Podcast
Questions and Answers
Category 5e UTP cable is most often used in which type of network?
Category 5e UTP cable is most often used in which type of network?
What is the maximum end-to-end cable length of a single UTP cable that is sufficient for data communication?
What is the maximum end-to-end cable length of a single UTP cable that is sufficient for data communication?
What is the maximum end-to-end cable length of a single coaxial cable for data communication?
What is the maximum end-to-end cable length of a single coaxial cable for data communication?
Which type of cable is not affected by electromagnetic interference?
Which type of cable is not affected by electromagnetic interference?
Signup and view all the answers
Which physical phenomenon is utilized in optical fiber transmission?
Which physical phenomenon is utilized in optical fiber transmission?
Signup and view all the answers
Which type of cable is typically used for cable television?
Which type of cable is typically used for cable television?
Signup and view all the answers
Which device is used for increasing the power of a signal and retransmitting it?
Which device is used for increasing the power of a signal and retransmitting it?
Signup and view all the answers
What is a TCP name for a transport service access point?
What is a TCP name for a transport service access point?
Signup and view all the answers
What is the use of extended address in frame relay networks?
What is the use of extended address in frame relay networks?
Signup and view all the answers
What is the term for an attempt to make a computer resource unavailable to its intended users?
What is the term for an attempt to make a computer resource unavailable to its intended users?
Signup and view all the answers
Which protocol provides a reliable communication service?
Which protocol provides a reliable communication service?
Signup and view all the answers
What does the port number in a TCP connection specify?
What does the port number in a TCP connection specify?
Signup and view all the answers
What is the original data extracted from the data frame containing the bit sequence: 00001111 00111111 00001111 01111110 using flag bytes?
What is the original data extracted from the data frame containing the bit sequence: 00001111 00111111 00001111 01111110 using flag bytes?
Signup and view all the answers
Using a single bit parity scheme with odd code, what is the correct transmitted bit sequence for the original data: 011000101111?
Using a single bit parity scheme with odd code, what is the correct transmitted bit sequence for the original data: 011000101111?
Signup and view all the answers
When using a single bit parity scheme with even code, what is the resulting bit sequence from the original data 011000101111?
When using a single bit parity scheme with even code, what is the resulting bit sequence from the original data 011000101111?
Signup and view all the answers
For the original data 11011011000101111, which bit sequence will be transmitted using a single bit parity scheme with odd code?
For the original data 11011011000101111, which bit sequence will be transmitted using a single bit parity scheme with odd code?
Signup and view all the answers
What is the original data determined from the received bit sequence 0110001011110 using an odd parity scheme?
What is the original data determined from the received bit sequence 0110001011110 using an odd parity scheme?
Signup and view all the answers
When receiving a bit sequence of 0110001011111, what is the original data when processed with an even parity scheme?
When receiving a bit sequence of 0110001011111, what is the original data when processed with an even parity scheme?
Signup and view all the answers
What is the original data extracted from the sequence 11010011000101111 using an even parity scheme?
What is the original data extracted from the sequence 11010011000101111 using an even parity scheme?
Signup and view all the answers
In a byte-stuffed framing technique, what byte serves as the ESC byte?
In a byte-stuffed framing technique, what byte serves as the ESC byte?
Signup and view all the answers
Given the bit sequence 00001111 00111111 00001111, what is the first step in using flag bytes with byte stuffing for framing?
Given the bit sequence 00001111 00111111 00001111, what is the first step in using flag bytes with byte stuffing for framing?
Signup and view all the answers
What is the main purpose of applying the Cyclic Redundancy Check (CRC) technique?
What is the main purpose of applying the Cyclic Redundancy Check (CRC) technique?
Signup and view all the answers
Which protocol is specifically tasked with converting IP addresses into MAC addresses?
Which protocol is specifically tasked with converting IP addresses into MAC addresses?
Signup and view all the answers
Which device operates by forwarding data primarily based on the destination MAC address?
Which device operates by forwarding data primarily based on the destination MAC address?
Signup and view all the answers
Which of the following is a notable feature of a network switch?
Which of the following is a notable feature of a network switch?
Signup and view all the answers
Which method is often utilized for managing multiple accesses in computer networks?
Which method is often utilized for managing multiple accesses in computer networks?
Signup and view all the answers
What is the name of the random access protocol used in the MAC layer of a computer network?
What is the name of the random access protocol used in the MAC layer of a computer network?
Signup and view all the answers
Which statement is correct regarding the Slotted ALOHA protocol?
Which statement is correct regarding the Slotted ALOHA protocol?
Signup and view all the answers
What is the primary function of a router in a network?
What is the primary function of a router in a network?
Signup and view all the answers
Which of the following describes the use of token passing in network access control?
Which of the following describes the use of token passing in network access control?
Signup and view all the answers
What characteristic of a hub differentiates it from a switch in terms of data forwarding?
What characteristic of a hub differentiates it from a switch in terms of data forwarding?
Signup and view all the answers
Which of the following statements is true for the ALOHA protocol?
Which of the following statements is true for the ALOHA protocol?
Signup and view all the answers
Which of the following represents the correct order of transmission efficiency for ALOHA, Slotted ALOHA, and CSMA protocols?
Which of the following represents the correct order of transmission efficiency for ALOHA, Slotted ALOHA, and CSMA protocols?
Signup and view all the answers
Which random access protocol is applied by Ethernet?
Which random access protocol is applied by Ethernet?
Signup and view all the answers
Which random access protocol is applied by Wi-Fi?
Which random access protocol is applied by Wi-Fi?
Signup and view all the answers
Which network applies the mechanism that allows nodes to transmit data immediately when the medium is idle for a period greater than a Distributed InterFrame Space (DIFS)?
Which network applies the mechanism that allows nodes to transmit data immediately when the medium is idle for a period greater than a Distributed InterFrame Space (DIFS)?
Signup and view all the answers
What is the standard size of a MAC address?
What is the standard size of a MAC address?
Signup and view all the answers
Which of the following addresses is considered a MAC address?
Which of the following addresses is considered a MAC address?
Signup and view all the answers
What is the main disadvantage of the ALOHA protocol when compared to Slotted ALOHA?
What is the main disadvantage of the ALOHA protocol when compared to Slotted ALOHA?
Signup and view all the answers
What happens when two nodes transmit data at the same time in the ALOHA protocol?
What happens when two nodes transmit data at the same time in the ALOHA protocol?
Signup and view all the answers
In terms of collision handling, which protocol works better than ALOHA?
In terms of collision handling, which protocol works better than ALOHA?
Signup and view all the answers
Study Notes
Computer Network Exam 2021-2022
- Exam administered by Vietnam-Korea University of Information Technology
- Exam duration: 60 minutes
- Exam code: VKU-MMT-2021
Exam Questions
-
Computer Network Definition:
- A collection of hardware components and computers interconnected by communication channels.
- Enables resource sharing and information exchange.
- Includes all interconnected resources.
-
First Computer Network:
- ARPANET
-
OSI Model Layers:
- 7 layers in the OSI model
-
Host-to-Host Layers in OSI Model:
- Transport, Session, Presentation, and Application Layers
-
TCP/IP Model Layers:
- 4 layers
-
Wide Area Network (WAN):
- A network that spans a large geographical area, such as a country or the world.
-
Local Area Network (LAN):
- A network covering a limited geographical area, such as a building or a campus.
-
OSI Model Layer for Syntax and Semantics:
- Presentation layer
-
OSI Model Layer for Packet Routing:
- Network layer
-
OSI Model Layers Corresponding to Application Layer in TCP/IP:
- Session, Presentation, and Application Layers
-
Ping Command Use:
- To test device reachability on a network
-
Command for Managing IP Addresses on Machine:
- Ipconfig
-
Data Unit in Physical Layer:
- Bit
-
Layer Corresponding to Internet Layer in TCP/IP:
- Network layer
-
UTP Cable Pair Count:
- 4 pairs
-
Purpose of Twisting Wires in Twisted Pair Cable:
- Reduce cross-talk interference
-
Category 5e UTP Cable Use:
- Ethernet network
-
Maximum UTP Cable Length:
- 100 meters
-
Maximum Coaxial Cable Length:
- 500 meters
-
Maximum Fiber Optic Cable Length:
- 2 kilometers
-
Cable Not Affected by Electromagnetic Interference:
- Fiber optic cable
-
Physical Phenomenon in Optical Fiber Transmission:
- Total internal reflection
-
Cable Used for Connecting Computers Directly:
- Straight-through cable
-
Color Code Standard for T568A:
- White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown
-
Metric for Measuring Data Transferring Speed:
- bits per second (bps), megabits per second (Mbps), gigabits per second (Gbps), and terabits per second (Tbps)
-
Meaning of bps:
- bits per second
-
OSI Layer Controlling Transmission Errors:
- Data Link layer
-
Data Unit in Data Link Layer:
- Frame
-
Number of Bits in MAC Address:
- 48 bits
-
Physical Address:
- 0F-1F-2F-3F-4F-5F
-
Unique Identifier for Network Interface Controller:
- MAC address
-
Protocol for Resolving IP Address to MAC Address:
- Address Resolution Protocol (ARP)
-
Device Forwarding Data Based on Destination MAC Address:
- Switch
-
Characteristic of Switch:
- Plug-and-play and self-learning
-
Method for Controlling Multiple Access in Network:
- Random access
-
Random Access Protocol for MAC Layer:
- ALOHA
-
Random Access Protocol for Wi-Fi:
- CSMA/CA
-
Statement True for Slotted ALOHA:
- Time is divided into equal size slots and nodes transmit data at start of each slot
-
Statement True for ALOHA:
- Time is not divided into equal size slots
-
Mechanism for Controlling Medium Access in Network:
- Time is divided into slots
-
Protocols Capable of Detecting and Correcting Single-Bit Error:
- Two-dimensional parity scheme
-
Bit Pattern from CRC-12 Standard:
- 1100000001111
-
Bit Pattern from CRC-16 Standard:
- 11000000000000101
-
Bit Pattern from CRC-CCITT Standard:
- 10001000000100001
-
Bit Sequence Transmitted by CRC with Generator G(x) = x²+1:
- 10100001 111
-
Bit Sequence Transmitted by CRC with Generator G(x) = x³+1:
- 10100011101
-
Protocol for Resolving IP to MAC Addresses:
- ARP
-
Size of MAC Address:
- 48 bits
-
Size of IP v4 Address:
- 32 bits
-
Size of IP v6 Address:
- 128 bits
-
IP v6 Datagram Format with Header Size:
- 40 bytes
-
Protocol for Inter-AS Routing:
- BGP
-
Protocol for Intra-AS Routing:
- RIP, OSPF, IGRP
-
Data Unit in Physical Layer:
- Bit
-
Transmission Control Protocol (TCP) Purpose:
- Connection-oriented
-
User Datagram Protocol (UDP) Advantage:
- Low overhead
-
Port Address Size in TCP/IP:
- 16 bits
-
Protocol Used in Error Reporting:
- ICMP
-
Transport Layer Protocol for Process-to-process Delivery:
- TCP and UDP
-
Port Number Range for Ephemeral Ports:
- 1024 to 65535
-
Purpose of PUSH Flag in TCP Header:
- Indicate end of message and the message to be processed immediately
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on computer networks with this exam from the Vietnam-Korea University of Information Technology. Covering topics such as the OSI and TCP/IP models, LANs, WANs, and the history of networking, this quiz is essential for any IT student. Challenge yourself and see how well you understand the intricacies of computer networks!