Computer Network Exam 2021-2022
41 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Category 5e UTP cable is most often used in which type of network?

  • Wireless
  • Telephone
  • Ethernet (correct)
  • Satellite
  • What is the maximum end-to-end cable length of a single UTP cable that is sufficient for data communication?

  • 60m
  • 120m
  • 100m (correct)
  • 150m
  • What is the maximum end-to-end cable length of a single coaxial cable for data communication?

  • 400m
  • 600m
  • 300m
  • 500m (correct)
  • Which type of cable is not affected by electromagnetic interference?

    <p>Fiber optic cable</p> Signup and view all the answers

    Which physical phenomenon is utilized in optical fiber transmission?

    <p>Total internal reflection</p> Signup and view all the answers

    Which type of cable is typically used for cable television?

    <p>Coaxial cable</p> Signup and view all the answers

    Which device is used for increasing the power of a signal and retransmitting it?

    <p>Repeater</p> Signup and view all the answers

    What is a TCP name for a transport service access point?

    <p>Port</p> Signup and view all the answers

    What is the use of extended address in frame relay networks?

    <p>To increase the range of data link connection identifiers</p> Signup and view all the answers

    What is the term for an attempt to make a computer resource unavailable to its intended users?

    <p>Denial-of-service attack</p> Signup and view all the answers

    Which protocol provides a reliable communication service?

    <p>TCP</p> Signup and view all the answers

    What does the port number in a TCP connection specify?

    <p>It specifies the communication process on the two end systems</p> Signup and view all the answers

    What is the original data extracted from the data frame containing the bit sequence: 00001111 00111111 00001111 01111110 using flag bytes?

    <p>00001111 00111111 01111110</p> Signup and view all the answers

    Using a single bit parity scheme with odd code, what is the correct transmitted bit sequence for the original data: 011000101111?

    <p>0110001011110</p> Signup and view all the answers

    When using a single bit parity scheme with even code, what is the resulting bit sequence from the original data 011000101111?

    <p>0110001011111</p> Signup and view all the answers

    For the original data 11011011000101111, which bit sequence will be transmitted using a single bit parity scheme with odd code?

    <p>110110110001011110</p> Signup and view all the answers

    What is the original data determined from the received bit sequence 0110001011110 using an odd parity scheme?

    <p>011000101111</p> Signup and view all the answers

    When receiving a bit sequence of 0110001011111, what is the original data when processed with an even parity scheme?

    <p>011000101111</p> Signup and view all the answers

    What is the original data extracted from the sequence 11010011000101111 using an even parity scheme?

    <p>1101001100010111</p> Signup and view all the answers

    In a byte-stuffed framing technique, what byte serves as the ESC byte?

    <p>00001111</p> Signup and view all the answers

    Given the bit sequence 00001111 00111111 00001111, what is the first step in using flag bytes with byte stuffing for framing?

    <p>Identify and remove the FLAG byte.</p> Signup and view all the answers

    What is the main purpose of applying the Cyclic Redundancy Check (CRC) technique?

    <p>To detect errors in data transmission.</p> Signup and view all the answers

    Which protocol is specifically tasked with converting IP addresses into MAC addresses?

    <p>ARP</p> Signup and view all the answers

    Which device operates by forwarding data primarily based on the destination MAC address?

    <p>Switch</p> Signup and view all the answers

    Which of the following is a notable feature of a network switch?

    <p>It combines both plug-and-play and self-learning capabilities.</p> Signup and view all the answers

    Which method is often utilized for managing multiple accesses in computer networks?

    <p>Random access</p> Signup and view all the answers

    What is the name of the random access protocol used in the MAC layer of a computer network?

    <p>Aloha</p> Signup and view all the answers

    Which statement is correct regarding the Slotted ALOHA protocol?

    <p>Time is segmented into slots, with transmissions starting at the beginning of each slot.</p> Signup and view all the answers

    What is the primary function of a router in a network?

    <p>Routing data packets between networks.</p> Signup and view all the answers

    Which of the following describes the use of token passing in network access control?

    <p>Access is granted only when a token is passed to a device.</p> Signup and view all the answers

    What characteristic of a hub differentiates it from a switch in terms of data forwarding?

    <p>A hub does not analyze the data packets it forwards.</p> Signup and view all the answers

    Which of the following statements is true for the ALOHA protocol?

    <p>Time is divided into equal size slots and nodes immediately transmit data once it has.</p> Signup and view all the answers

    Which of the following represents the correct order of transmission efficiency for ALOHA, Slotted ALOHA, and CSMA protocols?

    <p>ALOHA – Slotted ALOHA – CSMA</p> Signup and view all the answers

    Which random access protocol is applied by Ethernet?

    <p>CSMA/CD</p> Signup and view all the answers

    Which random access protocol is applied by Wi-Fi?

    <p>CSMA/CA</p> Signup and view all the answers

    Which network applies the mechanism that allows nodes to transmit data immediately when the medium is idle for a period greater than a Distributed InterFrame Space (DIFS)?

    <p>Wi-Fi</p> Signup and view all the answers

    What is the standard size of a MAC address?

    <p>48 bits</p> Signup and view all the answers

    Which of the following addresses is considered a MAC address?

    <p>00:1A:2B:3C:4D:5E</p> Signup and view all the answers

    What is the main disadvantage of the ALOHA protocol when compared to Slotted ALOHA?

    <p>Lower maximum throughput</p> Signup and view all the answers

    What happens when two nodes transmit data at the same time in the ALOHA protocol?

    <p>The transmissions collide and both are lost.</p> Signup and view all the answers

    In terms of collision handling, which protocol works better than ALOHA?

    <p>CSMA</p> Signup and view all the answers

    Study Notes

    Computer Network Exam 2021-2022

    • Exam administered by Vietnam-Korea University of Information Technology
    • Exam duration: 60 minutes
    • Exam code: VKU-MMT-2021

    Exam Questions

    • Computer Network Definition:
      • A collection of hardware components and computers interconnected by communication channels.
      • Enables resource sharing and information exchange.
      • Includes all interconnected resources.
    • First Computer Network:
      • ARPANET
    • OSI Model Layers:
      • 7 layers in the OSI model
    • Host-to-Host Layers in OSI Model:
      • Transport, Session, Presentation, and Application Layers
    • TCP/IP Model Layers:
      • 4 layers
    • Wide Area Network (WAN):
      • A network that spans a large geographical area, such as a country or the world.
    • Local Area Network (LAN):
      • A network covering a limited geographical area, such as a building or a campus.
    • OSI Model Layer for Syntax and Semantics:
      • Presentation layer
    • OSI Model Layer for Packet Routing:
      • Network layer
    • OSI Model Layers Corresponding to Application Layer in TCP/IP:
      • Session, Presentation, and Application Layers
    • Ping Command Use:
      • To test device reachability on a network
    • Command for Managing IP Addresses on Machine:
      • Ipconfig
    • Data Unit in Physical Layer:
      • Bit
    • Layer Corresponding to Internet Layer in TCP/IP:
      • Network layer
    • UTP Cable Pair Count:
      • 4 pairs
    • Purpose of Twisting Wires in Twisted Pair Cable:
      • Reduce cross-talk interference
    • Category 5e UTP Cable Use:
      • Ethernet network
    • Maximum UTP Cable Length:
      • 100 meters
    • Maximum Coaxial Cable Length:
      • 500 meters
    • Maximum Fiber Optic Cable Length:
      • 2 kilometers
    • Cable Not Affected by Electromagnetic Interference:
      • Fiber optic cable
    • Physical Phenomenon in Optical Fiber Transmission:
      • Total internal reflection
    • Cable Used for Connecting Computers Directly:
      • Straight-through cable
    • Color Code Standard for T568A:
      • White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown
    • Metric for Measuring Data Transferring Speed:
      • bits per second (bps), megabits per second (Mbps), gigabits per second (Gbps), and terabits per second (Tbps)
    • Meaning of bps:
      • bits per second
    • OSI Layer Controlling Transmission Errors:
      • Data Link layer
    • Data Unit in Data Link Layer:
      • Frame
    • Number of Bits in MAC Address:
      • 48 bits
    • Physical Address:
      • 0F-1F-2F-3F-4F-5F
    • Unique Identifier for Network Interface Controller:
      • MAC address
    • Protocol for Resolving IP Address to MAC Address:
      • Address Resolution Protocol (ARP)
    • Device Forwarding Data Based on Destination MAC Address:
      • Switch
    • Characteristic of Switch:
      • Plug-and-play and self-learning
    • Method for Controlling Multiple Access in Network:
      • Random access
    • Random Access Protocol for MAC Layer:
      • ALOHA
    • Random Access Protocol for Wi-Fi:
      • CSMA/CA
    • Statement True for Slotted ALOHA:
      • Time is divided into equal size slots and nodes transmit data at start of each slot
    • Statement True for ALOHA:
      • Time is not divided into equal size slots
    • Mechanism for Controlling Medium Access in Network:
      • Time is divided into slots
    • Protocols Capable of Detecting and Correcting Single-Bit Error:
      • Two-dimensional parity scheme
    • Bit Pattern from CRC-12 Standard:
      • 1100000001111
    • Bit Pattern from CRC-16 Standard:
      • 11000000000000101
    • Bit Pattern from CRC-CCITT Standard:
      • 10001000000100001
    • Bit Sequence Transmitted by CRC with Generator G(x) = x²+1:
      • 10100001 111
    • Bit Sequence Transmitted by CRC with Generator G(x) = x³+1:
      • 10100011101
    • Protocol for Resolving IP to MAC Addresses:
      • ARP
    • Size of MAC Address:
      • 48 bits
    • Size of IP v4 Address:
      • 32 bits
    • Size of IP v6 Address:
      • 128 bits
    • IP v6 Datagram Format with Header Size:
      • 40 bytes
    • Protocol for Inter-AS Routing:
      • BGP
    • Protocol for Intra-AS Routing:
      • RIP, OSPF, IGRP
    • Data Unit in Physical Layer:
      • Bit
    • Transmission Control Protocol (TCP) Purpose:
      • Connection-oriented
    • User Datagram Protocol (UDP) Advantage:
      • Low overhead
    • Port Address Size in TCP/IP:
      • 16 bits
    • Protocol Used in Error Reporting:
      • ICMP
    • Transport Layer Protocol for Process-to-process Delivery:
      • TCP and UDP
    • Port Number Range for Ephemeral Ports:
      • 1024 to 65535
    • Purpose of PUSH Flag in TCP Header:
      • Indicate end of message and the message to be processed immediately

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on computer networks with this exam from the Vietnam-Korea University of Information Technology. Covering topics such as the OSI and TCP/IP models, LANs, WANs, and the history of networking, this quiz is essential for any IT student. Challenge yourself and see how well you understand the intricacies of computer networks!

    More Like This

    Use Quizgecko on...
    Browser
    Browser