Você está na página 1de 9

Alain University of Science &Technology College of Business Administration Management Information Systems Department 2-2012/2013

Exercise on chapter 05 TCP/IP


MULTIPLE CHOICE
1.

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. a. physical b. transport c. session d. presentation e. data link __________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller packets e. interfacing with the network layer _______ is the dominant network protocol today. a. SDLC b. SNA c. IPX/SPX d. TCP/IP e. X.25 Transmission Control Protocol/Internet Protocol was developed for ________ in 1974. a. ARPANET b. IBM c. Hewlett-Packard d. University of Minnesota e. Xerox

2.

3.

4.

5.

TCP/IP: a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet b. performs packetizing, as well as routing and addressing functions c. is not very efficient and is prone to errors d. is compatible with only one type of data link protocol, SDLC e. refers to Telephone Control Procedures/Inter-exchange Procedures A typical TCP packet has a _______ header of control information. a. 32-bit b. 64-bit c. 160-bit d. 192-bit e. 32-byte The source destination port identifier tells the destination station _____________. a. which computer sent the TCP packet. b. which application layer program that the packet should be sent c. which application layer process the packet is from. d. the IP address of the source computer. e. the IP address of the destination computer. TCP uses _____________ so that the destination station can reassemble the packets into the correct order. a. IP addresses b. sequence numbers c. port numbers d. packet numbers e. reassembly value The older version of IP has a ________ header of control information. a. 128-bit b. 192-bit c. 1024-bit d. 160-bit e. 320-bit IP: a. b. c. d. e. performs packetizing functions does not have a header is currently in use with only one packet form or structure performs routing functions performs error control functions

6.

7.

8.

9.

10.

11.

The newer form of IP, version 6 (Ipv6) is: a. running out of address space to support the growth of the Internet b. has a 20 byte header c. has an increased address size from 32 bits to 128 bits d. does not include version number in its header e. does not include hop limit in its header

12.

Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the: a. data link layer address b. port address c. application layer address d. network address e. IP address The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer. a. bits b. bytes c. frames d. packets e. strings The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. a. network layer address resolution b. one way handshake c. SNA message d. TCP connection e. DNS server request A virtual circuit is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless

13.

14.

15.

16.

A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection a. ACK b. NAK c. SYN d. ARQ e. FIN _____________ routing is a method of routing in which each packet makes its own way through the network. a. Frequency division b. Connection-oriented c. PCMCIA d. Connectionless e. Application net In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver. a. transport b. network c. physical d. data link e. connection Which of the following is not a protocol used at the application layer. a. HTTP b. SMTP c. FTP d. Telnet e. UDP ______________ routing is most commonly used when the application data or message can fit into one single packet. a. Frame-oriented b. Connection-oriented c. Connectionless d. Physical-oriented e. Byte-oriented

17.

18.

19.

20.

21.

UDP is not commonly used for: a. network management control messages b. RIP messages c. DHCP addressing messages d. HTTP requests e. routing control messages With QoS routing different __________ are defined, each with different priorities. a. classes of service b. domain names c. application layer addresses d. data link layer addresses e. classes of Internet addresses An application layer address using TCP/Ipv4 looks like: a. 128.192.78.5 b. www.cba.uga.edu c. user@cba.uga.edu d. 00-0F-00-81-14-00 e. Building 4, Room 2, User 3 A client computer is assigned a data link layer address is by: a. hardware manufacturers b. software manufacturers c. middleware manufacturers d. network managers who configure a file in a computers network layer software package e. ISO ICANN: a. developed the IPX/SPX network layer protocol b. assigns data link layer addresses c. approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet d. developed X.25 network layer protocol e. refers to Interchange Computer Addressing Networks and Nodes IPv6 will be based upon _________ -byte addresses. a. 32 b. 24 c. 4 d. 16 e. 8

22.

23.

24.

25.

26.

27.

IPv4 uses ________ bytes per Internet address. a. 4 b. 32 c. 8 d. 24 e. 16 A(n) ________ refers to a group of computers that are logically grouped together by IP number. a. IPv6 group b. subnet c. data link group d. TCP group e. application net A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255 Dynamic addressing: a. assigns a permanent network layer address to a client computer in a network b. makes network management more complicated in dial-up networks c. has only one standard, bootp d. is always performed for servers only e. can solve many updating headaches for network managers who have large, growing, changing networks ___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service coding Server name resolution is done using the: a. Address Resolution Protocol b. Border Gateway Protocol c. Internet Control Message Protocol d. Routing Information Protocol e. Domain Name Service

28.

29.

30.

31.

32.

33.

When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server. a. broadcast message b. DNS request packet c. SNA packet d. IPX message e. X.25 packet When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. a. physical layer packet b. multicast message c. X.25 message d. broadcast message e. application layer packet _________ is a specially formatted request used to perform IP address to data link address resolution. a. Address Resolution Protocol b. Domain Service Request c. HTTP request d. Link state request e. Autonomous System Request ___________ is the process of determining the path that a message will travel from sending computer to receiving computer. a. Routing b. Addressing c. Interfacing d. Broadcasting e. Packetizing The _____________ is used by a computer to determine how messages will travel through the network. a. routing table b. configuration listing c. linking loader d. bus header assignment list e. file allocation table

34.

35.

36.

37.

38.

In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column. a. linking loader b. routing table c. configuration listing d. bus header assignment list e. file allocation table The three fundamental approaches to routing are: a. circuitous, flat, and direct routing b. connectionless, static, and connection-oriented c. subordinate, master, and insubordinate routing d. host, client, and client-server routing e. centralized, static routing, and dynamic routing An advantage of centralized routing is: a. routing does reflect changing network conditions, such as computers that are overloaded by many messages b. if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function c. routing decisions are simple d. the routing tables are stored at all computers in the network e. it requires more processing by each computer or router in the network than dynamic routing With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors. a. circuitous b. decentralized c. distance vector d. indirect e. link state ____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing

39.

40.

41.

42.

43.

_______________ is a type of dynamic routing. a. Static routing b. Circuitous routing c. Centralized routing d. Link state e. X.25 routing One drawback to dynamic routing is: a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages b. It cannot be used with non-government networks c. The transmission of status information wastes network capacity that could be used to send user messages d. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. e. It requires less processing by each computer than static routing. The ping command uses the most basic interior routing protocol on the Internet, which is the: a. Border Gateway Protocol b. Internet Control Message Protocol c. Routing Information Protocol d. Enhanced Interior Gateway Routing Protocol e. Open Shortest Path First

44.

45.

Você também pode gostar