Computer Network Exam 2021-2022
47 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the bit size of all telnet operations sent?

  • 16 bits
  • 32 bits
  • 8 bits (correct)
  • 4 bits

Which of the following is categorized as a time-sensitive service?

  • File download
  • File transfer
  • Internet telephony (correct)
  • E-mail

What type of transport services are available to applications?

  • Timing
  • All of the mentioned (correct)
  • Reliable data transfer
  • Security

Which application layer protocol is used for email services?

<p>SMTP (A)</p> Signup and view all the answers

What component translates internet domain and host names to IP addresses?

<p>Domain name system (B)</p> Signup and view all the answers

Which protocol enables a user to establish a connection to a remote host while passing keystrokes?

<p>TELNET (A)</p> Signup and view all the answers

What does the application layer protocol define?

<p>All of the mentioned (C)</p> Signup and view all the answers

What is the name of the ASCII encoding of binary data?

<p>Base 64 encoding (D)</p> Signup and view all the answers

Category 5e UTP cable is most often used in which type of network?

<p>Ethernet (C)</p> Signup and view all the answers

What is the maximum end-to-end cable length of a single UTP cable sufficient for data communication?

<p>100m (D)</p> Signup and view all the answers

What is the maximum end-to-end cable length of a single fiber optic cable sufficient for data communication?

<p>2 km (A)</p> Signup and view all the answers

Which of the following cables is not affected by electromagnetic interference?

<p>Fiber optic cable (A)</p> Signup and view all the answers

Which physical phenomenon is applied in optical fiber transmission?

<p>Total internal reflection (C)</p> Signup and view all the answers

Which cable is usually used for cable television?

<p>Coaxial cable (A)</p> Signup and view all the answers

Which device is used for increasing the power of a signal and retransmitting it?

<p>Repeater (C)</p> Signup and view all the answers

Which types of radiation can be used for communication?

<p>All of the mentioned answers (D)</p> Signup and view all the answers

Transport layer protocols primarily facilitate which type of communication?

<p>Node to node communication (D)</p> Signup and view all the answers

What term describes the port numbers ranging from 49,152 to 65,535?

<p>Registered ports (D)</p> Signup and view all the answers

Which of the following is a recognized protocol at the transport layer?

<p>Stream control transmission protocol (B)</p> Signup and view all the answers

Which field is utilized to identify errors across the entire user datagram?

<p>Checksum (B)</p> Signup and view all the answers

How many bits long is a port address in TCP/IP?

<p>16 (C)</p> Signup and view all the answers

Which protocol adds port addresses, checksum error control, and length information to the upper layer data?

<p>UDP (D)</p> Signup and view all the answers

Which layer is tasked with delivering messages from one process to another?

<p>Transport layer (C)</p> Signup and view all the answers

To correctly route a message to the appropriate application on a host, what address must be referenced?

<p>Port address (A)</p> Signup and view all the answers

Which of the following services uses TCP?

<p>SMTP (D)</p> Signup and view all the answers

Which layer is responsible for process to process delivery?

<p>Transport layer (D)</p> Signup and view all the answers

Which protocols does the transport layer use for communication over the Internet?

<p>TCP and UDP (C)</p> Signup and view all the answers

In FTP protocol, which transport protocol is used by a client to contact a server?

<p>Transmission Control Protocol (C)</p> Signup and view all the answers

Which of the following statements is true for TCP?

<p>All of the mentioned (C)</p> Signup and view all the answers

What is the term for an endpoint of an inter-process communication flow across a computer network?

<p>Socket (B)</p> Signup and view all the answers

What is the name of the socket-style API for Windows?

<p>Winsock (A)</p> Signup and view all the answers

What is the main advantage of UDP?

<p>Low overhead (A)</p> Signup and view all the answers

What is a computer network defined as?

<p>A collection of hardware components and computers. (A)</p> Signup and view all the answers

Which network is recognized as the first computer network?

<p>ARPANET (C)</p> Signup and view all the answers

How many layers are there in the OSI Model?

<p>7 (D)</p> Signup and view all the answers

Which layers of the OSI model are considered host-to-host layers?

<p>Transport, Session, Presentation, Application. (B)</p> Signup and view all the answers

In the OSI model, the Session layer is responsible for which of the following?

<p>Establishing, managing, and terminating connections. (D)</p> Signup and view all the answers

What primary function does the Transport layer serve in the OSI model?

<p>Data segmentation and transport reliability. (D)</p> Signup and view all the answers

Which of these describes a characteristic of ARPANET?

<p>It was the first to use packet switching technology. (A)</p> Signup and view all the answers

What does the term 'data encapsulation' signify in the OSI model?

<p>Wrapping data to include headers and trailers as it moves up and down through network layers. (A)</p> Signup and view all the answers

Which technique is capable of detecting and correcting a single bit error?

<p>Two-dimensional parity scheme (D)</p> Signup and view all the answers

Given the original data 10101 11110 01110, what is the bit sequence transmitted using two-dimensional parity scheme?

<p>101011 111100 011101 001010 (A)</p> Signup and view all the answers

What is the original data derived from the received bit sequence 101011 111100 011101 001010 using two-dimensional parity?

<p>10101 11110 01110 00101 (B)</p> Signup and view all the answers

What is the bit pattern generated by the CRC-12 polynomial x^12 + x^11 + x^3 + x^2 + x + 1?

<p>1100000001111 (A)</p> Signup and view all the answers

What is the bit pattern from the international standards generator CRC-16 = x^16 + x^15 + x^2 + 1?

<p>11000000000000101 (C)</p> Signup and view all the answers

Which bit pattern corresponds to the generator polynomial CRC-CCITT = x^16 + x^12 + x^5 + 1?

<p>10001000000100001 (C)</p> Signup and view all the answers

What is the transmitted bit sequence for the original data 10100001 using CRC technique with G(x) = x^3 + 1?

<p>10100001 111 (D)</p> Signup and view all the answers

Flashcards

Computer Network Definition

A computer network is a collection of interconnected hardware components and computers that share resources and information through communication channels.

First Computer Network

ARPANET was the first computer network.

OSI Model Layers

The OSI model has 7 layers.

Host-to-Host Layers in OSI

The Transport, Session, Presentation, and Application layers are host-to-host layers in the OSI model.

Signup and view all the flashcards

Networking Components

Hardware components and computers interconnected by communication channels for resource sharing and information exchange.

Signup and view all the flashcards

ARPANET

A milestone early computer network.

Signup and view all the flashcards

OSI Model

A conceptual framework that categorizes networking functions.

Signup and view all the flashcards

Transport Layer

Manages data transmission between applications.

Signup and view all the flashcards

UTP Cable Use

Category 5e Unshielded Twisted Pair (UTP) cable is primarily used in Ethernet networks for data transmission.

Signup and view all the flashcards

UTP Cable Length

The maximum end-to-end length for a single UTP cable in a computer network is 100 meters.

Signup and view all the flashcards

Coaxial Cable Length

The maximum end-to-end length for a single coaxial cable in a computer network is 500 meters.

Signup and view all the flashcards

Fiber Optic Cable Length

The maximum end-to-end length for a single fiber optic cable in a computer network is 1 kilometer.

Signup and view all the flashcards

Fiber Optic Advantage

Fiber optic cables are not affected by electromagnetic interference, making them ideal for environments with high electrical noise.

Signup and view all the flashcards

Fiber Optic Mechanism

Fiber optic transmission relies on the principle of total internal reflection, where light signals bounce within the cable's core, minimizing signal loss.

Signup and view all the flashcards

Cable TV Cable

Coaxial cable is commonly used for cable television signal transmission.

Signup and view all the flashcards

Repeater Function

A repeater amplifies and retransmits network signals to extend the communication range.

Signup and view all the flashcards

Single Bit Error Detection

A technique that can identify and correct errors caused by a single bit flipping in data transmission.

Signup and view all the flashcards

Two-Dimensional Parity Scheme

A method that uses a grid-like arrangement of data bits and parity bits to detect and correct errors in data transmission.

Signup and view all the flashcards

Cyclic Redundancy Check (CRC)

A technique using mathematical calculations to detect errors in data transmission by adding a checksum to the data.

Signup and view all the flashcards

CRC-12 Generator

A specific polynomial used in Cyclic Redundancy Check (CRC) to generate a checksum for detecting errors in transmitted data.

Signup and view all the flashcards

CRC-16 Generator

A specific polynomial used in Cyclic Redundancy Check (CRC) to generate a checksum for detecting errors in transmitted data.

Signup and view all the flashcards

CRC-CCITT Generator

A specific polynomial used in Cyclic Redundancy Check (CRC) to generate a checksum for detecting errors in transmitted data.

Signup and view all the flashcards

Two-Dimensional Parity Scheme Calculation

Calculating the parity bits (0 or 1) for each row and column in a grid-like arrangement of data using even or odd parity rules.

Signup and view all the flashcards

Data Transmission with CRC

Adding a calculated checksum (CRC) to the original data before transmission to detect errors at the receiving end.

Signup and view all the flashcards

Transport Layer Function

The Transport layer is responsible for delivering data between applications on different hosts (computers) in a network.

Signup and view all the flashcards

Process-to-Process Communication

The Transport layer protocol acts as a communication bridge between processes (like applications) running on separate computers.

Signup and view all the flashcards

TCP/IP Port Address Length

A port address in the TCP/IP protocol is 16 bits long.

Signup and view all the flashcards

UDP Protocol

UDP (User Datagram Protocol) is a transport layer protocol that provides a basic, connectionless, unreliable way to transmit data between applications.

Signup and view all the flashcards

Checksum Field in UDP

The checksum field in the UDP header is used to detect errors over the entire user datagram.

Signup and view all the flashcards

Dynamic Port Numbers

Ports ranging from 49,152 to 65,535 are called dynamic ports and are used for temporary or private connections.

Signup and view all the flashcards

TCP vs. UDP

Both TCP and UDP are transport layer protocols, but TCP provides reliable, connection-oriented communication while UDP is connectionless and less reliable.

Signup and view all the flashcards

What does the Transport layer do?

The Transport layer ensures reliable data transmission between processes running on different hosts. It also provides a mechanism for congestion control to manage traffic flow.

Signup and view all the flashcards

What is a socket?

A socket is an endpoint for communication between applications over a network. It's like a virtual connector that allows two programs to exchange data.

Signup and view all the flashcards

Transport Layer Role

The Transport Layer in the network model is responsible for delivering data between applications on different devices. It ensures reliable and efficient transmission.

Signup and view all the flashcards

Why use TCP in FTP?

FTP uses TCP because it requires a reliable connection to transfer files without errors or data loss. TCP ensures that all the data arrives in the correct order.

Signup and view all the flashcards

TCP Key Features

TCP is connection-oriented, uses a 3-way handshake to establish a connection, and delivers data as a single stream.

Signup and view all the flashcards

Winsock

Winsock is a socket-style API for Windows operating systems. It's a set of rules and functions that allow programs to communicate over networks.

Signup and view all the flashcards

UDP's Advantage

UDP's primary advantage is low overhead, which means it's fast and efficient for real-time applications that don't require guaranteed delivery, like streaming.

Signup and view all the flashcards

Process to Process Delivery

The Transport Layer is responsible for delivering data directly between applications on different devices, ensuring data gets delivered in the right order and without errors.

Signup and view all the flashcards

Telnet Operations

Telnet operations are transmitted as 8 bits of data.

Signup and view all the flashcards

Time-Sensitive Service

Internet telephony is a time-sensitive service because it requires real-time communication, like a phone call.

Signup and view all the flashcards

Transport Services

Transport services like reliable data transfer, timing, and security are essential for applications to communicate effectively.

Signup and view all the flashcards

Email Service Protocol

The Simple Mail Transfer Protocol (SMTP) is used by email services to send and receive messages.

Signup and view all the flashcards

Domain Name System (DNS)

DNS translates domain and host names, like 'google.com', into numerical IP addresses that computers use to communicate.

Signup and view all the flashcards

Telnet's Function

Telnet allows a user to connect to another site and send keystrokes to control a remote computer.

Signup and view all the flashcards

Application Layer Protocols

Application layer protocols define the format, syntax, and rules for communication between applications.

Signup and view all the flashcards

ASCII Encoding of Binary Data

Base 64 encoding translates binary data into a text-based format that can be easily transmitted and stored.

Signup and view all the flashcards

Study Notes

Exam Information

  • Exam title: Computer Network
  • Exam date: 2021-2022
  • Institution: Computer Network (Trường Đại học Công nghệ Thông tin và Truyền thông Việt - Hàn)

Questions and Answers

  • Question 1: Computer network is a collection of hardware components and computers interconnected by communication channels, sharing resources and information.
  • Question 2: ARPANET is considered the first computer network.
  • Question 3: The OSI model has 7 layers.
  • Question 4: The host-to-host layers in the OSI model include Transport, Session, Presentation, and Application layers.
  • Question 5: TCP/IP model has 4 layers.
  • Question 6: A computer network operating across states, countries, or the whole world is called a Wide Area Network (WAN).
  • Question 7: A Local Area Network (LAN) operates within a building or campus.
  • Question 8: Presentation Layer in OSI model is responsible for the syntax and semantics of transmitted information.
  • Question 9: The Network Layer in OSI model determines how packets are routed from source to destination.
  • Question 10: The OSI model layers that function the same as the application layer in TCP/IP are Session, Presentation, and Application.
  • Question 11: The Network layer of the OSI model is responsible for inter-network connectivity.
  • Question 12: A function of the Data Link Layer includes providing error detection and correction.
  • Question 13: Data, Segment, Packet, Frame, Bit is the correct arrangement of data units in the OSI model (top-down approach).
  • Question 14: Networks are classified by scale as PAN, LAN, MAN, and WAN.
  • Question 15: Networks are classified by function as peer-to-peer and client-server.
  • Question 16: A broadcast network transmits messages from a single sender to all endpoints.
  • Question 17: A protocol is a set of rules dictating how data is formatted, transmitted, and received.
  • Question 18: A common unit for data transmission speed is bits per second (bps).
  • Question 19: Circuit switching is inflexible, establishing a fixed path for transmission.
  • Question 20: Packet switching is flexible as packets can take different routes.
  • Question 21: A hub operates at the Physical layer of the OSI model.
  • Question 22: A switch operates at the Data Link layer of the OSI model.
  • Question 23: A router operates at the Network layer of the OSI model.
  • Question 24: The Ping command checks if a device on the network is reachable.
  • Question 25: Ipconfig is used to manage IP addresses assigned to a machine.
  • Question 26: A data unit on the physical layer is a bit.
  • Question 27: The network layer in the OSI model performs the same function as the internet layer in TCP/IP.
  • Question 28: UTP cable typically has four pairs of wires.
  • Question 29: Twisted pairs in cables reduce cross-talk interference.
  • Question 30: Twisted pair cables are classified by length of twist.
  • Question 31: Category 5e UTP cable is commonly used in Ethernet networks.
  • Question 32: The maximum cable length of a single UTP cable for data communication is 100 meters (approximately).
  • Question 33: The maximum end-to-end cable length of a single coaxial cable is 500 meters (approximately).
  • Question 34: Fiber optic cable has a maximum cable length of 2 kilometers (approximately).
  • Question 35: Fiber optic cable is not affected by electromagnetic interference.
  • Question 36: Total internal reflection is a phenomenon used in optical fiber transmission.
  • Question 37: Coaxial cable is commonly used for cable television.
  • Question 38: A repeater increases signal power and retransmits it.
  • Question 39: Radio waves, microwaves, and infrared radiation are used for communication.
  • Question 40: Radio waves are used for radar, radio and TV communication, microwave ovens, and sterilization.
  • Question 41: Infrared waves are commonly used in remote controls.
  • Question 42: Radio waves (1) are omnidirectional.
  • Question 43: Microwaves (2) and Infrared waves (3) are directional.
  • Question 44: Wired and Wireless networks differ in mobility, security, and speed.
  • Question 45: Digital line coding is the process of encoding bits into signals.
  • Question 46: Multiplexing combines multiple signals into one signal over a shared medium.
  • Question 47: Demultiplexing separates multiple signals back into their original unrelated signals.
  • Question 48: Straight-through cables connect computers to switches.
  • Question 49: Crossover cables connect similar devices directly.
  • Question 50: Color code for T568A standard.
  • Question 51: Wiring codes T568A and T568B differ in wire color codes.
  • Question 52: Metrics for data transfer speed include bits per second (bps), megabits per second (Mbps), and gigabits per second (Gbps).
  • Question 53: bps stands for bits per second.
  • Question 54: The Data Link layer controls transmission errors.
  • Question 55: Data link layer helps slow receivers to not be swamped by fast senders by regulating flow of data.
  • Question 56: A data unit on the data link layer is a frame.
  • Question 57: MAC address has 48 bits.
  • Question 58: 0F-1F-2F-3F-4F-5F is a physical address.
  • Question 59: A MAC address is a unique identifier for a network interface controller.
  • Question 60-61, 63-64, 66-67: (These require specific data inputs, so cannot provide a concise answer here).
  • Question 70: Two-dimensional parity scheme is capable of detecting and correcting single bit errors.
  • Question 71-72: (These require specific data inputs, so cannot provide a concise answer here).
  • Question 73-77: (These require specific data inputs, so cannot provide a concise answer here).
  • Question 78: ARP is responsible for resolving IP addresses to MAC addresses.
  • Question 79: A switch forwards data based on destination MAC addresses.
  • Question 80: A switch is characterized by plug-and-play and self-learning capabilities.
  • Question 81: Random access methods for controlling multiple accesses in a network often use channel partitioning, random access, token passing, or no need for access control.
  • Question 82: ALOHA is a random access protocol used in some computer networks.
  • Question 83, 84, 85: Information regarding slotted ALOHA and CSMA protocols.
  • Question 86: CSMA/CD (Carrier Sense Multiple Access with Collision Detection)is used by Ethernet.
  • Question 87: CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is used by Wi-Fi.
  • Question 88: Wi-Fi network uses a mechanism where a node can transmit data immediately when the medium is idle for longer than DIFS (Distributed Inter-Frame Space).
  • Questions 89-170 Answer included, but too extensive to include all details here.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on computer networks with this quiz, covering foundational concepts like the OSI model, TCP/IP architecture, and types of networks. Challenge yourself with questions about ARPANET, data transmission layers, and more. Ideal for students in Computer Network courses or related fields.

More Like This

OSI Model and Network Types Quiz
12 questions

OSI Model and Network Types Quiz

MindBlowingCharacterization avatar
MindBlowingCharacterization
Network Types and Models Quiz
16 questions
Computer Networks - Unit 1
13 questions
Computer Network Concepts and Models
46 questions

Computer Network Concepts and Models

InnocuousPhiladelphia5786 avatar
InnocuousPhiladelphia5786
Use Quizgecko on...
Browser
Browser