Escolar Documentos
Profissional Documentos
Cultura Documentos
@@ Error reporting
@@ Handle addressing conventions
@@ Datagram format
@@ Packet handling conventions
2. Which of the following field in IPv4 datagram is not related to fragmentation?
@@ Flags
@@ Offset
@@ TOS
@@ Identifier
3. The TTL field has value 10. How many routers (max) can process this datagram?
@@ 11
@@ 5
@@ 10
@@ 1
4. What should be the flag value to indicate the last fragment?
@@ 0
@@ 1
@@ TTl value
@@ 10
5. Which field helps to check rearrangement of the fragments?
@@ offset
@@ flag
@@ TTL
@@ identifer
6. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
@@ Fragmentation field
@@ Fast-switching
@@ ToS field
@@ Option field
7. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other
by intervening IPv4 routers. The best solution here is
@@ use dual-stack approach
@@ Tunneling
@@ No solution
@@ Replace the system
8. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented
by bits
@@ 96 to 127
@@ 0 to 63
@@ 80 to 95
@@ 64 to 79
9. DHCP uses UDP port ____ for sending data to the server.
@@ 66
@@ 67
@@ 68
@@ 69
@@ Header line
@@ Status line
@@ Entity body
20. The HTTP response message leaves out the requested object when _____ method is used
@@ GET
@@ POST
@@ HEAD
@@ PUT
21. In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.
@@ 2
@@ 1
@@ 4
@@ 3
22. _____ command is used to manipulate TCP/IP routing table.
@@ route
@@ Ipconfig
@@ Ifconfig
@@ Traceroute
23. E-mail is
@@ Loss-tolerant application
@@ Bandwidth-sensitive application
@@ Elastic application
@@ Application
24. To deliver a message to the correct application program running on a host, the _______ address must
be consulted
@@ IP
@@ MAC
@@ Port
@@ ROUTE
25) This is a time-sensitive service
@@ File transfer
@@ File download
@@ E-mail
@@ Internet telephony
26. If there are N routers from source to destination, total end to end delay in sending packet P(L>number of bits in the packet R-> transmission rate)
@@ N
@@ (N*L)/R
@@ (2N*L)/R
@@ L/R
27. The resources needed for communication between end systems are reserved for the duration of
session between end systems in ________
@@ Packet switching
@@ Circuit switching
@@ Line switching
@@ Frequency switching
28. As the resouces are reserved between two communicating end systems in circuit switching, this is
achieved
@@ authentication
@@ guaranteed constant rate
@@ reliability
@@ store and forward
29. Which multiplexing technique transmits digital signals ?
@@ FDM
@@ TDM
@@ WDM
@@ RDM
30. If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this
TDM is
@@ 32kbps
@@ 200kbps
@@ 500kbps
@@ 1000kbps
31. If 5 files are transfered from server A to client B in the same session. The number of TCP connection
between A and B is
@@ 5
@@10
@@ 2
@@ 6
32. The commands, from client to server, and replies, from server to client, are sent across the control
connection in ____ bit ASCII format
@@ 8
@@ 7
@@ 3
@@ 5
33. Find the FTP reply whose message is wrongly matched
@@ 331 Username OK, password required
@@ 425 Cant open data connection
@@ 452 Error writing file
@@ 452 Cant open data connection
34. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is(in
milliseconds)
@@ 3.2
@@ 32
@@ 0.32
@@ 0
35. In a network, If P is the only packet being transmitted and there was no earlier transmission, which of
the following delays could be zero
@@ Propogation delay
@@ Queuing delay
@@ Transmission delay
@@ Processing delay
36. What is WPA?
@@ wi-fi protected access
@@ wired protected access
ANSWERS
1.a
13.b
25.d
37.b
2.c
14.a
26.b
38.a
3.c
15.d
27.b
39.d
4.a
16.b
28.b
40.b
5.a
17.c
29.b
6.c
18.a
30.a
7.b
19.a
31.d
8.a
20.c
32.b
9.b
21.b
33.d
10.a
22.a
34.a
11.a
23.c
35.b
12.a
24.c
36.a