You are on page 1of 30

Page 1 of 30

COMPUTER NETWORKS:

A computer network is a group of two or more computers connected to each other.


Usually, this means that the speed of the connection is fast - faster than your
connection to the Internet. In fact, two computers connected over the Internet are
not considered a computer network.

USES OF COMPUTER NETWORKS:

Resource sharing: A network is needed because of the desire to make all programs,
data, and equipment available to anyone on the network without regard to the
physical location of the resource and the user. Load sharing is another aspect of
resource sharing.
High reliability: A network may have alternative sources of supply (e.g.,
replicated files, multiple CPUs, etc.). In case of one resource failure, the
others could be used and the system continues to operate at reduced
performance. This is a very important property for military, banking, air
Traffic control and many other applications.
Saving money: A network may consist of many powerful small computers, one per
user, with data kept on one or more shared file server machines, which offers a
much better price/performance ratio than mainframes.

Need for Computer Network:

File sharing: A network makes it easy for everyone to access the same file and
prevents people from accidentally creating different versions.

Printer sharing: If you use a computer, chances are you also use a printer. With a
network, several computers can share the same printer. Although you might need a
more expensive printer to handle the added workload, it's still cheaper to use a
network printer than to connect a separate printer to every
Computer in your office.

Communication and collaboration: It's hard for people to work together if no one
knows what anyone else is doing. A network allows employees to share files, view
other people's work, and exchange ideas more efficiently. In a larger office, you
can use e-mail and instant messaging tools to
Communicate quickly and to store messages for future reference.
Page 2 of 30

QUESTIONS:

1. What are the two types of transmission technology available?


2. What is subnet?
3. Difference between the communication and transmission.
4. What are the possible ways of data exchange?
5. What is SAP?
6. What do you meant by "triple X" in Networks?
7. What is frame relay, in which layer it comes?
8. What is terminal emulation, in which layer it comes?
9. What is Beaconing?
10. What is redirector?
11. What is NETBIOS and NETBEUI?
12. What is RAID?
13. What is passive topology?
14. What is Brouter?
15. What is cladding?
16. What is point-to-point protocol?
17. How Gateway is different from Routers?
18. What is attenuation?
19. What is MAC address?
20. Difference between bit rate and baud rate.
21. What is Bandwidth?
22. What are the types of Transmission media?
23. What is Project 802?
24. What is Protocol Data Unit?
25. What is the different type of networking / internetworking devices?
26. What is ICMP?
27. What are the data units at different layers of the TCP / IP protocol suite?
28. What is difference between ARP and RARP?
29. What is the minimum and maximum length of the header in the TCP Segment
and IP datagram?
30. What is the range of addresses in the classes of internet addresses?
31. What is the difference between TFTP and FTP application layer Protocols?
32. What are major types of networks and explain?
33. What are the important topologies for networks?
34. What is mesh network?
35. What is difference between baseband and broadband transmission?
36. Explain 5-4-3 rule?
37. What MAU?
Page 3 of 30

38. What is the difference between routable and non- routable protocols?
39. Why should you care about the OSI Reference Model?
40. What is logical link control?
41. What is virtual channel?
42. What is virtual path?
43. What is packet filter?
44. What is traffic shaping?
45. What is multicast routing?
46. What is region?
47. What is silly window syndrome?
48. What are Digrams and Trigrams?
49. Expand IDEA.
50. What is wide-mouth frog?
51. What is Mail Gateway?
52. What is IGP (Interior Gateway Protocol)?
53. What is EGP (Exterior Gateway Protocol)?
54. What is autonomous system?
55. What is BGP (Border Gateway Protocol)?
56. What is Gateway-to-Gateway protocol?
57. What is NVT (Network Virtual Terminal)?
58. What is a Multi-homed Host?
59. What is Kerberos?
60. What is OSPF?
61. What is Proxy ARP?
62. What is SLIP (Serial Line Interface Protocol)?
63. What is RIP (Routing Information Protocol)?
64. What is source route?
65. What is (Wireless / Computer) Networking?
66. What Is the Difference Between Bits and Bytes?
67. What is a topology?
68. What are the three most common LAN architectures?
69. What is a server device?
70. What is the function of the network layer (layer3) in the OSI Reference Model?
71. Briefly discuss TCP and UDP
72. What is firewall?
73. What is the difference between TCP/IP and Ethernet?
74. How is Intranet different from the Internet?
75. Is an Intranet faster than getting data over the Internet?
76. What are the steps that you can take to develop a security policy for your
company network?
77. What is VPN technology?
78. Name one important feature of IPv6
79. How does the Ethernet Standard ensure non-simultaneous transmission?
80. What is the main function of TRANSPORT layer?
Page 4 of 30

81. Difference between server sockets and sockets?


82. Which protocol can be used to allow RAS connections over the internet?
83. Functions of Session Layer in OSI model
84. Discuss the pros and cons of dividing the class up into discrete layers.
85. What is middleware server?
86. What is IP address?
87. Why HTTP needs extra path information?
88. How to check if client is mounted on server?
89. What are the 7 layers in OSI model?
90. Define Transport layer.
91. What is SSL?
92. Break this URL down into its individual parts?
http://www.abc.com/clothes/shirts/formal.html#top
93. What does the protocol FTP do?
94. Why device drivers are used?
95. An IP/IPX packet received by a computer having IP/IPX or both how the packet is
handled?
96. What is a network server?
97. Types of network servers?
98. What is a Media Access Method?
99. What is a NIC?
100. How is Network Performance Measured?
101. What is Intranet?
102. How fast is wireless computer networking?
103. What is a null modem cable?
104. What is an extranet?
105. What is Ethernet?
106. What is IP?
107. What is NOS?
108. Explain about Wi-Fi.
109. What Is a Lag Switch?
110. Explain about WWW.
111. Explain about Gigabit Ethernet.
112. What is a cookie?.
113. What is a Session Id?
114. What is a port?
115. What is MIME?
116. What is the difference between physical address and logical address?
117. What is piggy backing?
118. Define Routing.
119. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?
120. What is the difference between an unspecified passive open and a fully
Specified passive open?
121. Explain the function of Transmission Control Block
Page 5 of 30

122. What is a Management Information Base (MIB)?


123. What is anonymous FTP and why would you use it?
124. What is a pseudo tty?
125. What does the Mount protocol do?
126. What is External Data Representation?
127. What is a DNS resource record?
128. What protocol is used by DNS name servers?
129. What is the difference between interior and exterior neighbor gateways?
130. What is the HELLO protocol used for?
131. What are the advantages and disadvantages of the three types of routing
tables?
132. What is distance-vector routing protocol?
133. Name some routing protocols?
134. What is classful and classless routing?
135. Basis for OSPF protocol?
136. What is domain controller?
137. Basic difference between layer2 switch & layer3 switches?
138. Can we use static and dynamic routing in one network?
139. What does the Ether type code do?
140. How does trace route work?
141. What are the types of Transmission media?
142. What is the difference between a patch cable and a cross-over cable?
143. What’s the longest distance I can go between two points on my 100base-T or
10base-T network using Cat5 (UTP)?
144. Can I add an older system with a 10baseT card to my 100baseT
network?
145. What do the CAT ratings mean for network cable?
146. What is NAT?
147. For a small LAN which class of addressing is used?
148.What are all the technical steps involved when the data transmission
from server via router?
149. If a company calls for technical support regarding to its malfunction
network, what are the four basic steps to perform a IP addressing
troubleshooting?
150. Different between broadcast domain and collision domain?
151.If an Ethernet port on a router were assigned an IP address of
172.112.16/25, what would be the valid subnet address of this host?
152. The network address of 192.16.0.0/19 provides how many subnets and hosts?
153. UDP and TCP use 1’s complement for their checksums. Suppose you have the
following three 8-bit bytes: 01010101, 01110000, and 01001100. What is the 1’s
complement of the sum of these 8-bit bytes? Why it is that UDP takes the 1’s
complement of the sum? How does the receiver detect errors?
Is it possible that a 1-bit error will go undetected? How about a 2-bit error?
154. What is the four tuple of communication?
Page 6 of 30

155. How to find the IP address of any website, say google.com


156. If there is a heavy traffic at the root name server to resolve the DNS
request, what will happen to the DNS packet if the root name server is
unable to resolve the given query .
157. Is it possible to get different IP address when you ping a website say
yahoo.com? Give reason if possible?
158. Can there be more than one entry in the DNS database for yahoo.com one
with a type ‘A’ and other with type “MX’.
159. Which protocol is used for retrieving mails?
160. Is there any difference between bps (small b) and Bps (capital b)?
161. What is frame relay, in which layer it comes?
162. Explain TELNET.
163. What is the main purpose for creating this OSI Reference Model ? Why it is a
layered model?
164. What is difference between baseband and broadband transmission?
165. Name any field of IP header that can prevent a packet to loop infinitely?
166. What is the purpose of exchanging beginning sequence numbers during the
connection in the TCP client-server model?
167. What is Congestion Control?
168. What is Internet Addresses?
169. What is LANE? Why is it necessary?
170. What causes congestion?
171. How to create sockets
172. Byte Order, Big Endian, Little Endian Explain.
173. Roles of Clients in socket?
174. Who Created the Internet Network?
175. Definition: HTTP?
176. Describe how data can be effectively communicated from the transmitter to
the receiver?
177. What is spanning Tree Bridge?
178. What is sliding window protocol?
179. What is Selective Repeat ARQ?
180. What is Go-Back-N ARQ?

Answer true or false to the following questions and briefly justify your
answer:
181. With the SR protocol, it is possible for the sender to receive an ACK for a
packet that falls outside of its current window.
182. With GBN, it is possible for the sender to receive an ACK for a packet that falls
outside of its current window.
183. The alternating bit protocol is the same as the SR protocol with a sender and
receiver window size of 1.
184. The alternating bit protocol is the same as the GBN protocol with a
sender and receiver window size of
Page 7 of 30

-----------------------------------------CHOOSE & FILL UP's:


-----------------------------------------------------
185. To send a data packet using datagram, connection will be
established
a) Before data transmission. b) Connection is not established before data
transmission.
c) No connection is required. d) None of the above.

186. Q1. What is the value for ICMP protocol message


a. 0x10 b. 10 c. 0x01 d. 1

187.In OST, terminal emulation is done in


(a) Sessions layer (b) Application layer (c) Presentation layer (d)
Transport layer

188.Piggy backing is a technique for


a) Flow control b) Sequence c) Acknowledgement d)
Retransmission

189.which of the following IEEE 802 specifications provides details


on network security?
a).802.8 b).802.9 c).802.10 d).802.11

190.Which layer of the OSI model converts data into a generic format
for network transmission?
a).Transport layer b).Session layer c).presentation layer
d).Application layer

191.Which layer of the OSI model manages flow control and error
correction?
a).Transport layer b).Session layer c).Network layer d).Physical
layer

192. Whichlayer of the OSI model establishes the route between the
sending and receiving computer?
a).Transport layer b).Session layer c).Network layer d).Physical
layer

193.In which OSI model layer does the Media Access Control
sublayer reside?
a).Transport layer b).Network layer c).DataLink layer d).Physical layer

194.Which of the following protocols are considered a network protocol?


a).IPX b).Telnet c).FTP d).SPX
Page 8 of 30

195.which of the following 802 specification provide details on how


an Ethernet network operates?
a).802.2 b).802.3 c).802.4 d).802.5

196. How does yahoo messenger protocol header start?


a). YHOO b). YMSG c). YCHT d). No such yahoo messenger
protocol

197. Both STUN and TURN can only be used for UDP and never for TCP.
(True/False)

198. Once a new client receives the IP address after the DHCPOFFER, the
client should verify no other hosts are using that IP address. (True/False)

199. ICMP messages are encapsulated in IP data grams. (True/False)


200...The percentage of times a page number bound in associate register
is called_____.
Answers:
1.(i) Broadcast and (ii) point-to-point

2. A generic term for section of a large networks usually separated by a


bridge or router.

3. Transmission is a physical movement of information and concern issues like


bit polarity, synchronization, clock etc.
Communication means the meaning full exchange of information between two
communication media.

4. (i) Simplex (ii) Half-duplex (iii) Full-duplex

5. Series of interface points that allow other computers to communicate with the
other layers of network protocol stack.

6. The function of PAD (Packet Assembler Disassembler) is described in a


document known as X.3. The standard protocol has been defined between the
terminal and the PAD, called X.28; another standard protocol exists between
hte PAD and the network, called X.29. Together, these three
recommendations are often called "triple X"

7. Frame relay is a packet switching technology. It will operate in the data link
layer.

8. Telnet is also called as terminal emulation. It belongs to application layer.


Page 9 of 30

9. The process that allows a network to self-repair networks problems. The


stations on the network notify the other stations on the ring when they are not
receiving the transmissions. Beaconing is used in Token ring and FDDI networks.

10. Redirector is software that intercepts file or prints I/O requests and
translates them into network requests. This comes under presentation layer.

11. NETBIOS is a programming interface that allows I/O requests to be sent to and
received from a remote computer and it hides the networking hardware from
applications. NETBEUI is NetBIOS extended user interface. A transport protocol
designed by Microsoft and IBM for the use on small subnets.

12. A method for providing fault tolerance by using multiple hard disk drives

13. When the computers on the network simply listen and receive the signal, they
are referred to as passive because they don’t amplify the signal in any way.
Example for passive topology - linear bus.

14. Hybrid devices that combine the features of both bridges and routers.
15. A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

16. A communications protocol used to connect computers to remote


networking services including Internet service providers .

17. A gateway operates at the upper levels of the OSI model and translates
information between two completely different network architectures or data formats
.

18. The degeneration of a signal over distance on a network cable is called


attenuation.

19. The address for a device as it is identified at the Media Access Control (MAC)
layer in the network architecture. MAC address is usually stored in ROM on the
network adapter card and is unique.

20. Bit rate is the number of bits transmitted during one second whereas baud rate
refers to the number of signal units per second that are required to
represent those bits.
baud rate = bit rate / N where N is no-of-bits represented by each signal
shift.

21. Every line has an upper limit and a lower limit on the frequency of
signals it can carry. This limited range is called the bandwidth.
Page 10 of 30

22. Signals are usually transmitted over some transmission media that are
broadly classified in to two categories. a) Guided Media:
These are those that provide a conduit from one device to another that
include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along
any of these media is directed and is contained by the physical limits of the
medium. Twisted-pair and coaxial cable use metallic that accept and transport
signals in the form of electrical current. Optical fiber is a glass or plastic cable that
accepts and transports signals in the form of light.
b) Unguided Media:
This is the wireless media that transport electromagnetic waves without using
a physical conductor. Signals are broadcast either through air. This is done through
radio communication, satellite communication and cellular telephony.

23. It is a project started by IEEE to set standards to enable


intercommunication between equipment from a variety of manufacturers. It is a
way for specifying functions of the physical layer, the data link layer and to some
extent the network layer to allow for interconnectivity of major
LAN protocols.

24. The data unit in the LLC level is called the protocol data unit (PDU). The PDU
contains of four fields a destination service access point (DSAP), a source
service access point (SSAP), a control field and an information field. DSAP, SSAP are
addresses used by the LLC to identify the protocol stacks on the receiving and
sending machines that are generating and using the data. The control field
specifies whether the PDU frame is a information frame (I - frame) or a
supervisory frame (S - frame) or a unnumbered frame (U - frame).

25. Repeater:
Also called a regenerator, it is an electronic device that operates only at
physical layer. It receives the signal in the network before it becomes weak,
regenerates the original bit pattern and puts the refreshed copy back in to the link.
Bridges:
These operate both in the physical and data link layers of LANs of same
type. They divide a larger network in to smaller segments. They contain logic
that allow them to keep the traffic for each segment separate and thus are
repeaters that relay a frame only the side of the segment containing the
intended recipient and control congestion.
Routers:
They relay packets among multiple interconnected networks (i.e. LANs of
different type). They operate in the physical, data link and network layers. They
contain software that enable them to determine which of the several possible
paths is the best for a particular transmission.
Gateways:
Page 11 of 30

They relay packets among networks that have different protocols (e.g.
between a LAN and a WAN). They accept a packet formatted for one
protocol and convert it to a packet formatted for another protocol before
forwarding it. They operate in all seven layers of the OSI model.

26. ICMP is Internet Control Message Protocol, a network layer protocol of the
TCP/IP suite used by hosts and gateways to send notification of datagram
problems back to the sender. It uses the echo test / reply to test whether a
destination is reachable and responding. It also handles both
control and error messages.

27. The data unit created at the application layer is called a message, at the
transport layer the data unit created is called either a segment or an user
datagram, at the network layer the data unit created is called the datagram, at the
data link layer the datagram is encapsulated in to a frame and finally
transmitted as signals along the transmission media.

28. The address resolution protocol (ARP) is used to associate the 32 bit IP
address with the 48 bit physical address, used by a host or a router to find the
physical address of another host on its network by sending a ARP query
packet that includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet
address when it knows only its physical address.

29. The header should have a minimum length of 20 bytes and can have a
maximum length of 60 bytes.

30. Class A 0.0.0.0 - 127.255.255.255 Class B 128.0.0.0 - 191.255.255.255


Class C 192.0.0.0 - 223.255.255.255 Class D 224.0.0.0 - 239.255.255.255
Class E 240.0.0.0 - 247.255.255.255

31. The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files
from a remote host but does not provide reliability or security. It uses the
fundamental packet delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP
for copying a file from one host to another. It uses the services offer by TCP
and so is reliable and secure. It establishes two connections (virtual circuits)
between the hosts, one for data transfer and another for control information.

32. Server-based network & Peer-to-peer network


Peer-to-peer network, computers can act as both servers sharing resources
and as clients using the resources.
Server-based networks provide centralized control of network resources and rely on
server computers to provide security and network administration .
Page 12 of 30

33.BUS topology:
In this each computer is directly connected to primary network cable in a
single line.
Advantages:
Inexpensive, easy to install, simple to understand, easy to extend.

STAR topology:
In this all computers are connected using a central hub.
Advantages:
Can be inexpensive, easy to install and reconfigure and easy to trouble shoot
physical problems.

RING topology:
In this all computers are connected in loop.
Advantages:
All computers have equal access to network media, installation can be
simple, and signal does not degrade as much as in other topologies because each
computer regenerates it.

34. A network in which there are multiple network links between computers to
provide multiple paths for data to travel.

35. In a base band transmission, the entire bandwidth of the cable is


consumed by a single signal. In broadband transmission, signals are sent on
multiple frequencies, allowing multiple signals to be sent simultaneously.

36. In a Ethernet network, between any two points on the network ,there can be no
more than five network segments or four repeaters, and of those five segments
only three of segments can be populated.

37. In token Ring, hub is called Multistation Access Unit (MAU).

38. Routable protocols can work with a router and can be used to build large
networks. Non-Routable protocols are designed to work on small, local
networks and cannot be used with a router

39. It provides a framework for discussing network operations and design.

40. One of two sub layers of the data link layer of OSI reference model, as
defined by the IEEE 802 standard. This sub layer is responsible for
maintaining the link between computers when they are sending data across the
physical network connection.
Page 13 of 30

41. Virtual channel is normally a connection from one source to one


destination, although multicast connections are also permitted. The other
name for virtual channel is virtual circuit.

42. Along any transmission path from a given source to a given destination, a group
of virtual circuits can be grouped together into what is called path.

43. Packet filter is a standard router equipped with some extra functionality.The
extra functionality allows every incoming or outgoing packet to be inspected.
Packets meeting some criterion are forwarded normally. Those that fail the test
are dropped.

44. One of the main causes of congestion is that traffic is often busy. If hosts could
be made to transmit at a uniform rate, congestion would be less common.
Another open loop method to help manage congestion is forcing the packet to be
transmitted at a more predictable rate. This is called traffic shaping.

45. Sending a message to a group is called multicasting, and its routing


algorithm is called multicast routing.

46. When hierarchical routing is used, the routers are divided into what we will
call regions, with each router knowing all the details about how to route packets to
destinations within its own region, but knowing nothing about the internal structure
of other regions.

47. It is a problem that can ruin TCP performance. This problem occurs when data
are passed to the sending TCP entity in large blocks, but an interactive application
on the receiving side reads 1 byte at a time.

48. The most common two letter combinations are called as diagrams. e.g. th, in,
er, re and an. The most common three letter combinations are called as trigrams.
e.g. the, ing, and, and ion.

49. IDEA stands for International Data Encryption Algorithm.

50. Wide-mouth frog is the simplest known key distribution center (KDC)
authentication protocol.

51. It is a system that performs a protocol translation between different


electronic mail delivery protocols.

52. It is any routing protocol used within an autonomous system.


Page 14 of 30

53. It is the protocol the routers in neighboring autonomous systems use to


identify the set of networks that can be reached within or via each
autonomous system.

54. It is a collection of routers under the control of a single administrative


authority and that uses a common Interior Gateway Protocol.

55. It is a protocol used to advertise the set of networks that can be reached with
in an autonomous system. BGP enables this information to be shared with the
autonomous system. This is newer than EGP (Exterior Gateway Protocol).

56. It is a protocol formerly used to exchange routing information between


Internet core routers.

57. It is a set of rules defining a very simple virtual terminal interaction. The NVT is
used in the start of a Telnet session.

58. It is a host that has a multiple network interfaces and that requires
multiple IP addresses is called as a Multi-homed Host.

59. It is an authentication service developed at the Massachusetts Institute of


Technology. Kerberos uses encryption to prevent intruders from discovering
passwords and gaining unauthorized access to files.

60. It is an Internet routing protocol that scales well, can route traffic along
multiple paths, and uses knowledge of an Internet's topology to make
accurate routing decisions.

61. It is using a router to answer ARP requests. This will be done when the
originating host believes that a destination is local, when in fact is lies
beyond router.

62. It is a very simple protocol used for transmission of IP data grams across a
serial line.

63. It is a simple protocol used to exchange information between the routers.

64. It is a sequence of IP addresses identifying the route a datagram must


follow. A source route may optionally be included in an IP datagram header.

65. In the world of computers, networking is the practice of linking two or more
computing devices together for the purpose of sharing data. Networks are built with
a mix of computer hardware and computer software.
Page 15 of 30

66. A bit is a single numeric value, either '1' or '0', that encodes a single unit of
digital information. A byte is a sequence of bits; usually eight bits equal one byte.

67. A topology refers to the manner in which the cable is run to individual
workstations on the network. The dictionary defines topology as: the
configurations formed by the connections between devices on a local area
network (LAN) or between two or more LANs.

68. The 3 most common types of LAN architectures are: Ethernet


Token Ring
ArcNet

69. A server device typically stores files and databases including more
complex applications like Web sites. Server devices often feature higher-
powered central processors, more memory, and larger disk drives than clients.

70. This layer is used to establish communications with computer systems that
lie beyond the local LAN segment with its own routing addressing
architecture.

71. TCP is connection-oriented. It establishes a logical end to end connection


between the two communicating hosts. TCP views the data its sends as a
continuous stream of bytes, not as independent packet. UDP is a unreliable,
connectionless datagram protocol. There are no techniques in the protocol to
verifying that the data reached the other end of network correctly.

72. A firewall system replaces an IP router with a multi-homed host that does not
forward packets. by not forwarding the IP packets between networks, the firewall
efficiently sever the connection between the networks. The firewall accepts packets
that are addressed to it, and processes those packets through
Application layer. Firewall ignores packets that are not addresses to it. Firewall
are not routers because they do not forward packets, even when they are
used in place of routers.

73. The simple difference is TCP/IP is a kind of software or protocol required


communicating across a network. An Ethernet is the actual hardware adapter
for the network

74.Generally speaking an Intranet is different from an Internet in the


following ways:
1. Intranet is a network within the organization whereas Internet is a world
wide network.
2. Intranet has access to Internet but not vice- versa.
Page 16 of 30

75. If the network is totally contained within a LAN, then we do get LAN speeds.
i.e. the web server is connected via LAN to the clients. If we are connecting
remote locations, and use the Internet as our backbone / transport, then our
speed becomes dependent on the Internet itself, and the
speeds by which we connect to it. If performance is really the issue, we could
also run our Intranet over private lines, such as frame relay. Then we can actually
contract with the phone company for actual performance levels of speed. i.e. 56K,
256K, etc Approximately Intranet operates at 10mbs - 100mbs internal and
28.8k for remote access employees.

76. Include determine responsibility, address remote access, communicate a


usage policy, and develop a plan to address violations.

77. VPN, or Virtual Private Network, allows a company with multiple sites to have a
private network, but using a public network as a carrier. VPNs restrict traffic so
that packets can only travel between the company's sites.

78. IPv6 contains a mechanism that allows sender and receiver to establish high-
quality paths for audio and video through the underlying network, and associates
datagram with that path.

79. It requires a sending station to monitor signals on the cable. If the signal on the
cable differs from the signal that the station is sending, it means that a collision
has occurred. This is why the Ethernet standard specifies a maximum cable
length and minimum frame size .

80. The main function is to assure reliable delivery, i.e. all of the data arrive at the
destination application ant that the data arrive in the same order in which
they sent.

81. Server sockets are used by a server to accept incoming requests from a
client. A socket is one end of a bi-directional communication path between two
machines.

82. PPTP

83. Establishes and terminates process-to-process communication sessions


between hosts. Translation between name and address databases, as well as
synchronization between the two hosts, may be required to manage the
sessions between hosts.

84. Con: Too many layers may increase the communication overhead in your
program.
Pro: Layers allow you to change one part without affecting the others.
Page 17 of 30

85. Middleware server is a server program that sits between the database
server and the client software, which may provide driver or business-logic
services.

86. IP address is the 32-bit number used to identify a host in the Internet. IP
address has 3 parts: class type, network address, host address.
87. Served doesn’t need this function, but CGI need it. CGI can’t communicate with
Server while executing, so it cannot get path parameter.
Before Server executes CGI program, it needs to change the Path; this is why
HTTP needs to support "extra path information". Through this information,
server can put the changed result to environment variable, then execute CGI
program

88. Login as root or su to root, then issue #dfmounts Without arguments, the
dfmounts command displays the shared resource and clients mounting the
resource.

89. The 7 OSI layers are:


· Layer1:Physical
· Layer2:Data Link
· Layer3:Network
· Layer4:Transport
· Layer5:Session
· Layer6:Presentation
· Layer7:Application

90. Transport Layer: Layer 4 protocol, which specify how to handle details of
reliable transfer, are among the most complex protocols.

91. SSL is short for Secure Sockets Layer, a protocol developed by Netscape for
transmitting private documents via the Internet. SSL works by using a private
key to encrypt data that's transferred over the SSL connection. Both Netscape
Navigator and Internet Explorer support SSL, and many Web sites
use the protocol to obtain confidential user information, such as credit card
numbers. By convention, Web pages that require an SSL connection start with
https: instead of http.

92. http:// --> protocol


www.abc.com/ --> domain name
clothes/ --> subdirectory name
shirts/ --> subdirectory name
formal.html --> document name (Web Page)
#top --> anchor
Page 18 of 30

93. Transfer a file b/w stations with user authentication.

94. To provide software for enabling the hardware.

95. Read the, field in the packet header with to send IP or IPX protocol.

96. A network server is a computer designed to process requests and deliver data
to other (client) computers over a local network or the Internet.

97. The types are: Web servers, Proxy servers, FTP servers , Online game servers.

98. A media access method refers to the manner in which a computer gains and
controls access to the network’s physical medium (e.g., cable). Common media
access methods include the following:
CSMA/CD CSMA/CA Token Passing Demand Priority

99. A Network Interface Card (NIC), also called a Network Adapter, is used to
connect a computer to the cabling used in a local area network (LAN).
Typically, the NIC attaches to the computer’s expansion bus via an ISA slot (8-bit or
16-bit) or a PCI slot (32-bit). The NIC has one or more external ports with which
to attach the network cable.

100. The measure of computer network performance is commonly given in units


of bits per second (bps). This quantity can represent either an actual data
rate or a theoretical limit to available network bandwidth.

101. Intranet is the generic term for a collection of private computer


networks within an organization. An intranet uses network technologies as a tool to
facilitate communication between people or workgroups to improve the data
sharing capability and overall knowledge base of an organization's employees.

102. The speed of a wireless network depends on several factors. First, wireless
local area networks (WLANs) feature differing levels of performance depending
on which Wi-Fi standard they support. 802.11b WLANs offer maximum
theoretical bandwidth of 11 Mbps. 802.11a and 802.11g WLANs offer
theoretical bandwidth up to 54 Mbps. (In contrast, typical wired Ethernets run
at 100 Mbps.) Finally, wireless network technology is capable of more speed
than what Wi-Fi supports today. Industry vendors continue to develop
improved technologies like 802.16 WiMAX that offer wireless communications
with faster speeds and longer range.
Page 19 of 30

103. A null modem cable connects to two standard serial ports for networking
two computers together. Null modem cables enable direct data transfer with a
minimum of setup required.

104. An extranet is a computer network that allows controlled access from


the outside for specific business or educational purposes. Extranets are
extensions to, or segments of, private intranet networks that have been built in
many corporations for information sharing and ecommerce

105. Ethernet is a physical and data link layer technology for local area
networks (LANs). Ethernet was invented by engineer Robert Metcalfe. Higher
level network protocols like Internet Protocol (IP) use Ethernet as their
transmission medium. Data travels over Ethernet inside protocol units called
frames. Run length of individual Ethernet cables is limited to roughly 100 meters,
but Ethernet can be bridged to easily network entire schools or office buildings.

106. IP is the primary network protocol used on the Internet, developed in the
1970s. On the Internet and many other networks, IP is often used together
with the Transport Control Protocol (TCP) and referred to interchangeably as
TCP/IP. IP supports unique addressing for computers on a network. Most networks
use the IP version 4 (IPv4) standard that features IP addresses four bytes (32 bits)
in length. The newer IP version 6 (IPv6) standard features addresses 16 bytes
(128 bits) in length.

107. A NOS is a network operating system. A network operating system


implements protocol stacks as well as device drivers for networking hardware.
Some network operating systems, like Windows 98 Second Edition, also add
custom networking features like Internet Connection
Sharing (ICS).

108. Wi-Fi is the industry name for wireless LAN (WLAN) communication
technology related to the IEEE 802.11 family of wireless networking standards.
To some, the term Wi-Fi is synonymous with 802.11b, as 802.11b was the first
standard in that family to enjoy widespread popularity. Today, however, Wi-Fi can
refer to any of the established standards: 802.11a, 802.11b, 802.11g and
802.11n.

109. A lag switch is a mechanism installed on a home network that allows you to
insert delays into the flow of local traffic to the Internet. Lag switches are normally
used by unscrupulous players wanting to cheat at online video games. Lag switches
are unrelated to normal network switches.

110. The term WWW refers to the World Wide Web or simply the Web. The World
Wide Web consists of all the public Web sites connected to the Internet
Page 20 of 30

worldwide, including the client devices (such as computers and cell phones) that
access Web content. The WWW is just one of many applications of the Internet
and computer networks. The World Web is based on these technologies:
HTML - Hypertext Markup Language
HTTP - Hypertext Transfer Protocol
Web servers and Web browsers

111. Gigabit Ethernet is an extension to the family of Ethernet computer


networking and communication standards. The Gigabit Ethernet standard
supports a theoretical maximum data rate of 1 Gbps (1000 Mbps). At one time,
it was believed that achieving Gigabit speeds with Ethernet required fiber optic
or other special cables. However, Gigabit Ethernet can be implemented on
ordinary twisted pair copper cable (specifically, the CAT5e and CAT6 cabling
standards). Today, Gigabit Ethernet can only be found mainly in research
institutions. A decrease in cost, increase in demand, and improvements in other
aspects of LAN technology will be required before Gigabit Ethernet surpasses
other forms of wired networking in terms of
adoption.

112. Cookies are a way for a server to send some information to a client to store
and for the server to later retrieve its data from that client. Web browser
supports 20 cookies/host of 4kb each.

113. It is a unique id assigned by the server to the user when a user first
accesses a site or an application i.e. when a request is made.

114. A port is an 16-bit address within a computer. Ports for some common
Internet Application protocols.
File Transfer Protocol-21.
Telnet Protocol-23.
Simple Mail Transfer Protocol-25.
Hypertext Transfer Protocol-80.

115. MIME (Multipurpose Internet Mail Extension) is a general method by which


the content of different types of Internet objects can be identified.

116. Simply physical address known as hardware address. IP address is


known as logical address. Physical address is used for identify the PC on
network and IP is used for identify the network on the PC Mac address 48 bit
address IP address 32 bit address.

117. Piggy backing means the combination of data frame and


acknowledgment in stop and wait method which is used for flow and error control
mechanism .
Page 21 of 30

118. Routing is the process of selecting paths in a network along which to


send network traffic. Routing is performed for many kinds of networks,
including the telephone network, electronic data networks (such as the
Internet), and transportation (transport) networks.

119. 10Base2—An Ethernet term meaning a maximum transfer rate of 10


Megabits per second that uses baseband signaling, with a contiguous cable
segment length of 100 meters and a maximum of 2 segments.
10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits
per second that uses baseband signaling, with 5 continuous segments not
exceeding 100 meters per segment.
10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits
per second that uses baseband signaling and twisted pair cabling.

120. An unspecified passive open has the server waiting for a connection
request from a client. A fully specified passive open has the server waiting for a
connection from a specific client.

121. A TCB is a complex data structure that contains a considerable amount of


information about each connection

122. A Management Information Base is part of every SNMP-managed device.


Each SNMP agent has the MIB database that contains information about the
device's status, its performance, connections, and configuration. The MIB is
queried by SNMP.

123.Anonymous FTP enables users to connect to a host without using a valid


login and password. Usually, anonymous FTP uses a login called anonymous or
guest, with the password usually requesting the user's ID for tracking purposes
only. Anonymous FTP is used to enable a large number of users to access files on
the host without having to go to the trouble of setting up logins for them all.
Anonymous FTP systems usually have strict controls over the areas an anonymous
user can access.

124. A pseudo tty or false terminal enables external machines to connect


through Telnet or rlogin. Without a pseudo tty, no connection can take place.

125. The Mount protocol returns a file handle and the name of the file system in
which a requested file resides. The message is sent to the client from the server
after reception of a client's request.
Page 22 of 30

126. External Data Representation is a method of encoding data within an RPC


message, used to ensure that the data is not system-dependent.

127. A resource record is an entry in a name server's database. There are


several types of resource records used, including name-to-address resolution
information. Resource records are maintained as ASCII files.

128.DNS uses UDP for communication between servers. It is a better choice than
TCP because of the improved speed a connectionless protocol offers. Of course,
transmission reliability suffers with UDP.

129.Interior gateways connect LANs of one organization, whereas exterior


gateways connect the organization to the outside world.

130.The HELLO protocol uses time instead of distance to determine optimal routing.
It is an alternative to the Routing Information Protocol.

131.The three types of routing tables are fixed, dynamic, and fixed central.The
fixed table must be manually modified every time there is a change. A dynamic
table changes its information based on network traffic, reducing the amount of
manual maintenance. A fixed central table lets a manager modify only one table,
which is then read by other devices. The fixed central table reduces the need
to update each machine's table, as with the fixed table. Usually a dynamic
table causes the fewest problems for a network administrator, although the
table's contents can change without the administrator being aware of the
change.

132.A distance-vector routing protocol is one of the two major classes of


routing protocols used in packet-switched networks for computer
communications, the other major class being the link-state protocol. A
distance-vector routing protocol uses the Bellman-Ford algorithm to calculate paths.
Examples of distance-vector routing protocols include RIPv1 and 2 and IGRP. EGP
and BGP are not pure distance-vector routing protocols but their concepts are the
same.

133. The following are the routing protocols:- IS-IS runs over the data link layer-
OSPF, IGRP, and EIGRP run directly over IP; OSPF and EIGRP have their own reliable
transmission mechanism while IGRP assumed an unreliable transport- RIP runs
over UDP- BGP .

134. classful- it wont send subnet mask in its route update. classless- it will send
subnet mask in its route update and support .
Page 23 of 30

135. (a) OSPF has two primary characteristics. The first is that the protocol is open,
which means that its specification is in the public domain. The second
principal characteristic is that OSPF is based on the SPF algorithm, which
sometimes is referred to as the Dijkstra algorithm, named for the person
credited with its creation.
(b)OSPF is a link-state routing protocol that calls for the sending of link-state
advertisements (LSAs) to all other routers within the same hierarchical area.
Information on attached interfaces, metrics used, and other variables are included
in OSPF LSAs. As OSPF routers accumulate link-state information, they use the SPF
algorithm to calculate the shortest path to each node.

136. On Windows Server Systems, a domain controller (DC) is a server that


responds to security authentication requests (logging in, checking permissions, etc.)
within the Windows Server domain

137. Layer 3 switch is a high-performance device for network routing. Layer 3


switches actually differ very little from routers. A Layer 3 switch can support the
same routing protocols as network routers do. Both inspect incoming packets
and make dynamic.

138. Static and Dynamic Routing in one network. However Dynamic Routing is
used to have the best path no matter what the status of the physical links.
All routing protocols have some sort of shortest-path or lowest-cost or best-
choice algorithm to help you weigh all the options available. Static routing can
be used in a small network to reduce the work of the network administrator or to
use a particular route only to forward the packet; we need static routing.

139. It differentiates which protocol is being carried by the Ethernet frame.

140. See trace route works using ICMP packets. First source sends an ICMP packet
with Time to Live (TTL) field as 1 to the destination address. Now intermediate
router receives the packet and sees that TTL field has expired, so it sends a ICMP
TTL expired reply. Now the source machine again sends the ICMP packet with TTL
field as 2. This time second intermediate router replies. This process is repeated
till destination is reached. That way the source can get the entire route up to
destination.

141. There are 2 types of transmissions: 1.bounded 2.unbounded


BOUNDED:-In this we use cables .There are 3 types of cables coaxial ,twisted
pair and fiber optics these cables are used to transmit your data to the
destination. The main difference between coaxial+twisted pair, optical fiber is
that they (coaxial+tp)used signals and FO use light.
UNBOUNDED:-It refers to wireless(802.11).In this we use Electromagnetic
spectrum .We use Micro waves, radio waves .
Page 24 of 30

142.A patch cable is basically your common everyday cable. It is used to


connect your NICs or other devices to your hub/switch or what have you. With a
patch cable the signal goes straight through. A cross over cable is a specialized
cable. It basically has three roles:
1) It is used if you wish to connect two computers together without using a hub.
2)It can be used to uplink one hub to another in situations where an uplink port
isn't available.
3) It is can be used to daisy chain on a network device like a Cable modem in
some situation.
When constructing a network it is a good idea to use a different color of
network cable for Cross-over cables. This helps prevent potential confusion .

143. Between any two points the max length is 100 meters (~328 feet). If you wish
to go beyond this, you can do so by using two cables of 100 meters or less and
placing a repeater between them. Hubs will function as repeaters .

144.Yes, most 100baseT hubs and switches support both 10Mbps and
100Mbps standards. The majority of newer hubs will adjusts to either 10Mbps
or 100Mbps speeds by port. With these systems you can freely add and remove the
older 10Mbps devices without worry. A few older hubs will
adjust the speed of every port to the lowest speed of an attached device.
With these, every system is slowed down to 10Mbps when one 10Mbps
system is attached.

145. The CAT rating tell you the frequency rating of the cable. Additionally it can
give you an idea of the typical use for it. Types:
CAT 1. Lowest grade of cable. No Frequency rating. (1Mbs)
Typical use: Alarm systems, Intercom Systems.
CAT 2. Typical phone cable. Frequency max: 1mhz (4Mbps)
Typical use: Phone systems.
CAT 3. Typical 10base-T cable. Frequency max: 16mhz (10Mbps)
Typical use: 10base-T networks, 4Mbs token ring networks
CAT 4: Typical Token ring cable. Frequency max: 20mhz (16Mbps)
Typical use: 16Mbs Token ring networks.
Cat 5: Most common type. Frequency max: 100mhz (100Mbps)
Typical use: 100base-T networks / 10base-T networks
Cat 5e/6: High Speed cable. Frequency ~350+mhz
Typical use: 1000base-T over copper. (Gigabit Ethernet)
It's fine to use a cable type greater then what you need. You could for instance use
Cat 5 cable for a phone system. It's actually good to use cable better then what you
think you will need. This leaves room for future network upgrades.
Page 25 of 30

146. NAT is short for Network Address Translation. In a nutshell, NAT allows a
group of computers to use a single IP address to communicate with the outside
world or another network. Additionally it separates External IP addresses from
Internal network IP addresses.

147. Class C is used for small network environment because the users are also
less.

148. When data goes through the server the first step is that it will check the
gateway ip address means network main router IP if this will correct then the next
process is done by router itself , where the packets have to be sent that is in
routing table what is your next destination? and after it will recognize by the next
network the same process is be done by theri network router and server.

149. (a) Ping 127.0.0.1. (b) Ping local host IP address. (c) Ping default gateway.
(d) Ping the remote server.

150.Brodcast Domain:
send the packet to all the Present Network IT may be send by the person It may
broadcast by the switch when the address not found in the Network.For
breaking broadcast domain We can Use Router .
Collision Domain:
Switch has no collision as compare to run (layer on Device)

151. 172.16.112.0

152. 8 subnets, 8190 hosts each

153. Solution: 01010101 + 01110000 + 11000101 = 00010001


One's complement of 00010001 = Checksum = 11101110.
At the receiver end, the 3 messages and checksum are added together to
detect an error. Sum should always contain only binary 1. If the sum
contains 0 term, receiver knows that there is an error. Receiver will detect 1-bit
error. But this may not always be the case with 2-bit error as two
different bits may change but the sum may still be same.

154.Four tuple of any exercise is source IP, source port no: and destination IP,
destination port no:.
for this communication the four tuple would be:
• 192.168.1.76, 1942
• 203.84.221.151, 80

155. C:\Documents and Settings\Richard>nslookup google.com


Server: home
Page 26 of 30

Address: 192.168.1.254
Non-authoritative answer:
Name: google.com Addresses: 72.14.207.99, 64.233.167.99,
64.233.187.99
156.. The DNS root name server simply discards the packet .

157. Yes. This happens because yahoo.com is running on more than one
machine, and so different machines running yahoo.com are registered into
DNS. Due to this there are more than one resource records of type ‘A’
holding different IP address.

158. Yes. It is recommended to have same domain although it is not


necessary .

159. POP3 and IMAP4 are used to retrieve mails.


IMAP4 stores a copy of message on the server whereas POP3 does not.

160. The term “bps” specifies network bandwidth in bits per second. The term
"Bps" specifies network bandwidth in bytes per second.

161. Frame relay is a packet switching technology. It will operate in the data link
layer

162. (TELetype NETwork) is a network protocol used on the Internet or local area
network (LAN) connections. It was developed in 1969 and standardized as IETF STD
8, one of the first Internet standards. It has limitations that are considered to be
security risks. The term telnet also refers to software which implements the client
part of the protocol. TELNET clients have been available on most Unix systems
for many years and are available for virtually all platforms.

163. OSI reference model consisting of 7 layers helps the data to be moved in
more optimal from source to the destination. And here the protocols are better
hidden so the further enhancement can be done easily. This reference model can be
used for both connection oriented and connectionless service.

164. Baseband Signaling:


1) Uses digital signaling
2) No frequency-division multiplexing
3) Bi-directional transmission
4) Signal travels over short distances
Broadband Signaling:
1) Uses analog signaling
2) Unidirectional transmission
3) Frequency-division multiplexing is possible
Page 27 of 30

4) Signal can travel over long distances before being attenuated

165. TTL field of ip header. it fixes up a time to reach, if it s not reached


within that stipulated time, it is being killed by the auto timer.

166. To ensure that any data lost during data transfer can be retransmitted.

167. A technique for monitoring network utilization and manipulating


transmission or forwarding rates for data frames to keep traffic levels from
overwhelming the network medium. It gets its name because it avoids
"network traffic jams" .

168.An Internet address (or an IP address, or an IP number) is a number


made of 4 bytes (numbers between 0 and 255), written in what is called 'a dot
notation'. For example, "128.0.46.1" is a valid Internet address. Such an address
identifies a computer which is connected to the Internet. Note that a computer
might have more than one such address, if it has more than one physical
connections to the Internet.

169. LAN Emulation used to run normal networking over ATM, it emulates the
broadcast nature of a LAN over connection oriented ATM.

170. The assumption that statistical multiplexing can be used to improve the link
utilization is that the users do not reach their peak rate values
simultaneously, but since the traffic demands are stochastic and cannot be
predicted, congestion is unavoidable. Whenever the total input rate is greater than
the output link capacity, congestion occurs. When the network becomes congested,
the queue lengths may become very large in a short time, resulting in buffer
overflows and cell loss. Congestion control is therefore necessary to ensure that
users get the negotiated Quality of Service

171. Creation of sockets is done using the socket() system call. This system call is
defined as follows:
int socket(int address_family, int socket_type, int proto_family);
address_family defines the type of addresses we want this socket to use,
andtherefor defines what kind of network protocol the socket will use. We will
concentrate on the Internet address family, cause we want to write Internet
applications.
As an example, suppose that we want to write a TCP application. This Application
needs at least one socket in order to communicate across the Internet, so it will
contain a call such as this:
int s; /* descriptor of socket */
/* Internet address family, Stream socket */
s = socket(AF_INET, SOCK_STREAM, 0);
Page 28 of 30

if (s < 0) {
perror("socket: allocation failed");
}

172. It is an old argument amongst different computer manufacturers how numbers


should be kept in a computer.
1. Big Endian:
Address: | 100h | 101h |
Contents: | FEh | 4Ch |
2. Little Endian:
Address: | 100h | 101h |
Contents: | 4Ch | FEh |
In the first form, also called 'Big Endian', The Most Significant Byte (MSB) is kept in
the lower address, while the Least significant Byte (LSB) is kept in the higher
address.
In the second form, also called 'Little Endian', the MSB is kept in the higher address,
while the LSB is kept in the lower address.

173. A client's main feature is giving a convenient User interface, hiding the details
of how the server ‘talks’ from the user. Today, people are trying to write mostly
graphical clients, using windows, pop-up-menus and other such fancy stuff. We will
leave this to someone else to explain, and concentrate on the networking part. The
client needs to first establish a connection with the server, given its address. After
the connection is established, The Client needs to be able to do two things:
1. Receive commands from the user, translate them to the server's language
(protocol) and send them to the server.
2. Receive messages from the server, translate them into human-readable form,
and show them to the user. Some of the messages will be dealt with by the client
automatically, and hidden from the user. This time, the Client designer's choice.

174. No single person or organization created the modern Internet, including Al


Gore, Lyndon Johnson, or any other individual. Instead, multiple people developed
the key technologies that later grew to become the Internet:
* Email - Long before the World Wide Web, email was the dominant
communication method on the Internet. Ray Tomlinson developed in 1971 the
first email system that worked over the early Internet.
* Ethernet - The physical communication technology underlying the Internet,
Ethernet was created by Robert Metcalfe and David Boggs in 1973.
* TCP/IP - In May, 1974, the Institute of Electrical and Electronic Engineers (IEEE)
published a paper titled "A Protocol for Packet Network Interconnection." The
paper's authors - Vinton Cerf and Robert Kahn - described a protocol called TCP
that incorporated both connection-oriented and datagram services .
Page 29 of 30

175. The Hypertext Transfer Protocol - provides a standard for Web browsers and
servers to communicate. The definition of HTTP is a technical specification of a
network protocol that software must implement. HTTP is an application layer
network protocol built on top of TCP. HTTP clients (such as Web browsers)
and servers communicate via HTTP request and response messages. The three
main HTTP message types are GET, POST, and HEAD. HTTP utilizes TCP port 80 by
default, though other ports such as 8080 can alternatively be used. The current
version of HTTP in widespread use - HTTP version 1.1 - was developed to address
some of the performance limitations of the original version - HTTP 1.0.

176. Data can be effectively transmitted through E1 leased line. But E1 leased line
is very Costly. so by using VPN ( Virtual Private Network) We send data very
effectively in less cost than E1 leased line. VPN also need internet connection to
send data from source to server.
177. Spanning tree bridges were designed with transparency as a primary goal. A
customer should be able to buy a bridge, insert it between two networks,
and have everything work correctly with no hardware, software, or configuration
changes on either hosts or existing bridges.

178. Sliding Window Protocol is a bi-directional data transmission protocol in the


data link layer (OSI model). It is used to keep a record of the frame sequences sent
and their respective acknowledgements received by both the users. In transmit flow
control, sliding window is a variable-duration window that allows a sender to
transmit a specified number of data units before an acknowledgment is
received or before a specified event occurs.

179. Selective Repeat ARQ is a specific instance of the Automatic Repeat-request


(ARQ) Protocol. It may be utilized as a protocol for the delivery and
acknowledgement of message units, or it may be utilized as a protocol for the
delivery of subdivided message sub-units.

180. Go-Back-N ARQ is a specific instance of the Automatic Repeat-request (ARQ)


Protocol, in which the sending process continues to send a number of frames
specified by a window size even without receiving an ACK packet from the receiver.

181. True. Consider a scenario where a first packet sent by sender doesn't
receive ACK as the timer goes down. So it will send the packet again. In that time
the ACK of first packet is received. so the sender empties it's buffer and fills buffer
with new packet. In the meantime, the ACK of second frame may be received. So
ACK can be received even if the packet falls outside the current window.

182. True. Same argument provided for (a) holds here.


Page 30 of 30

183. True. Alternating bit protocol deals with the 0 & 1 as an alternating ACK.
Here, the accumulative ACK is not possible as ACK needs to be sent after each
packet is received. So SR protocol starts behaving as Alternating bit protocol.

184. True. Same argument holds here.

185. C 186. A 0x10 187. C


188. C
189. C 190. A 191. C
192. C
193. C 194. A 195. B
196. B YMSG

197. False. STUN is only for UDP, but TURN applies to both UDP and TCP.

198. False - the client must wait until DHCPACK (not DHCPOFFER) because the IP
address is not officially assigned to the new client until DHCPACK is received .

199. True 200. Bit ratio.

You might also like