Podcast
Questions and Answers
In which layer of the OSI model does a Switch operate?
In which layer of the OSI model does a Switch operate?
Which layer of the OSI model is associated with the function of a Router?
Which layer of the OSI model is associated with the function of a Router?
What is the main purpose of the Ping command?
What is the main purpose of the Ping command?
Which command is specifically used to manage the IP address assigned to a machine?
Which command is specifically used to manage the IP address assigned to a machine?
Signup and view all the answers
What is referred to as a data unit at the physical layer?
What is referred to as a data unit at the physical layer?
Signup and view all the answers
Which layer of the OSI model performs functions similar to the Internet layer of the TCP/IP model?
Which layer of the OSI model performs functions similar to the Internet layer of the TCP/IP model?
Signup and view all the answers
How many pairs of cables does UTP (Unshielded Twisted Pair) cable have?
How many pairs of cables does UTP (Unshielded Twisted Pair) cable have?
Signup and view all the answers
What is the primary purpose of twisting the wires in twisted pair cable?
What is the primary purpose of twisting the wires in twisted pair cable?
Signup and view all the answers
Which protocol is primarily used for email transmission over the Internet?
Which protocol is primarily used for email transmission over the Internet?
Signup and view all the answers
What is the primary purpose of the transport layer in networking?
What is the primary purpose of the transport layer in networking?
Signup and view all the answers
Which combination of protocols does the transport layer utilize for Internet communication?
Which combination of protocols does the transport layer utilize for Internet communication?
Signup and view all the answers
Which transport protocol does FTP use for establishing connections?
Which transport protocol does FTP use for establishing connections?
Signup and view all the answers
Which of the following statements is accurate regarding TCP?
Which of the following statements is accurate regarding TCP?
Signup and view all the answers
In networking, what is a 'socket'?
In networking, what is a 'socket'?
Signup and view all the answers
What is the name of the socket API commonly used on Windows operating systems?
What is the name of the socket API commonly used on Windows operating systems?
Signup and view all the answers
What is considered one of the main advantages of using UDP over TCP?
What is considered one of the main advantages of using UDP over TCP?
Signup and view all the answers
Which of the following is not considered an application layer protocol?
Which of the following is not considered an application layer protocol?
Signup and view all the answers
What is the term used for a datagram at the application layer?
What is the term used for a datagram at the application layer?
Signup and view all the answers
Which of the following correctly describes an architecture paradigm?
Which of the following correctly describes an architecture paradigm?
Signup and view all the answers
The File Transfer Protocol is primarily built on which architecture?
The File Transfer Protocol is primarily built on which architecture?
Signup and view all the answers
Telnet protocol establishes a connection to which TCP port number?
Telnet protocol establishes a connection to which TCP port number?
Signup and view all the answers
Which statement accurately describes E-mail in terms of its application type?
Which statement accurately describes E-mail in terms of its application type?
Signup and view all the answers
FTP operates primarily under which architectural model?
FTP operates primarily under which architectural model?
Signup and view all the answers
What does FTP stand for in networking terminology?
What does FTP stand for in networking terminology?
Signup and view all the answers
Which of the following protocols is specifically designed for managing devices on an IP network?
Which of the following protocols is specifically designed for managing devices on an IP network?
Signup and view all the answers
Which option is not classified as an application layer protocol?
Which option is not classified as an application layer protocol?
Signup and view all the answers
What protocol is predominantly used by the application layer when displaying a web page?
What protocol is predominantly used by the application layer when displaying a web page?
Signup and view all the answers
SMTP primarily defines what aspect of message handling?
SMTP primarily defines what aspect of message handling?
Signup and view all the answers
An email client must know the _________ of its initial SMTP server to function properly.
An email client must know the _________ of its initial SMTP server to function properly.
Signup and view all the answers
When a mail server sends emails to other mail servers, it functions as a __________.
When a mail server sends emails to other mail servers, it functions as a __________.
Signup and view all the answers
Which TCP port is designated for use by the Simple Mail Transfer Protocol?
Which TCP port is designated for use by the Simple Mail Transfer Protocol?
Signup and view all the answers
What does the acronym SMTP stand for?
What does the acronym SMTP stand for?
Signup and view all the answers
Which statement accurately describes the transmission behavior in the ALOHA protocol?
Which statement accurately describes the transmission behavior in the ALOHA protocol?
Signup and view all the answers
What is the correct order of transmission efficiency for ALOHA, Slotted ALOHA, and CSMA protocols?
What is the correct order of transmission efficiency for ALOHA, Slotted ALOHA, and CSMA protocols?
Signup and view all the answers
Which random access protocol is specifically used by Ethernet?
Which random access protocol is specifically used by Ethernet?
Signup and view all the answers
Which random access protocol does the Wi-Fi network implement?
Which random access protocol does the Wi-Fi network implement?
Signup and view all the answers
In which scenario can a node transmit data immediately as per the specified medium access control mechanism?
In which scenario can a node transmit data immediately as per the specified medium access control mechanism?
Signup and view all the answers
What is the correct size of a MAC address?
What is the correct size of a MAC address?
Signup and view all the answers
Which of the following options correctly defines a MAC address?
Which of the following options correctly defines a MAC address?
Signup and view all the answers
What feature distinguishes the ALOHA protocol from other random access protocols?
What feature distinguishes the ALOHA protocol from other random access protocols?
Signup and view all the answers
Which technique is capable of detecting and correcting a single bit error?
Which technique is capable of detecting and correcting a single bit error?
Signup and view all the answers
What is the correct bit sequence to transmit using the two-dimensional parity scheme with even code and a 3x5 matrix for the original data 10101 11110 01110?
What is the correct bit sequence to transmit using the two-dimensional parity scheme with even code and a 3x5 matrix for the original data 10101 11110 01110?
Signup and view all the answers
What is the original data from the received bit sequence 101011 111100 011101 001010 using the two-dimensional parity scheme?
What is the original data from the received bit sequence 101011 111100 011101 001010 using the two-dimensional parity scheme?
Signup and view all the answers
What is the bit pattern from the international standards generator for CRC-12 expressed as $x^{12} + x^{11} + x^3 + x^2 + x + 1$?
What is the bit pattern from the international standards generator for CRC-12 expressed as $x^{12} + x^{11} + x^3 + x^2 + x + 1$?
Signup and view all the answers
Which of the following is the correct bit pattern for the CRC-16 generator $x^{16} + x^{15} + x^2 + 1$?
Which of the following is the correct bit pattern for the CRC-16 generator $x^{16} + x^{15} + x^2 + 1$?
Signup and view all the answers
What is the bit pattern for CRC-CCITT given the polynomial $x^{16} + x^{12} + x^{5} + 1$?
What is the bit pattern for CRC-CCITT given the polynomial $x^{16} + x^{12} + x^{5} + 1$?
Signup and view all the answers
What bit sequence is transmitted using the Cyclic Redundancy Check (CRC) with Generator $G(x) = x^{3}+1$ for the original data 10100001?
What bit sequence is transmitted using the Cyclic Redundancy Check (CRC) with Generator $G(x) = x^{3}+1$ for the original data 10100001?
Signup and view all the answers
In what scenario can the two-dimensional parity scheme be ineffective?
In what scenario can the two-dimensional parity scheme be ineffective?
Signup and view all the answers
Study Notes
Exam Information
- Exam title: Computer Network Exam
- Semester: 1
- Academic year: 2021-2022
- Institution: University of Information Technology and Communication (Vietnam-Korea)
Exam Questions
-
Question 1: A computer network is
- A collection of hardware components and computers.
- Interconnected by communication channels.
- Sharing of resources and information.
- All of the above.
-
Question 2: Which network is considered the first computer network?
- ARPANET
-
Question 3: How many layers does the OSI Model have?
- 7
-
Question 4: Which OSI layers are host-to-host layers?
- Transport, Session, Presentation, and Application
-
Question 5: How many layers are in the TCP/IP model?
- 4
-
Question 6: A computer network spanning states, countries, or the whole world is a
- WAN
-
Question 7: A computer network operating within a building or campus is a
- LAN
-
Question 8: Which OSI layer deals with the syntax and semantics of information?
- Presentation
-
Question 9: Which OSI layer determines how packets are routed between source and destination?
- Network
-
Question 10: Which OSI layers perform the same function as the Application layer in the TCP/IP model?
- Session, Presentation, and Application
-
Question 11: Which OSI layer provides inter-network connectivity?
- Network
-
Question 12: What is a function of the Data Link layer?
- Provides error detection and correction
-
Question 13: Arrange the OSI data units in top-down order
- Data, Segment, Packet, Frame, Bit
-
Question 14: How are networks classified by scale?
- PAN, LAN, MAN, WAN
-
Question 15: How are networks classified by function?
- Peer-to-Peer, Client-Server
-
Question 16: Which type of network is used when transmitting messages from a single sender to all endpoints?
- Broadcast
-
Question 17: What is a set of rules that dictates how data is formatted, transmitted, and received?
- Protocol
-
Question 18: What is the commonly used unit for measuring data transmission speed?
- Bits per second
-
Question 19: Describe a network that is inflexible once a path is established
- Circuit Switching
-
Question 20: Describe a flexible network where packets can take different routes to reach their destination.
- Packet Switching
-
Question 21: Which layer does a Hub operate in the OSI model?
- Physical layer
-
Question 22: Which layer does a Switch operate in the OSI model?
- Data Link layer
-
Question 23: Which layer does a Router operate in the OSI model?
- Network layer
-
Question 24: What is the purpose of the Ping command?
- To test if a device on the network is reachable
-
Question 25: Which command manages IP address settings?
- Ipconfig
-
Question 26: What is the data unit at the physical layer?
- Bit
-
Question 27: Which OSI layer performs the same function as the Internet layer in TCP/IP model?
- Network
-
Question 28: How many pairs of wires does a UTP cable have?
- 4 pairs
-
Question 29: Why are the wires in a twisted-pair cable twisted?
- To reduce cross-talk interference
-
Question 30: How is a twisted-pair cable UTP classified?
- By length of twist
-
Question 31: Category 5e UTP cable is commonly used in which network type?
- Ethernet
-
Question 32: Maximum length of a single UTP cable for data communication
- 100 meters
-
Question 33: Maximum length of a single coaxial cable for data communication
- 500 meters
-
Question 34: Maximum length of a single fiber optic cable for data communication
- 2 kilometers
-
Question 35: Which cable type is not affected by electromagnetic interference?
- Fiber optic cable
-
Question 36: Which physical phenomenon is used in fiber optic transmission?
- Total internal reflection
-
Question 37: Which cable type is frequently used for cable television?
- Coaxial cable
-
Question 38: Which device increases signal power and retransmits it?
- Repeater
-
Question 39: Which radiations are used for communication?
- Radio waves, microwaves, infrared radiation, visible light, ultraviolet radiation, X-rays, and gamma rays
-
Question 40: What are some applications of radio waves?
- Radar, radio, television, communication, microwave ovens, and sterilization
-
Question 41: Which waves are commonly used in remote controls?
- Infrared waves
-
Question 42: Which of the given waves is omnidirectional (radio, microwave, infrared)?
- Radio Waves
-
Question 43: Which of the given waves is directional (radio, microwave, infrared)?
- Microwaves, Infrared
-
Question 44: What are the differences between wired and wireless networks?
- Mobility, Security, Speed
-
Question 45: What is the process of encoding bits into signals?
- Digital line coding
-
Question 46: What technique combines multiple signals into one signal?
- Multiplexing
-
Question 47: What technique converts a multi-signal stream back to individual signals?
- De-multiplexing
-
Question 48: Which cable is used to connect computers to switches?
- Straight-through cable
-
Question 49: Which cable is typically used to connect computers directly?
- Crossover cable
-
Question 50: What are the colors for the T568A standard?
- White/Green, Green, White/Orange, Orange, White/Blue, Blue, White/Brown, Brown and other combinations
-
Question 51: What are the differences between wiring codes T568A and T568B?
- Color code differences of the wires
-
Question 52: What metrics measure data transfer speed?
- bps, Mb/s, and Tb/s
-
Question 53: What does bps stand for?
- Bits per second
-
Question 54: Which OSI layer controls transmission errors?
- Data Link layer
-
Question 55: What function of a data link layer helps prevent receiver overload?
- Flow control
-
Question 56: What is the data unit on the data link layer?
- Frame
-
Question 57: How many bits are in a MAC address?
- 48 bits
-
Question 58: Which of the given addresses is a physical address?
- Example: 0F-1F-2F-3F-4F-5F
-
Question 59: What is a unique identifier for a network interface controller?
- MAC address
-
Question 60: Determine the bit sequence for transmitted data using flag bytes in the framing technique.
- Example output: 00001111 01111110 00001111 00110011 01111110
-
Question 61: Determine the bit sequence for transmitted data using flag bytes in the framing technique.
- Example output: Example 10000011 00001111 01111110
-
Question 62: Determine the original data from a bit sequence given.
- Example output: 10111110 00001111 01111110 00110011
-
Questions 63-72: Determine the bit sequence for transmitted data using single bit parity schemes with even/odd code.
- Example output: 0110001011111. In total there are 6 questions
- Question 73: What is the bit pattern from the international standard generator CRC-12?
- Example bit pattern: 1100000001111
-
Questions 74-75: Questions to determine bit patterns based on international standard generators CRC-16 and CRC-CCITT
- Example answers are bit patterns
-
Question 76: Determine the bit sequence transmitted using the CRC technique with Generator G(x) = x²+1
- Example output: 10100001 111
-
Question 77: Determine the bit sequence transmitted using the CRC technique with Generator G(x) = x³+1
- Example Output: 10100011 101
-
Question 78: Which protocol is responsible for translating IP addresses to MAC addresses?
- ARP
-
Question 79: Which device forwards data based on destination MAC address?
- Switch
-
Question 80: Which characteristic describes a switch?
- Plug-and-play and self-learning
-
Question 81: Which method controls multiple accesses in a network?
- Random access
-
Question 82: Which random access protocols does the Ethernet apply?
- CSMA/CD
-
Question 83: Which statements are true for Slotted ALOHA?
- Time is divided into equal size slots, nodes transmit data at the start of each slot
-
Question 84: Which statements are true for ALOHA protocol?
- Time is not divided into equal size slots, the node immediately transmits data once it has data.
-
Question 85: What is the order of efficiency of ALOHA, Slotted ALOHA, and CSMA protocols?
- ALOHA – Slotted ALOHA – CSMA
-
Question 86: Which random access protocol does Ethernet use?
- CSMA/CD
-
Question 87: Which random access protocol does Wi-Fi use?
- CSMA/CA
-
Question 88: Which network mechanism fits the "idle for DIFS" condition?
- Wi-Fi
-
Question 89: What is the size of a MAC address in bits?
- 48 bits
-
Question 90: Which of the given addresses is a MAC address?
- Example: 0F-1F-2F-3F-4F-5F
-
Question 91: What does the ARP protocol do?
- Translates IP addresses to MAC addresses
-
Question 92: In Slotted ALOHA, where can collisions happen?
- Beginning of the slot
-
Question 93: What is the efficiency comparison between Slotted ALOHA and ALOHA?
- Slotted ALOHA efficiency is double that of ALOHA
-
Question 94: Describe the exponential back-off algorithm in CSMA/CA
- The algorithm delays transmission to avoid collisions
-
Question 95: How does the FDMA manage an idle frequency band?
- Leave it idle
-
Question 96: How does TDMA manage an idle time slot?
- Leave it idle
-
Question 97: Which standard is recommended for Wi-Fi networks?
- IEEE 802.11
-
Question 98: Which standard is recommended for Ethernet?
- IEEE 802.3
-
Question 99: Which standard is recommended for WiMAX networks?
- IEEE 802.16
-
Question 100: What is the purpose of the preamble in Ethernet frames?
- To synchronize the receiver's clock with the sender's clock
- Question 101: Calculate network and broadcast addresses given an IP address and subnet mask.
- Question 102: Calculate network and broadcast addresses given an IP address and subnet mask.
- Question 103: Calculate available IP addresses given a network address.
-
Question 104: What planes are organized on a network layer?
- control plane, data plane, and link layer
- Question 105: Calculate the average buffer size for a router.
- Question 106: Calculate the average buffer size for a router.
-
Question 107: What is the size of an IPv4 address in bits?
- 32 bits
-
Question 108: Which field determines IP packet priority?
- Type-of-service (TOS) field
-
Question 109: What is the size of the checksum field in an IPv4 header?
- 16 bits
-
Question 110: What is included in checksum computation for IPv4 header?
- IPv4 header only
- Question 111: Convert an IPv4 address to binary format.
-
Question 112: What are the parts of an IPv4 address format?
- Network and host
-
Question 113: Identify special IPv4 addresses
- Example: 0.0.0.0, 127.0.0.1,
-
Question 114: Which is the loopback address?
- 127.0.0.1
-
Question 115: What is the packet scheduling method in a router?
- First-In-First-Out (FIFO)
-
Question 116: What does a TTL value of 100 mean in an IP packet?
- Packet can traverse a maximum of 100 hops
-
Question 117: What is the size of an IPv4 header?
- 20 bytes
- Question 118: Calculate the number of segments needed to send a 4000-byte datagram over a link with a 1500-byte MTU.
-
Question 119: What Boolean operator does a router use for network address calculations?
- AND
-
Question 120: Given the subnet mask 255.255.255.192, calculate the number of subnets that can be created for a class C network
- 4
-
Question 121: Identify private IP addresses
- Example output: 10.10.10.1, 172.16.0.1, 192.168.1.2
-
Question 122: What server automatically assigns IP addresses?
- DHCP
-
Question 123: Which router function translates IP addresses between networks?
- NAT
-
Question 124: What is the size of an IPv6 address?
- 128 bits
-
Question 125: State the correct statement about IPv6 datagram format
- The IPv6 datagram format has a 40-byte fixed-length header
-
Question 126: Which statement is correct for fragmentation in IPv6?
- Fragmentation is not allowed
-
Question 127: How many 8-bit octets are in an IPv6 address?
- 16
-
Question 128: What does a routing algorithm seek when determining a path for forwarding?
- The least-cost path between source and destination
-
Question 129: Categorize the Dijkstra routing algorithm
- Link-state routing algorithm
- Question 130: Categorize the Bellman-Ford Routing Algorithm
- Distance vector routing protocol
-
Question 131: Which nodes are selected for routing table after the 2nd round with the Dijkstra algorithm on a specific network graph?
- Example Output: u,w
-
Question 132: Which problem might occur in the Dijkstra routing algorithm?
- Routing oscillation
-
Question 133: What is an appropriate statement for Bellman-Ford Routing?
- Each node constructs its distance vector based on routing information from neighboring nodes
-
Question 134: What is a potential problem with the Bellman-Ford routing algorithm?
- Count-to-infinity problem
- Question 135: How many iterations are needed for Bellman-Ford Routing to reach stable state if a link cost changes (on a given graph)
-
Question 136: State suitable intra-AS routing protocols.
- RIP, OSPF, IGRP
-
Question 137: Name a suitable inter-AS routing protocol
- BGP
-
Question 138: Which protocol handles error reporting in a network?
- ICMP
-
Question 139: Which statement accurately describes network management frameworks?
- A managed device contains a database of managed objects with the data stored in the Management Information Base(MIB)
-
Question 140: Describe the use modes of the SNMP protocol that convey information to and from the Management Information Base (MIB).
- Request and response, and trap modes
-
Question 141: Which layer receives aggregated data after the transport layer processing?
- The network layer
-
Question 142: Which layer is responsible for receiving data from transport layer?
- Network layer
-
Question 143: Which protocols are used in the transport layer?
- TCP, UDP
-
Question 144: State a correct statement for the transmission control protocol (TCP).
- TCP is a connection-oriented protocol, uses three-way handshake, and receives data from the application layer as a single stream.
-
Question 145: Define the term endpoint in the context of two-way network communications.
- Socket
-
Question 146: Which one is a UDP version with congestion controls?
- Datagram congestion control protocol
-
Question 147: What does transport layer communication deal with?
- Application to application communication
-
Question 148: What are temporary/private port numbers in range 49,152 to 65,535 called
- Registered ports
-
Question 149: Which protocol operates at the transport layer?
- Stream control transmission protocol
-
Question 150: What field is used in UDP headers to find errors in user datagrams?
- Checksum
-
Question 151: How many bits does a port address in a TCP/IP protocol take?
- 16 bits
-
Question 152: Describe a protocol that only adds port address, checksum, length data from higher layers
- UDP
-
Question 153: Which layer is responsible for message delivery between processes?
- Transport Layer
-
Question 154: What needs to be considered for correct application delivery of a message
- Port number
-
Question 155: Which service uses TCP?
- SMTP
-
Question 156: Which layer is responsible for process-to-process delivery?
- Transport layer
-
Question 157: Which transport layer protocols handle communications?
- UDP and TCP
-
Question 158: What protocol in FTP transmits data to a server?
- TCP
-
Question 159: What does the TCP protocol use that specifies communication between processes?
- Connection oriented protocol, uses three-way handshake, and receives data from application
-
Question 160: What is the endpoint for inter-process communication called
- Socket
-
Question 161: What is another name for socket API on Windows
- Winsock
-
Question 162: What is the main advantage of UDP?
- Low overhead
-
Question 163: Define the term used for a transport service access point in TCP
- Port
-
Question 164: What is the primary use of the expanded address in frame relay networks?
- The expanded address increases the range of data link connection identifiers
-
Question 165: What term describes an attempt to block access to a network resource?
- Denial-of-service attack
-
Question 166: Which protocol offers reliable communication?
- TCP
-
Question 167: What protocol provides connection-oriented service for sending messages?
- TCP
-
Question 168: Which protocol is defined in the transport layer?
- TCP, UDP
-
Question 169: What does the port number in a TCP connection specify?
- The communication process on both ends of the connection
-
Question 170: Specify the usual range of ephemeral ports.
- 1024 to 65535
-
Question 171: What is the function of the PUSH flag in a TCP header?
- Indicates the end of a message or the need to transmit the entire message immediately
-
Question 172: Define an application layer protocol not defined within the context of previously given questions
- TCP
-
Question 173: What is another name for a datagram at application layer
- Message
-
Question 174: What are architectural paradigms for networks?
- Client/server and Peer to Peer
-
Question 175: Describe the architecture of a file transfer protocol
- Client server
-
Question 176: What Telnet port is commonly used to establish a connection?
- TCP port 23
-
Question 177: Define an application that is described by its loss tolerance and less sensitivity to the bandwidth
- Elastic application
-
Question 178: On which architecture is FTP built upon?
- Client-server architecture
-
Question 179: Define FTP
- File Transfer Protocol
-
Question 180: What is the standard unit for data transfer in telnet operations?
- 8 bits
-
Question 181: Define a time-sensitive service in the context of networks
- Internet telephony
-
Question 182: Describe the available services for applications within a network.
- Reliable data transfer, timing, and security
-
Question 183: Which protocol is used by email services?
- SMTP
-
Question 184: Define a service used in internet that translates domain names to IP addresses
- Domain Name System (DNS)
-
Question 185: Define a protocol where a user on one site connects to another site for remote access
- TELNET
-
Question 186: What does application layer protocols define?
- Types of messages, their formats, process rules for sending and receiving messages
-
Question 187: What is a name for encoding of binary data in ASCII format?
- Base 64 encoding
-
Question 188: Which protocol delivers mail to receiver servers?
- SMTP (Simple Mail Transfer Protocol)
-
Question 189: Define a protocol that manages devices on IP networks
- SNMP (Simple Network Management Protocol)
-
Question 190: State one Application layer protocol not present in previously generated questions
- Resource Reservation Protocol (RSVP)
-
Question 191: What protocol is used for displaying webpages?
- HTTP
-
Question 192: List what SMTP defines in its description.
- Message transport
-
Question 193: What information does an email client need about its mail server
- IP address
-
Question 194: What action does a mail server perform when sending mail to other mail servers?
- Acts as an SMTP client
-
Question 195: What TCP port is associated with SMTP?
- Port 25
-
Question 196: Give the full name of SMTP
- Simple Mail Transfer Protocol
-
Question 197: Define an application service that encompasses network virtual terminal, file transfer, and mail services
- All of the mentioned services
-
Question 198: What does SMTP not use for delivery?
- User's word processor
-
Question 199: What encoding is required for multimedia data sent over SMTP?
- ASCII encoding
-
Question 200: For FTP connections, what are the functions of port 21 and port 20?
- Port 21: Control connection, Port 20: Data connection
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the OSI model and networking concepts with this quiz. Evaluate your understanding of layers, protocols, and essential commands used in network management. Each question challenges you to recall key networking principles.