Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number
Last Answer : d. Destination port number
Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum
Last Answer : (A) identification
Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above
Last Answer : Provision of sequence number in the header of message
Description : In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the ... 2789 b. First fragment, 2400 and 2759 c. Last fragment, 2400 and 2759 d. Middle fragment, 300 and 689
Last Answer : c. Last fragment, 2400 and 2759
Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above
Last Answer : c. Checksum
Description : In IPv4, which field or bit value unambiguously identifies thedatagram as a fragment? A) Donot fragment bit ?0 B) More Fragment bit ?0 C) Fragment offset = 1000 D) noneof the above
Last Answer : Fragment offset = 1000
Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A. The do not fragment bit is set to 1 for all three datagrams. B. The more fragment bit is set to 0 ... field is the same for all three datagrams. D. The offset field is the same for all three datagrams
Last Answer : C. The identification field is the same for all three datagrams.
Description : In IPv4, if the fragment offset hasa value of 100, it means that _______. A) thedatagram has notbeen fragmented B) thedatagram is 100 bytes in size C) thefirst byte of the datagram is byte100 D) the first byteof the datagram is byte800
Last Answer : the first byteof the datagram is byte800
Description : In IPv4, what is needed to determine thenumber of the last byte of a fragment? A) Identification number B) Offset number C) Total length D) (b) and (c)
Last Answer : (b) and (c)
Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length
Last Answer : b. Source address
Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above
Last Answer : Frame check sequence
Description : What is the maximum size of data that the application layer can pass on to the TCP layer below? a. Any size b. 216 bytes - size of TCP header c. 216 bytes d. 1500
Last Answer : a. Any size
Description : The TCP sliding window a. can be used to control the flow of information b. always occurs when the field value is 0 c. always occurs when the field value is 1 d. occurs horizontally
Last Answer : a. can be used to control the flow of information
Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially
Last Answer : d. increases exponentially
Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above
Last Answer : A. slow-start
Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above
Last Answer : differentiatedservices
Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields
Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field
Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D
Last Answer : c. C
Description : In Selective Repeat ARQ, if 5 is the number ofbits for the sequence number, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1
Last Answer : 16
Description : In Selective Repeat ARQ, if 5 is the number ofbits for the sequence number, then the maximum size of the send window must be _____ A) 15 B) 16 C) 31 D) 1
Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A) Thedo not fragment bit is set to 1 for all three datagrams. B) The more fragment bit ... Theidentification fieldis the same for all three datagrams. D) Theoffset field is thesame for all three datagrams
Last Answer : Theidentification fieldis the same for all three datagrams.
Description : Silly Window Syndrome is related to a. Error during transmission b. File transfer protocol c. Degrade in TCP performance d. Interface problem
Last Answer : c. Degrade in TCP performance
Description : In a Go-Back-N ARQ, if the window size is 63,what is the range of sequence numbers? A) 0to 63 B) 0to 64 C) 1to 63 D) 1to 64
Last Answer : 0to 63
Description : the maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is: a. 2^n b. 2^(n-1) c. 2^n – 1 d. 2^(n-2)
Last Answer : b. 2^(n-1)
Description : In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? A. 0 to 63 B. 0 to 64 C. 1 to 63 D. 1 to 64
Last Answer : A. 0 to 63
Description : Which of the following fields in IPv4 datagram is not related to fragmentation? (A) Type of service (B) Fragment offset (C) Flags (D) Identification
Last Answer : (A) Type of service
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : The maximum size of the data that the application layer can pass on to the TCP layer below is ......... (1) 216 bytes (2) 216 bytes + TCP header length (3) 216 bytes - TCP header length (4) 215 bytes
Last Answer : Answer: Marks to all
Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits
Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13
Last Answer : d. 13
Description : Which of the following statement is correct? A- The size and sequence of introns can be deduced from the cDNA sequence B- Restriction endonuclease can cleave ss and dsDNA both C- Restriction ... sequenceof a gene D- Amino acid sequence of a protein can be deduced from corresponding cDNA nucleotide
Last Answer : Amino acid sequence of a protein can be deduced from corresponding cDNA nucleotide
Description : Which of the following statement is correct? A- The size and sequence of introns can be deduced from the cDNA sequence B- .Restriction endonuclease can cleave ss and dsDNA both C- Restriction ... of a Gene D- Amino acid sequence of a protein can be deduced from corresponding cDNA nucleotide
Description : In IPv6, when a datagram needs tobediscarded ina congested network, the decision is basedon the _______ field in thebase header. A) hop limit B) priority C) nextheader D) noneof the above
Last Answer : priority
Description : In IPv6, the _______ field inthe baseheader restricts the lifetime ofa datagram. A) version B) next-header C) hoplimit D) neighbor-advertisemen
Last Answer : hoplimit
Description : In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400bytes? A) 428 B) 407 C) 107 D) 427
Last Answer : 428
Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id
Last Answer : b. content-transfer-encoding
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : A. 1. True, 2. true, 3. true
Description : The next header t is an _____ field of Authentication Header that identifies the type of what follows. A. 16-bit B. 64-bit C. 8-bit D. 32-bit
Last Answer : C. 8-bit
Description : The IPv4 header size _______ A. is 20 to 60 bytes long B. is always 20 bytes long C. is always 60 bytes long D. depends on the MTU
Last Answer : A. is 20 to 60 bytes long
Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 0111
Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 1110
Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Simple parity check
Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Checksum
Description : Which of the following summation operations is performed onthe bits to checkanerror-detecting code? A. Codec B. Coder-decoder C. Checksum D. Attenuation
Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Last Answer : B) IP address
Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams
Last Answer : d. Datagrams
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum