the receiving processes may not write or read data at the same speed, TCP ________.
uses buffers
An object id defines a _______. Add a zero suffix to define the _______.
variable; variable contents
In Stop and Wait Flow Control, source______________
waits for the acknowledgment (ACK) before sending next frame
In Stop and Wait Flow Control, source______________
waits for the acknowledgment (ACK) before sending next frame-
the ports ranging from 0 to 1,023 are assigned and controlled by ICANN. These are the ___________ ports.
well-known
A dynamic table is one _______.
which is updated automatically
following standards: IEEE 802.11b .. belong to
wireless lan-
using crc, the received message is error
with (non-zero) remainder
A static table is one _______.
with manual entries
What a server is responsible for or has authority over is called a _________.
zone
When the secondary downloads information from the primary, it is called ______ transfer.
zone
In the exponential backoff phase of CSMA/CD, after 3rd collision of a frame, the adapter then waits K x 512 bit times before sensing the channel again, where K is chosen at a random from
{0,1,2,3,4,5,6,7}
In the exponential backoff phase of CSMA/CD, after 3rd collision of a frame, the adapter then waits K x 512 bit times before sensing the channel again, where K is chosen at a random from
{0,1,2,3,4,5,6,7}-
What does the IP header's protocol field identify
| The transport layer protocol that generated the information in the data field-
The _______ protocol allows the administrator to assign a cost, called the metric, to each route.
OSPF
A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc.
Objects
A Web page consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc.
Objects-
In Datagram networks and in Virtual networks:
One has each packet to route independently; one has all packet to route in one path, respectively
In Datagram networks and in Virtual networks:
One has each packet to route independently; one has all packet to route in one path, respectively-
The difference between TCP and UDP is primarily
One is connection-oriented, one is connectionless
The difference between TCP and UDP is primarily
One is connection-oriented, one is connectionless-
The difference between flow control and congestion control is primarily
One is to avoid overflowing the receiver's buffer; one is to avoid congestion of the channel
Which of the following is an appropriate description concerning B2C?
Ordering books online
Which of the following is an appropriate description concerning B2C
Ordering books online-
Because FTP uses a separate control connection different from data connection, FTP is said to sent its control information_____
Out-of-band
Because FTP uses a separate control connection different from data connection, FTP is said to sent its control information_____
Out-of-band-
Skype is a
P2P application
Skype is a
P2P application-
Three popular mail access protocols are
POP3,IMAP and HTTP
Three popular mail access protocols are
POP3,IMAP and HTTP-
Currently two message access protocols are available: _______ and _________.
POP3; IMAP4
Currently two message access protocols are available:_____ and_____..
POP3; IMAP4
Currently two message access protocols are available:_____ and_____.
POP3; IMAP4-
A user needs to send the server some information. The request line method is _______.
POST
If a label is not terminated by a null string, it is called a __________.
PQDN
The inverse request and inverse reply messages can bind the physical address to an IP address in a(n) _______ situation.
PVC
When does packet loss happen?
Packet arriving to the full queue at the routers
When does packet loss happen?
Packet arriving to the full queue at the routers-
A program running in a network attached device that passively receives all packet passing by the device's network interface is
Packet sniffer-
A Virtual Circuit maintains
Path from source to destination and forwarding tables in routers along path-
__________ encoding is based on the science of psychoacoustics, which is the study of how people perceive sound.
Perceptual
rdt 1.1 assumes that the channel is
Perfectly reliable
rdt 1.1 assumes that the channel is
Perfectly reliable-
One important role of the Network Layer is to
Perform network routing, i.e., to find the most efficient transmission route between two computers
One important role of the Network Layer is to
Perform network routing, i.e., to find the most efficient transmission route between two computers-
In a ___________connection, the server leaves the connection open for more requests after sending a response.
Persistent-
Repeaters function in the...layer
Physical
Which layer repeaters function at?
Physical
Repeaters function in the...layer
Physical-
Which layer repeaters function at?
Physical-
ARP is
Plug-and-play
ARP is
Plug-and-play-
In datalink layer, there are two types of networks links:
Point-to-point link and broadcast link
In datalink layer, there are two types of networks links:
Point-to-point link and broadcast link-
POP3 is short for
Post Office Protocol-Version 3
POP3 is short for
Post Office Protocol-Version 3-
In the OSI model, encryption and decryption are functions of the_____layer.
Presentation
In the OSI model, encryption and decryption are functions of the ________ layer.
Presentation-
In the OSI model, encryption and decryption are functions of the_____layer.
Presentation-
One of the responsibilities of the transport layer protocol is to create a logical communication between:
Processes
One of the responsibilities of the transport layer protocol is to create a logical communication between:
Processes-
The transport layer protocol provides logical communication between ______, while the network layer protocol provides logical communication between _____.
Processes.....Hosts
The transport layer protocol provides logical communication between ______, while the network layer protocol provides logical communication between _____.
Processes.....Hosts-
The time delay for checking bit-level error in the packet that occurs at the router can be classified as the _____
Processing Delay
The time delay for checking bit-level error in the packet that occurs at the router can be classified as the _____
Processing Delay-
Total nodal delay is accumulated from the following delays:
Processing delay, queuing delay, transmission delay and propagation delay
Total nodal delay is accumulated from the following delays:
Processing delay, queuing delay, transmission delay and propagation delay-
The ____on the physical medium of the link is a little less than or equal to the speed of light
Propagation delay
The time required for a data bit to travel through the link from router A to router B is
Propagation delay
The ____on the physical medium of the link is a little less than or equal to the speed of light
Propagation delay-
Which one is INCORRECT about proxy?
Proxy helps to remove the bottleneck of access link
Which one is INCORRECT about proxy?
Proxy helps to remove the bottleneck of access link-
Two types of ALOHA are:
Pure ALOHA and slotted ALOHA
Two types of ALOHA are:
Pure ALOHA and slotted ALOHA-
1001 0101 and 1010 1010.
1011 1111-
For even parity scheme (single), if the information is 101110, then information after adding parity bit is
1011100
For even parity scheme (single), if the information is 101110, then information after adding parity bit is
1011100-
Assume the original message to be sent 101110, the generator is 1001. What is the transmitted message?
101110011
Assume the original message to be sent 101110, the generator is 1001. What is the transmitted message?
101110011-
An organization has been granted a class B address. If the organization has 64 subnets, how many addresses are available in each subnet (including special addresses)?
1024
_______ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium.
10BASE-T
Which one is the most-commonly-used cabling standard for Ethernet?
10Base-T
Which one is the most-commonly-used cabling standard for Ethernet?
10Base-T-
Assume the original message to be sent 11001, the generator is 1001. What is the transmitted message?
11001010
Assume the original message to be sent 11001, the generator is 1001. What is the transmitted message?
11001010-
What is the 32-bit binary equivalent of the IP address 254.1.8.252?
11111110.00000001.00001000.11111100
What is the 32-bit binary equivalent of the IP address 254.1.8.252?
11111110.00000001.00001000.11111100-
Which one is not in UDP segment header?
ACK number
Which one is not in UDP segment header?
ACK number-
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 55 bytes, sequence number 100, the source port 1028, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 155, source port: 80, destination port: 1028
Multiple access link in 802.11 wireless LAN is a
Broadcast link-
What does NAT stand for?
Network Address Translation
What does NAT stand for?
Network Address Translation-
Which layer does ICMP functions?
Network Layer
Which layer does ICMP functions?
Network Layer-
If the sender wants to disable an option, it sends a _______ command.
WONT
In TFTP, if a message is _______, it is resent.
a and b
In TFTP, one symptom of the sorcererís apprentice bug is that _______.
a and b
Which TFTP message contains a block number field?
a and b
Which is a manager duty?
a and b
Which of the following is a necessary part of the IPv6 datagram?
a and b
In FTP, when we _______, it is copied from the server to the client.
a and c
Which part of the mail created by the UA contains the sender and receiver names?
header
What is information used to route packet in network
. Destination Address fields in IP header-
Which agency developed standards for physical connection interfaces and electronic signaling speccifications
. EIA-
In classless addressing,_______is assigned to an organization
.A variable-length block-------------------------------------
What is the default mask for class B in CIDR notation?
/16
In a block, the mask is 255.255.192.0; what is the prefix length?
/18
An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length?
/24
What is the default mask for class C in CIDR notation?
/24
What is the default mask for class A in CIDR notation?
/8
For data, NVT uses US ASCII characters with the highest order bit set to ______.
0
For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field.
0
How many default gateway addresses does a computer need to function on a LAN (assume that not connect to other network)?
0
What is the result of ANDing 0 and 15?
0
In TFTP, connection termination is signaled by a DATA message with _______ bytes.
0 to 511
In sliding window flow control, if the size is 63, what the range sequence numbers?
0 to 63
In sliding window flow control, if the window size is 63. What the range sequence numbers?
0 to 63
In sliding window flow control, if the window size is 63. What the range sequence numbers?
0 to 63-
How many default gateway addresses does a computer need to function on a LAN (assume that not connect to other network)?
0-
A host can get its IP address from its server by using _______ as the source address and _______ as the destination address.
0.0.0.0; 255.255.255.255
There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 3Mbps, 2 Mbps, and 0.5 Mbps. What is the throughput between the client and the server?
0.5 Mbps
There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 3Mbps, 2 Mbps, and 0.5 Mbps. What is the throughput between the client and the server?
0.5 Mbps-
There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 1Mbps, 2 Mbps, and 0.7 Mbps. What is the throughput between the client and the server?
0.7 Mbps
There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 1Mbps, 2 Mbps, and 0.7 Mbps. What is the throughput between the client and the server?
0.7 Mbps-
Which one can be a MAC address?
00-D0-56-F2-B5-12
In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder
0000
What is the 32-bit binary equivalent of the IP address 1.255.8.252?
00000001.1111111.00001000.11111100
What is the 32-bit binary equivalent of the IP address 1.255.8.252?
00000001.1111111.00001000.11111100-
What is the one's compliment 8-bit checksum of the following 8-bit binary numbers:
1011 1111
In the congestion avoidance phase of TCP congestion control, if the timeout occurs at the current congestion window size 32, the congestion size will reduce to ___ and the threshold window size is set to _____
1.... 16
In the congestion avoidance phase of TCP congestion control, if the timeout occurs at the current congestion window size 32, the congestion size will reduce to ___ and the threshold window size is set to _____
1.... 16-
In the congestion avoidance phase of TCP congestion control, if the timeout occurs at the current congestion window size 80, the congestion size will reduce to ___ and the is set to _____
1.... 40
In the congestion avoidance phase of TCP congestion control, if the timeout occurs at the current congestion window size 80, the congestion size will reduce to ___ and the is set to _____
1.... 40-
All objects managed by SNMP are given an object identifier. The object identifier always starts with _______.
1.3.6.1.2.1
Which of the following could be a legitimate MIB object identifier?
1.3.6.1.2.1.1
Assume a webpage has only 10 different images, using non-persistent HTTP, a client needs ______ to the server to load.
10 different TCP connections
Assume a webpage has only 10 different images, using non-persistent HTTP, a client needs ______ to the server to load.
10 different TCP connections-
message to be sent 100001, the generator 1001. what is the tra
1000001001
Assume the original message to be sent 100001, the generator is 1001. What is the transmitted message?
100001101
Assume the original message to be sent 100001, the generator is 1001. What is the transmitted message?
100001101-
Assume that the time it takes for a small packet to travel from the client to the server and then back to the client is 100 ms, then the round-trip time is
100ms
Assume that the time it takes for a small packet to travel from the client to the server and then back to the client is 100 ms, then the round-trip time is
100ms-
Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address belongs to that block?
101.101.101.122
Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address belongs to that block?
101.101.101.122-
Suppose an ISP owns the block of addresses of the form 101.101.101.128/30, which address can be assigned to its customer?
101.101.101.129
Suppose an ISP owns the block of addresses of the form 101.101.101.128/30, which address can be assigned to its customer?
101.101.101.129-
suppoes an IPS owns the block of addresses of the form 101.101.101.128/29, which address
101.101.101.131
Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address does not belong to that block?
101.101.102.0
Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address does not belong to that block?
101.101.102.0-
Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address does not belong to that block?
101.101.111.0
Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address does not belong to that block?
101.101.111.0-
Assume the original message to be sent 101001, the generator is 1001. What is the transmitted message?
101001001
Assume the original message to be sent 101001, the generator is 1001. What is the transmitted message?
101001001-
For even parity scheme (single), if the information is 101010, then information after adding parity bit is
1010101
For even parity scheme (single), if the information is 101010, then information after adding parity bit is
1010101-
Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. In the acknowledgement of the first arriving segment, what is the acknowledgment number?
165
Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. In the acknowledgement of the first arriving segment, what is the acknowledgment number?
165-
Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 30 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. In the acknowledgement of the first arriving segment, what is the acknowledgment number?
175
Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 30 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. In the acknowledgement of the first arriving segment, what is the acknowledgment number?
175-
Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address?
18.240.0.0
Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address?
180.25.0.0
Assume that an image is about 1000 x 800 pixels with 3 bytes/pixel and it is uncompressed. How long does it take to transmit it over a 1 Mbps channel?
19.2 sec
Assume that an image is about 1000 x 800 pixels with 3 bytes/pixel and it is uncompressed. How long does it take to transmit it over a 1 Mbps channel?
19.2 sec-
If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed.
190
Suppose there are 5 routers between the source host and the destination host, 10ms is the processing delay at each router, 10ms is the propagation delay at each link, and 12ms is the transmission delay out of each router and the source, then the total delay is (ignore all other delays)
192ms
Suppose there are 5 routers between the source host and the destination host, 10ms is the processing delay at each router, 10ms is the propagation delay at each link, and 12ms is the transmission delay out of each router and the source, then the total delay is (ignore all other delays)
192ms-
Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 30 and 40 bytes of data, respectively. In the first segment, the sequence number is 165. In the acknowledgement of the first arriving segment, what is the acknowledgment number?
195
Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 30 and 40 bytes of data, respectively. In the first segment, the sequence number is 165. In the acknowledgement of the first arriving segment, what is the acknowledgment number?
195-
If the ACK value is 200, then byte _______ has been received successfully.
199
If the ACK value is 200, then byte _______ has been received successfully.
199-
In SCTP, the data field of the DATA chunk must carry at least _________ byte of data, which means the value of length field cannot be less than ___________.
1; 17
A subnet mask in class C has 25 1s. How many subnets does it define?
2
In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byte datagram is fragmented into _______ datagram(s)
2
In IP fragmentation with MTU (Maximum Transmission Unit) size of 1500 bytes , a 2000 byte datagram is fragmented into _______ datagram(s)
2
In IP fragmentation, a 2000 byte datagram is fragmented into _______ datagrams
2
The IP packet that carries an IGMP packet has a value of _______ in its protocol field.
2
There are 4 serial links between the client and the server, with the transmission rates being 3Mbps, 12Mbps, 2 Mbps, and 2 Mbps. What is the throughput between the client and the server?
2 Mbps
There are 4 serial links between the client and the server, with the transmission rates being 3Mbps, 12Mbps, 2 Mbps, and 2 Mbps. What is the throughput between the client and the server?
2 Mbps-
In IP fragmentation with MTU (Maximum Transmission Unit) size of 1500 bytes , a 2000 byte datagram is fragmented into _______ datagram(s)
2-
In IP fragmentation, a 2000 byte datagram is fragmented into _______ datagrams
2-
Which address could be the beginning address of a block of 256 classless addresses?
2.4.6.0
Which address could be the beginning address of a block of 256 classless addresses
2.4.6.0-
Which address could be the beginning address of a block of 32 classless addresses?
2.4.6.64
Which address could be the beginning address of a block of 32 classless addresses
2.4.6.64-
By default, FTP uses which ports
20 and 21
Which one is the returned code of the response from a web server when a client successful connects to the web server?
200
Which one is the returned code of the response from a web server when a client successful connects to the web server?
200-
Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address?
201.14.78.64
Which one is not a MAC address:
A1-000-6C-2D-15-0A
Which one is not a MAC address:
A1-000-6C-2D-15-0A-
A router connected to an ATM network uses the _______ layers.
AAL, ATM, and physical
The IP protocol uses the _______ sublayer.
AAL5
The only AAL used by the Internet is __________.
AAL5
Which ATM layer adds an 8-byte trailer to an IP packet?
AAL5
In TFTP, which type of message is always a set number of bytes?
ACK
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 55 bytes, sequence number 100, the source port 1028, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 155, source port: 80, destination port: 1028-
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 2105 bytes, sequence number 100, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 2205, source port: 1029, destination port: 1028
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 2105 bytes, sequence number 100, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 2205, source port: 1029, destination port: 1028-
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 45 bytes, sequence number 200, the source port 1038, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 245, source port: 80, destination port: 1038
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 45 bytes, sequence number 200, the source port 1038, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 245, source port: 80, destination port: 1038-
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 40 bytes, sequence number 410, the source port 1028, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 450, source port: 80, destination port: 1028
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 40 bytes, sequence number 410, the source port 1028, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 450, source port: 80, destination port: 1028-
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 5105 bytes, sequence number 600, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 5705, source port: 1029, destination port: 1028
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 5105 bytes, sequence number 600, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 5705, source port: 1029, destination port: 1028-
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 105 bytes, sequence number 600, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 705, source port: 1029, destination port: 1028
Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 105 bytes, sequence number 600, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A
ACK number: 705, source port: 1029, destination port: 1028-
Which method of networks access has the biggest difference between download and upstream speed?
ADSL
_______ has a higher transmission rate in the downstream direction than in the upstream direction.
ADSL
Which method of networks access has the biggest difference between download and upstream speed?
ADSL-
The _______ protocol provides message authentication and integrity, but not privacy.
AH
The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.
AH
In an ESS the _______ stations are part of a wired LAN.
AP
A table has following information: < IP address; MAC address; TTL>, where TTL is Time-To-Live. This table can be a (an)
APR table-
Which one is not belong to application layer?
ARP
_______ is a dynamic mapping protocol in which a physical address is found for a given logical address.
ARP
A sender usually has more than one IP datagram to send to the same destination. It is inefficient to use the ARP protocol for each datagram destined for the same host or router. The solution is the _________.
ARP table
Which one is not belong to application layer?
ARP-
This was the first network.
ARPANET
In Kerberos, the _______ is the KDC.
AS
INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used by SMI.
ASN.1
To define the data type, SMI uses fundamental _______ definitions and adds some new definitions.
ASN.1
The ________ layer provides routing, traffic management, switching, and multiplexing services.
ATM
Which ATM layer has a 53-byte cell as an end product?
ATM
A switch inside an ATM network uses the _______ layers.
ATM and physical
In OSI model, as data packet moves from the upper to the lower layer header are
Added
In OSI model, as data packet moves from the upper to the lower layer header are
Added-
ARP stands for __________
Address Resolution Protocol
What device can ....
All
A Virtual Circuit consists of
All are correct
In a Datagram networks,
All are correct
What are general functions of router?
All are correct
What does the URL need to acess a document
All are correct
What is present in the HDLC control fiels for I-frame
All are correct
What is the IP address used to test a PC's network card that don't need connect PC to another PC?
All are correct,connection-oriented-
A Virtual Circuit consists of
All are correct-
In a Datagram networks,
All are correct-
What are general functions of router?
All are correct-
What is present in the HDLC control fiels for I-frame
All are correct-
What is (are) correct about DHCP?
All of the others
Which one(s) is (are) correct about Decentralized DNS?
All of the others
Which statement is correct about cookie technology?
All of the others ,Most major commercial Web sites today use cookies
What is (are) correct about DHCP?
All of the others-
Which one is best correct for IMAP (Internet Mail Access Protocol)
All of them
Which statement is best correct about UDP and TCP?
All of them
Why NAT (Network Address Translation) is used?
All of them
______ is (are) (an) example(s) of random access MAC
All of them
Which one is best correct for IMAP (Internet Mail Access Protocol)
All of them-
Which statement is best correct about UDP and TCP?
All of them-
What device can ....
All-
The client-server model significantly relies on ____ infrastructure servers, the Peer-to-Peer model, instead, pairs of interminably connected peers, communicates ____ with each other
Always-on....directly
The client-server model significantly relies on ____ infrastructure servers, the Peer-to-Peer model, instead, pairs of interminably connected peers, communicates ____ with each other
Always-on....directly-
Which of the following is true about ICMP messages?
An ICMP error message may be generated only for the first fragment.
TCP uses______________to check the safe and sound arrival of dat
An acknowledgment mechanism
____________ is a group of networks and routers under the authority of a single administration.
An autonomous system
IP is _________ datagram protocol.
An unreliable and connectionless
IP is _________ datagram protocol.
An unreliable and connectionless-
What is the order of the 5 layers in the Internet model?
Application, transport, network, link, physical
What is the order of the 5 layers in the Internet model?
Application, transport, network, link, physical-
DHCP is used to
Assign IP addresses automatically-
DHCP is used by the server to:
Assign IP addresses to clients automatically
__________ algorithms are more efficient for short messages
Asymmetric-key
___________ algorithms are more efficient for short messages.
Asymmetric-key
__________ algorithms are more efficient for short messages
Asymmetric-key-
algorithms are more efficient for short messages
Asymmetric-key-
Which one is correct about Denial of Service (DoS) attack?
Attackers make network resources unavailable by overwhelming resource with bogus traffic
Which one is correct about Denial of Service (DoS) attack?
Attackers make network resources unavailable by overwhelming resource with bogus traffic-
According to the PPP transition state datagram, verification of user identification occurs in the...state
Authenticating
According to the PPP transition state datagram, verification of user identification occurs in the...state
Authenticating-
An ISP has a DNS server that holds both names of Web servers and their IP addresses. That DNS servers is called
Authorative
An ISP has a DNS server that holds both names of Web servers and their IP addresses. That DNS servers is called
Authorative-
Multiple access link in 802.11 wireless LAN is a
Broadcast link
SMI uses another standard, ___________, to encode data to be transmitted over the network.
BER
___________ is an interdomain routing protocol using path vector routing.
BGP
In an ESS the _______ station is mobile.
BSS
The Physical layer is connected with the movement of____over the physical medium
Bits
The Physical layer is connected with the movement of____over the physical medium
Bits-
IP is________datagram protocol
Both a and b
IP address written as 200.23.16.0/23 means:
Both are correct
NAT router must
Both are correct
The "Time-To-Live" field in IP datagram
Both are correct
The difference between flow control and congestion control is primarily
Both are correct
IP address written as 200.23.16.0/23 means
Both are correct-
IP address written as 200.23.16.0/23 means:
Both are correct-
NAT router must
Both are correct-
The "Time-To-Live" field in IP datagram
Both are correct-
The difference between flow control and congestion control is primarily
Both are correct-
Why CSMA/CD (Carrier Sense Multiple Access / Collision Detection) (that is used in Ethernet) can NOT be used in Wireless LAN?
Both of them
Why CSMA/CD (Carrier Sense Multiple Access / Collision Detection) (that is used in Ethernet) can NOT be used in Wireless LAN?
Both of them-
If ASCII character G is sent and the character D is received, what type of error is this?
Burst
If ASCII character G is sent and the character D is received, what type of error is this (G: 01000111 and D: 01000100)?
Burst-
What is the framing method used in PPP?
Byte stuffing.
What is the framing method used in PPP?
Byte stuffing.-
___________ is a technology that creates and handles dynamic documents.
CGI
Which one is not a service provided by the link layer?
Congestion control
MAC protocal using 802.11
CSMA/CA
What is the MAC protocol used in 802.11 network?
CSMA/CA
What is the MAC protocol used in 802.11 network?
CSMA/CA-
______is used in Ethernet
CSMA/CD
is used in ethernet
CSMA/CD
______is used in Ethernet
CSMA/CD-
_______ was formed to connect universities with no defense ties.
CSNET
The DES cipher uses the same concept as the _________ cipher, but the encryption/ decryption algorithm is much more complex.
Caesar
CSMA/CD stands for
Carrier Sense Medium Access/Collision Detection
CSMA/CD stands for
Carrier Sense Medium Access/Collision Detection-
Which one is not a service provided by the link layer?
Congestion control-
Two types of network switching are:
Circuit and packet switching
Two types of network switching are
Circuit and packet switching-
In _____, the network establishes a dedicated end-to-end connection between two hosts
Circuit switching
What are two fundamental switching approaches for building a network core?
Circuit switching and packet switching
What are two fundamental switching approaches for building a network core?
Circuit switching and packet switching-
In _____, the network establishes a dedicated end-to-end connection between two hosts
Circuit switching-
The telephone networks are examples of __________.
Circuit-switched networks
The telephone networks are examples of __________.
Circuit-switched networks-
Which one is incorrect about proxy?
Client caches the whole website to improve the downloading speed
Which one is incorrect about proxy?
Client caches the whole website to improve the downloading speed-
While the____ significantly relies on always-on infrastructure servers, the____does not (or minimally relies on)
Client-server model...Peer-to-Peer model
While the____ significantly relies on always-on infrastructure servers, the____does not (or minimally relies on)
Client-server model...Peer-to-Peer model-
In TFTP, a connection is terminated with a _______ block.
DATA
The first phase of JPEG is ___________.
DCT transformation
A group table entry in the _______ state sends a request when its timer expires.
DELAYING
What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically?
DHCP
use to assign IP address to PCs in LAN automatically?
DHCP
What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically?
DHCP-
_______ is backward compatible with __________.
DHCP; BOOTP
The DNS servers that together implement the _____, store____ for the hostname to IP address mappings.
DNS database ....Resource Records
The DNS servers that together implement the _____, store____ for the hostname to IP address mappings.
DNS database ....Resource Records-
The______ that together implement the DNS distributed database, store____ for the hostname to IP address mappings.
DNS servers....Resource Records
The______ that together implement the DNS distributed database, store____ for the hostname to IP address mappings.
DNS servers....Resource Records-
As soon as the browser receives the IP address from____, it can initiate a TCP connection to the HTTP server located at port_____ at that IP address
DNS... 80
As soon as the browser receives the IP address from____, it can initiate a TCP connection to the HTTP server located at port_____ at that IP address
DNS... 80-
If the sender wants an option enabled by the receiver, it sends a _______ command.
DO
If the sender wants an option disabled by the receiver, it sends a _______ command.
DONT
_________ is an implementation of multicast distance vector routing. It is a source-based routing protocol, based on RIP.
DVMRP
Which layers bridges function at?
Data link and Physical
Which layers bridges function at?
Data link and Physical-
What is the data unit used in Internet Protocol (IP)?
Datagram
Any network that routes packets according to host destination addresses is a ________
Datagram network
What is the data unit used in Internet Protocol (IP)?
Datagram-
The job of delivering the data in a transport-layer segment to the correct application process is called_________.
De-multiplexing
The job of delivering the data in a transport-layer segment to the correct socket is called_________.
De-multiplexing
The job of delivering the data in a transport-layer segment to the correct application process is called_________.
De-multiplexing-
The job of delivering the data in a transport-layer segment to the correct socket is called_________.
De-multiplexing-
What is information used to route packet in network?
Destination Address fields in IP header
Single parity check can
Detect a single bit error
Single parity check can
Detect a single bit error-
Regarding to the DNS, IP addresses such as 209.191.122.70 or 10.22.8.8 are ____ to remember by human, but _____ to process by routers
Difficult... Easy
Regarding to the DNS, IP addresses such as 209.191.122.70 or 10.22.8.8 are ____ to remember by human, but _____ to process by routers
Difficult... Easy-
In the _______ protocol, the symmetric key is K = Gxy mod N, where G and N are public numbers.
Diffie-Hellman
______________ can provide authentication, integrity, and nonrepudiation for a message.
Digital signature
What type of routing protocol that BGP is?
Distance Vector Routing
What type of routing protocol that BGP is
Distance Vector Routing-
RIP (Routing Information Protocol) in the Internet uses
Distance vector routing algorithm
As learned in class, computer networks are classified based on:
Distance, switching
As learned in class, computer networks are classified based on:
Distance, switching-
What is DDoS stand for?
Distributed Denial-of-Service
What is DDoS stand for?
Distributed Denial-of-Service-
DNS is short for
Domain Name System
DNS is short for
Domain Name System-
_________ occurs when a remote host communicates with a mobile host that has moved to the same network (or site) as the remote host.
Double crossing
If the buffer of the router in the Internet is full, the router will____
Drop incoming packets, resulting packet loss
If the buffer of the router in the Internet is full, the router will____
Drop incoming packets, resulting packet loss-
BGP can have two types of sessions: _______ and ________ sessions.
E-BGP; I-BGP
Which agency developed standards for physical connection interfaces and electronic signaling speccifications?
EIA
Which agency developed standards for physical connection interfaces and electronic signaling specifications?
EIA
An unauthorized user tries to send a file to a server using TFTP. What should be the response of the server?
ERROR
In TFTP, what type of message is sent in response to an RRQ that fails to establish a connection?
ERROR
The _______ chunk is sent when an end point finds an error in a received packet.
ERROR
The _______ protocol provides message authentication, integrity, and privacy.
ESP
Regarding to the DNS, hostnames such as www.fpt.edu.vn, www.stanford.edu are ____ to remember by human, but _____ to process by routers
Easy....Difficult
Regarding to the DNS, hostnames such as www.fpt.edu.vn, www.stanford.edu are ____ to remember by human, but _____ to process by routers
Easy....Difficult-
In the exponential backoff phase of CSMA/CD for a 50Mbps Ethernet, after the first collision of a frame, the adapter then waits .... before sensing the channel again.
Either 0 or 10.24 microseconds
In the exponential backoff phase of CSMA/CD for a 50Mbps Ethernet, after the first collision of a frame, the adapter then waits .... before sensing the channel again.
Either 0 or 10.24 microseconds-
Assume an Ethernet network has speed of 15Mbps. In the exponential backoff phase of CSMA/CD, after the first collision of a frame, the adapter then waits .... before sensing the channel again.
Either 0 or 34 microseconds
Assume an Ethernet network has speed of 15Mbps. In the exponential backoff phase of CSMA/CD, after the first collision of a frame, the adapter then waits .... before sensing the channel again.
Either 0 or 34 microseconds-
In the exponential backoff phase of CSMA/CD for a 1Mbps Ethernet, after the first collision of a frame, the adapter then waits .... before sensing the channel again.
Either 0 or 512 microseconds
In the exponential backoff phase of CSMA/CD for a 1Mbps Ethernet, after the first collision of a frame, the adapter then waits .... before sensing the channel again.
Either 0 or 512 microseconds-
what is the ip address used to test a PC's network card that don't need
Either of 127.0.0.1
Which statement is correct about Error Control in TCP/IP model
Error Control is implemented in both Data Link Layer and Transport Layer
Which statement is correct about Error Control in TCP/IP model
Error Control is implemented in both Data Link Layer and Transport Layer-
Which of the following is the service of link layer?
Error detection.
According to the PPP transition state datagram, exchange of user control and data packets occurs in the...state
Establishing
CSMA/CD (Carrier Sense Multiple Access/Collision Detection) belongs to ____________ while CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) belongs to ____________
Ethernet............ Wireless LAN
CSMA/CD (Carrier Sense Multiple Access/Collision Detection) belongs to ____________ while CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) belongs to ____________
Ethernet............ Wireless LAN-
Which one is a MAC address:
F0-F0-16-F2-15-00
Which one is a MAC address:
F0-F0-16-F2-15-00-
Which cable type used for segment lenth more than 2000m.
Fiber optics
Which cable type used for segment lenth more than 2000m.
Fiber optics-
___ is a guided transmission medium, while___ is an unguided transmission medium
Fiber-optic cable...... Wireless LAN channel
___ is a guided transmission medium, while___ is an unguided transmission medium
Fiber-optic cable...... Wireless LAN channel-
TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
First-
_________ broadcasts packets, but creates loops in the systems.
Flooding
_________ control regulates the amount of data a source can send before receiving an acknowledgment from the destination..
Flow
_______ are special-interest groups that quickly test, evaluate, and standardize new technologies.
Forums
Which field or bit value unambiguously identifies the datagram as a fragment?
Fragment offset = 1000
What is the name of packet in Link layer of Internet protocol stack?
Frame
What is the name of packet in Link layer of Internet protocol stack?
Frame-
A method for encapsulating data in a PPP frame, identifying the beginning and end of the frame is called
Framing
A method for encapsulating data in a PPP frame, identifying the beginning and end of the frame is called
Framing-
That the frequency spectrum of a link is shared among the connections established across the link is called.....
Frequency division multiplexing
That the frequency spectrum of a link is shared among the connections established across the link is called.....
Frequency division multiplexing-
Which of the following statement is correct?
Full-Duplex: Communications in which both sender and receiver can send at the same time
Which of the following statement is correct?
Full-Duplex: Communications in which both sender and receiver can send at the same time-
TCP connection provides ___________.
Full-duplex service
TCP connection provides ___________.
Full-duplex service-
The HTTP request line contains a _______ method to request a document from the server.
GET
What is the service that the UDP protocol provides?
Guaranteed delivery
What is the service that the UDP protocol provides
Guaranteed delivery-
There are two categories of physical transmission medium:
Guided medium and unguided medium
There are two categories of physical transmission medium:
Guided medium and unguided medium-
_______ is a standard to allow telephones on the public telephone network to talk to computers connected to the Internet.
H.323
_______ was designed as an alternative to the T-1 line.
HDSL
The _______ oversees the IETF and the IRTF.
IAB
To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________.
IAC
_______ is the precursor to ICANN.
IANA
Mobile IP uses the router advertisement packet of _______ and appends an agent advertisement message.
ICMP
Traceroute command uses
ICMP
What is protocol used to inform errors concerning IP
ICMP-
A group table entry is in the _______ state if there is no corresponding timer running.
IDLE
What is the name of the standard for Ethernet LAN
IEEE 802.3
What is the name of the standard for Ethernet LAN
IEEE 802.3-
In version 6, an independent protocol called _______ is eliminated.
IGMP
_______ is more powerful and complex than _______.
IMAP4; POP3
______is more powerful and complex than______.
IMAP4; POP3
is more powerful and complex than______.
IMAP4; POP3-
In the original ARPANET, _______ were directly connected together.
IMPs
An IGMP packet is carried in an __________ packet.
IP
In the sending computer, UDP sends a data unit to the _______ layer.
IP
The ________ protocol is the transmission mechanism used by the TCP/IP suite.
IP
The logical addresses in the TCP/IP protocol suite are called _______ addresses.
IP
funtion of ARP
IP address to MAC address
When a host has the _______ address of a host but needs the _______ address, it uses a neighbor solicitation packet.
IP; physical
VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.
IPSec; tunneling
The _______ maintains and supports IAB.
ISOC
FTP uses port 21 for sending.... and port 20 for sending.....
Identification and password.... Data file
FTP uses port 21 for sending.... and port 20 for sending.....
Identification and password.... Data file-
_________ audio/video refers to the use of the Internet for interactive audio/video applications.
Interactive
Vulnerability Attack, Bandwidth Flooding, and Connection Flooding belongs to
Internet DoS Attack
Vulnerability Attack, Bandwidth Flooding, and Connection Flooding belongs to
Internet DoS Attack-
Based on distance, two MOST IMPORTANT types of computer networks are:
Internet and Local Area Networks
Based on distance, two MOST IMPORTANT types of computer networks are:
Internet and Local Area Networks-
In TCP, what can happen if the timeout is smaller than the connection's round-trip time?
It can result in unnecessary retransmissions.
In TCP, what can happen if the timeout is smaller than the connection's round-trip time?
It can result in unnecessary retransmissions.-
Which of the following describe the DHCP Discover message?
It does not use a layer 2 destination address
Which of the following describe the DHCP Discover message?
It does not use a layer 2 destination address.
Which of the following describe the DHCP Discover message?
It does not use a layer 2 destination address.-
Where is the LLC(Logical Link Control)?
It is a sublayer of the datalink layer and above the MAC sublayer of the datalink layer
Where is the LLC(Logical Link Control)?
It is a sublayer of the datalink layer and above the MAC sublayer of the datalink layer-
In CSMA/CD, if the adapter detects signal energy from other adapters while transmitting,
It stops transmitting its frame and transmits a jam signal-
In CSMA/CD, if the adapter detects signal energy from other adapters while transmitting,
It stops transmitting its frame and transmits a jam signal.
Channel partitioning, random access, and taking turns are______
MAC protocols-
The message contains the ________ and the __________.
header; body
____________ is used to compress images.
JPEG
______is used to compress video.
JPEG
is used to compress video.
JPEG-
One way to create an active document is to use __________.
Java applets.
The symmetric (shared) key in the Diffie-Hellman protocol is ____________.
K = Gxy mod N
In Exponential Backoff of CSMA/CD, the delay time after 4 collisions is
K*512 bittimes, where K is randomly selected in {0, 1, 2,..., 14, 15}
In Exponential Backoff of CSMA/CD, the delay time after 4 collisions is
K*512 bittimes, where K is randomly selected in {0, 1, 2,..., 14, 15}-
A _______ is a trusted third party that solves the problem of symmetric-key distribution.
KDC
_______ is an authentication protocol that needs an authentication server and a ticket-granting server.
Kerberos
A packet of L bits is transmitted via the link with the transmission rate of R bits/sec; the transmission delay is
L/R-
__________ allows an ATM network to be divided into several logical subnets.
LIS
Which statement is correct for "layering" in OSI model
Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others
Which one is correct about ALOHA?
Less bandwidth utilization than CSMA/CA
Which one is correct about ALOHA?
Less bandwidth utilization than CSMA/CA-
What type of routing algorithm that OSPF use?
Link State Routing Algorithm
What type of routing algorithm that OSPF use?
Link State Routing Algorithm-
In the transmission delay calculation t = L/R, what is R?
Link bandwidth of the link
In the transmission delay calculation t = L/R, what is R?
Link bandwidth of the link-
TCP provides __________between application processes running on different hosts
Logical communications
The transport layer protocol provides _____ communication between ______ running on different applications
Logical.....Processes
The transport layer protocol provides _____ communication between ______ running on different applications
Logical.....Processes-
_____ applications typically uses ____
Loss-tolerant........UDP
The third stage in an email transfer uses a(n) ________ protocol.
MAA
Channel partitioning, random access, and taking turns are______
MAC protocols
The packets in the application layer is called
Message
______________ means that the receiver needs to be sure of the sender identity and that an imposter has not sent the message.
Message authentication
___________ means that the data must arrive at the receiver exactly as they were sent.
Message integrity
The packets in the application layer is called
Message-
MAN stands for?
Metropolitan Area Network
MAN stands for
Metropolitan Area Network-
_________ means combining several streams of traffic into one stream.
Mixing
In the transport layer, the job of gathering data at the source host from different application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______.
Multiplexing
The job of gathering data at the source host from different application processes, enveloping the data and passing the segments to the network layer is called
Multiplexing
The job of gathering data at the source host from different sockets, enveloping the data and passing the segments to the network layer is called
Multiplexing
The job of gathering data at the source host from different application processes, enveloping the data and passing the segments to the network layer is called
Multiplexing-
The job of gathering data at the source host from different sockets, enveloping the data and passing the segments to the network layer is called
Multiplexing-
MIME is short for
Multipurpose Internet Mail Extensions
MIME is short for
Multipurpose Internet Mail Extensions-
Maximun of data flow through in N-port switch ...(an... with L2)
N
Maximum number of data flow through in N-port switch (LAN switch L2):
N/2
Maximum number of data flow through in N-port switch (LAN switch L2):
N/2-
Using _______, all of the outgoing packets go through the corresponding router, which replaces the source address in the packet with the appropriate global address.
NAT
_______ is a technology using a set of global Internet addresses and a set of private addresses.
NAT
__________ technology allows a site to use a set of private addresses for internal communication and a set of global Internet addresses for communication with another site.
NAT
Where is link layer implemented?
NIC
Where is link layer implemented?
NIC-
For control connection, FTP uses the __________ character set
NVT ASCII
The _______ translates local characters into NVT form.
TELNET client
The _______ translates NVT characters into a form acceptable by the remote operating system.
TELNET server
In BOOTP, the client often needs to use ________ to obtain the complete information it needs.
TFTP
In Kerberos, the _______ issues the ticket for the real server.
TGS
The _______ was designed to provide security at the transport layer.
TLS
What field in the IP header changes when a datagram is forwarded by a simple router?
TTL
What field in the IP header changes when a datagram is forwarded by a simple router?
TTL-
the different between tcp and udp is
Tcp sets up connections ..-
In CRC, both receiver and sender knows
The Generator
In CRC, both receiver and sender knows
The Generator-
_________ is a repository of information linked together from points all over the world.
The WWW
What does that mean by "Carrier Sense" in CSMA/CD?
The host listens for the carrier signal from other adapters before any transmission
What does that mean by "Carrier Sense" in CSMA/CD?
The host listens for the carrier signal from other adapters before any transmission-
A datagram is fragmented into three smaller datagrams. Which of the following is true?
The identification field is the same for all three datagrams.-
With WWW as an example of client-server computer software, the server is:
The machine that makes WWW document available
With WWW as an example of client-server computer software, the server is:
The machine that makes WWW documents available
With WWW as an example of client-server computer software, the server is
The machine that makes WWW documents available-
With WWW as an example of client-server computer software, the server i
The machine that makes WWW documents available.
With WWW as an example of client-server computer software, the server is:
The machine that makes WWW documents available.
With WWW as an example of client-server computer software, the client is:
The machine that you use to display WWW documents
Which of the following is true of the IP address 192.0.0.10?
The network address is 192.0.0.0.
In cyclic redundancy checking, what is CRC
The remainder
How long does it take to download an object from a Web Server to a client if using non-persistent HTTP?
The summation of Two Round Trip Times and the Transmission Time
How long does it take to download an object from a Web Server to a client if using non-persistent HTTP?
The summation of Two Round Trip Times and the Transmission Time-
What does that mean by store-and-forward operation of switches?
The switch will transmit only after it receives the whole frame
What does that mean by store-and-forward operation of switches?
The switch will transmit only after it receives the whole frame-
In TCP congestion control, when timeout occurs
The threshold congestion window will be set to half of the current window size
In TCP congestion control, when timeout occurs
The threshold congestion window will be set to half of the current window size-
What does the IP header's protocol field identify?
The transport layer protocol that generated the information in the data field
What does the IP header's protocol field identify?
The transport layer protocol that generated the information in the data field-
What is store-and-forward operation in switches?
They receive the whole frame before forwarding to next station
What does that mean by cut-through operation of switches?
They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived
What is cut-through operation in switches?
They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived
What does that mean by cut-through operation of switches?
They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived-
What is cut-through operation in switches?
They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived-
___________servers are involved in the Kerberos protocol.
Three
In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived
Three-
We can divide audio and video services into _______ broad categories.
Three-
Which field in the IP header is used to prevent an IP packet from continuously looping through a network?
Time-to-Live (TTL)
Which field in the IP header is used to prevent an IP packet from continuously looping through a network?
Time-to-Live (TTL)-
Which field in the IP header is used to prevent an IP packet from continuously looping through a network?
Time-to-Live (TTL-
The purpose of MTA (Mail Transfer Agent) is...
Transferal of message across the Internet
The purpose of MTA is...
Transferal of message across the Internet
The purpose of MTA (Mail Transfer Agent) is...
Transferal of message across the Internet-
The purpose of MTA is...
Transferal of message across the Internet-
__________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network.
Translation
In the OSI model, which layer functions as a liaison between user support layers and network support layers?
Transport layer
In the OSI model, which layer functions as a liaison between user support layers and network support layers
Transport layer-
_______ occurs when the remote host communicates with a mobile host that is not attached to the same network (or site) as the mobile host.
Triangle routing
____________ means that each IP datagram destined for private use in the organization must be encapsulated in another datagram.
Tunneling
_____specifies a physical star topology central hub....
Twisted-pair
_____specifies a physical star topology central hub....
Twisted-pair-
According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency.
Two-
A registration request or reply is sent by ________ using the well-known port 434.
UDP
BOOTP uses the services of _______.
UDP
RIP uses the services of _______.
UDP
RTCP uses an odd-numbered _______ port number that follows the port number selected for RTP.
UDP
RTP uses a temporary even-numbered _______ port.
UDP
TFTP uses the services of ________.
UDP
Which protocol is better for real-time video application over the Internet in term of minimizing the average transmission delay?
UDP
_______ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.
UDP
Which protocol is better for real-time video application over the Internet in term of minimizing the average transmission delay?
UDP-
A version of the _______ operating system included TCP/IP.
UNIX
The _________ is a standard for specifying any kind of information on the Internet.
URL
Ethernet technologies provides ____ to the network layer
Unreliable service
Ethernet technologies provides ____ to the network layer
Unreliable service-
What is WRONG about UDP?
Use ACK to notify the sender that the packet has arrived the receiver
What is WRONG about UDP?
Use ACK to notify the sender that the packet has arrived the receiver-
UDP is an acronym for _______.
User Datagram Protocol
Because the sending and the receiving processes may not write or read data at the same speed, TCP______
Uses buffers-
The _______ field in the SNMP PDU consists of a sequence of variables and their corresponding values.
VarBindList
If the sender wants to enable an option, it sends a _______ command.
WILL
Following standards: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to:
Wireless LAN
________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol
Wireless LAN
Following standards: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to:
Wireless LAN-
Which statement is correct about packet switching and circuit switching?
With the same delay performance, packet-switching allows more number of users than circuit switching
Which statement is correct about packet switching and circuit switching?
With the same delay performance, packet-switching allows more number of users than circuit switching-
Because the sending and the receiving processes may not write or read data at the same speed, TCP
______Uses buffers
In SCTP, a data chunk is numbered using ________.
a TSN
an RTP packet is encapsulated in _______.
a UDP user datagram
A time-exceeded message is generated if _______.
a and b
How can two routers be connected on an ATM network?
a and b
ICMPv6 includes _______.
a and b
The term ________ means that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.
best-effort delivery
HDLC is a __________ protocol
bit-oriented
The physical layer is concerned with the movement of _______ over the physical medium.
bits
A VPN can use _______ to guarantee privacy.
both a and b
A __________on each packet is required for real-time traffic.
both a and b
DHCP can be configured ___________.
both a and b
DHCP is a _______ configuration protocol.
both a and b
IP is _________ datagram protocol
both a and b
P is _________ datagram protocol.
both a and b
The BOOTP client and server can be on _______.
both a and b
There is no need for a header length field in SCTP because ________________.
both a and b
IP is _________ datagram protocol
both a and b-
After the rebinding state, a DHCP client can go to the __________ state.
both and b
In the ICMP package, ICMP packets are the output of _______.
both the input and the output module
A one-to-all communication between one source and all hosts on a network is classified as a _______ communication.
broadcast
An ARP request is normally _______.
broadcast
RPB creates a shortest path _______ tree from the source to each destination.
broadcast
The RARP request packets are normally _________.
broadcast
If ASCII character G is sent and the character D is received, what type of error is this (G: 01000111 and D: 01000100)?
burst
If ASCII character G is sent and the character D is received, what type of error is this (G: 01000111 and D: 01000100)?
burst-
TCP sliding windows are __________ oriented.
byte
In SCTP, a message ________ split into several chunks.
can be
Parity checking _____.
can detect a single bit error in a transmission
Parity checking _____.
can detect a single bit error in a transmission-
When an organization uses a private network, it _______________.
can use a block of addresses without permission from the Internet authorities
In SCTP, a DATA chunk ______carry data belonging to more than one message.
cannot
In the domain name chal.atc.fhdedu, _______ is the most specific label.
chal
In the _______ mode, each character typed is sent by the client to the server.
character
The purpose of echo request and echo reply is to
check node-to-node communication
The purpose of echo request and echo reply is to
check node-to-node communication-
After a message is encrypted, it is called _______.
ciphertext
The value of the ________ subfield defines the general purpose of an option.
class
Identify the class of the following IP address: 4.5.6.7.
class A
Identify the class of the following IP address: 191.1.2.3.
class B
Identify the class of the following IP address: 229.1.2.3.
class D
In ________ addressing, a typical forwarding module can be designed using three tables, one for each unicast class (A, B, C).
classful
In ________ addressing, when an address is given, we can find the beginning address and the range of addresses.
classful
The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________.
classless addressing
A manager is a host that runs the SNMP _______ process.
client
Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.
client-server
Active documents are sometimes referred to as _________ dynamic documents.
client-site
The GetRequest PDU is sent from the _______ to the __________ to retrieve the value of a variable or a set of variables.
client; server
During an FTP session the control connection is opened _______.
exactly once
In RIP, the ________ timer controls the validity of the route.
expiration
An _______ is a private network with limited external access that uses the TCP/IP protocol suite.
extranet
SONET is a standard for _______ networks.
fiber-optic cable
A host with the domain name pit.arc.nasgov. is on the _______ level of the DNS hierarchical tree. (The root is level one.)
fifth
In FTP, which category of commands lets a user switch directories and create or delete directories?
file management commands
In FTP, which category of commands is used to store and retrieve files?
file transfer commands
In FTP, ASCII, EBCDIC, and image define an attribute called _______.
file type
A(n) _________ machine is a machine that goes through a limited number of states.
finite state
TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
first
TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
first-
In a _______ name space, a name is assigned to an address. A name in this space is a sequence of characters without structure.
flat
The _______ field in the base header and the sender IP address combine to indicate a unique path identifier for a specific flow of dat
flow label
The _______ uses a registry table to find the care-of address of the mobile host.
foreign agent
SNMP defines the ___________________ to be sent from a manager to an agent and vice vers
format of the packets
The _______ module sends out an IP packet, the next-hop address, and interface information.
forwarding
The Bootstrap Protocol (BOOTP) is a client/server protocol designed to provide ________ of information for a diskless computer or a computer that is booted for the first time.
four pieces
The _______ module consults the MTU table to determine the packet size necessary for transmission.
fragmentation
Communication in TCP is ___________.
full-duplex
In RIP, the ________ timer is used to purge invalid routes from the table.
garbage collection
TELNET is a ________ client-server application program.
general-purpose
The _______ domains define registered hosts according to their generic behavior.
generic
When you use ftp client (a utility in Windows), what is command used to get files from ftp server?
get
When you use ftp client (a utility in Windows), what is command used to get files from ftp server?
get-
A _______ message tells an upstream router to start sending multicast messages for a specific group through a specific router.
graft
The _______ field of the IGMP message is all zeros in a query message.
group address
The IGMP functions in version 4 are part of _______ in version 6.
group membership
The _______ module can create a new entry in the group table and start a timer.
group-joining
The _______ module can decrement the reference count in the group table.
group-leaving
To join a group, a host sends a _______.
group-membership report
CBT is a ________ protocol that uses a core as the root of the tree.
group-shared
In TCP, one end can stop sending data while still receiving dat This is called a ______ .
half-close
If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
the IP address of the router found in the routing table
The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.
the IP address of the router found in the routing table
If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.
the destination IP address in the datagram header
The sender is a router that has received a datagram destined for a host in the same network. The logical address that must be mapped to a physical address is ______.
the destination IP address in the datagram header
In calculating the time difference between two clocks, a negative value indicates _______.
the destination clock lags behind the source clock
If the fragment offset has a value of 100, it means that _______.
the first byte of the datagram is byte 800
A DATA chunk arrives with its B/E bits equal to 10. It is ___________.
the first fragment
A DATA chunk arrives with its B/E bits equal to 01. It is ___________.
the last fragment
A DATA chunk arrives with its B/E bits equal to 00. It is ___________.
the middle fragment
In error reporting the encapsulated ICMP packet goes to
the original order,the original sender,the source
The source port address on the UDP user datagram header defines _______.
the process running on the sending computer
The value of receiving window size is determined by _________.
the receiver
The value of window size is determined by _________.
the receiver
In TFTP, if a duplicate DATA message is received, _______.
the receiver discards the duplicate
The value of receiving window size is determined by _________
the receiver-
The value of receiving window size is determined by _________.
the receiver-
The value of window size is determined by _________.
the receiver-
In cyclic redundancy checking, what is CRC
the remainder
In cyclic redundancy checking, what is CRC
the remainder-
In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.
the senderís public key
An HLEN value of decimal 10 means _______.
there are 40 bytes in the header
In TFTP, the block number on a DATA message is 22. This always means _______.
there were 21 previous blocks
10BASE2 uses _______ cable while 10BASE5 uses _______.
thin coaxial, thick coaxial
If the fragment offset has a value of 100 and MF = 0, it means that _______.
this is the last fragment.
If the fragment offset has a value of 100 and MF = 0, it means that _______.
this is the last fragment.-
In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived
three
In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived.
three
In the Internet, the domain name space (tree) is divided into _______ different sections:
three
The documents in the WWW can be grouped into ______ broad categories.
three
To communicate with a remote host, a mobile host goes through ________ phases.
three
We can divide audio and video services into _______ broad categories.
three
In ATM, end devices such as routers use all _____ layers, while switches inside the ATM network use only the bottom ______layers.
three; two
When all fragments of a message have not been received within the designated amount of time, a _______ error message is sent.
time-exceeded
When the hop count field reaches zero and the destination has not been reached, a _______ error message is sent.
time-exceeded
When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.
time-exceeded
A _______ shows the time a packet was produced relative to the first or previous packet.
timestamp
If a host needs to synchronize its clock with another host, it sends a _______ message.
timestamp-request
one important role of the transport layer is to
to multiplex and de-multiplex messages-
In OSPF, a _______ link is a network with several routers attached to it.
transient
A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal.
translator
In FTP, there are three types of _______: stream, block, and compressed.
transmission modes
Pipelined reliable data transfer protocols allow the sender to _______
transmit multiple packets without waiting for an ACK
Pipelined reliable data transfer protocols allow the sender to _______
transmit multiple packets without waiting for an ACK-
In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.
transport
The_________ layer is responsible for the delivery of a message from one process to another.
transport
UDP and TCP are both _______ layer protocols.
transport
In the OSI model, which layer functions as a liaison between user support layers and network support layers?
transport layer
This job of delivering the data in a.... to the correct.... is called de-multiplexing
transport-layer segment..... application process
This job of delivering the data in a.... to the correct.... is called de-multiplexing
transport-layer segment..... application process-
IPSec operates at two different modes: _________ mode and _________mode.
transport; tunnel
To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure
tree
In the ________ mode, the IPSec header is placed in front of the original IP header.
tunnel
A process called _______ sends a multicast packet through WANs that do not support physical multicast addressing.
tunneling
In networks that do not support physical multicast addressing, multicasting can be accomplished through _______.
tunneling
In IGMP, a membership report is sent _______.
twice
To use the services of UDP, we need ________ socket addresses.
two