Deck 7: Network Layer and Packet Switching
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
Play
Full screen (f)
Deck 7: Network Layer and Packet Switching
1
If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to
A)n
B)(n*l)/r
C)(2n*l)/r
D)l/r
A)n
B)(n*l)/r
C)(2n*l)/r
D)l/r
(n*l)/r
2
What are the Methods to move data through a network of links and switches?
A)packet switching and line switching
B)circuit switching and line switching
C)line switching and bit switching
D)packet switching and circuit switching
A)packet switching and line switching
B)circuit switching and line switching
C)line switching and bit switching
D)packet switching and circuit switching
packet switching and circuit switching
3
The required resources for communication between end systems are reserved for the duration of the session between end systems in-----------method.
A)packet switching
B)circuit switching
C)line switching
D)frequency switching
A)packet switching
B)circuit switching
C)line switching
D)frequency switching
circuit switching
4
As the resources are reserved between two communicating end systems in circuit switching,----------- is achieved.
A)authentication
B)guaranteed constant rate
C)reliability
D)store and forward
A)authentication
B)guaranteed constant rate
C)reliability
D)store and forward
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
In---------------- systems, resources are allocated on demand.
A)packet switching
B)circuit switching
C)line switching
D)frequency switching
A)packet switching
B)circuit switching
C)line switching
D)frequency switching
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is not an application layer service?
A)network virtual terminal
B)file transfer, access, and management
C)mail service
D)error control
A)network virtual terminal
B)file transfer, access, and management
C)mail service
D)error control
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is not applicable for IP?
A)error reporting
B)handle addressing conventions
C)datagram format
D)packet handling conventions
A)error reporting
B)handle addressing conventions
C)datagram format
D)packet handling conventions
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following field in IPv4 datagram is not related to fragmentation?
A)flags
B)offset
C)tos
D)identifier
A)flags
B)offset
C)tos
D)identifier
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
The TTL field has value 10. How many routers (max) can process this datagram?
A)11
B)5
C)10
D)1
A)11
B)5
C)10
D)1
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
If the value in protocol field is 17, the transport layer protocol used is
A)tcp
B)udp
C)icmp
D)igmp
A)tcp
B)udp
C)icmp
D)igmp
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
The data field cannot carry which of the following?
A)tcp segment
B)udp segment
C)icmp messages
D)smtp messages
A)tcp segment
B)udp segment
C)icmp messages
D)smtp messages
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
What should be the flag value to indicate the last fragment?
A)0
B)1
C)ttl value
D)protocol field value
A)0
B)1
C)ttl value
D)protocol field value
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
Which of these is not applicable for IP protocol?
A)is connectionless
B)offer reliable service
C)offer unreliable service
D)does not offer error reporting
A)is connectionless
B)offer reliable service
C)offer unreliable service
D)does not offer error reporting
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following demerits does Fragmentation have?
A)complicates routers
B)open to dos attack
C)overlapping of fragments.
D)all of the mentioned
A)complicates routers
B)open to dos attack
C)overlapping of fragments.
D)all of the mentioned
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
Which field helps to check rearrangement of the fragments?
A)offset
B)flag
C)ttl
D)identifer
A)offset
B)flag
C)ttl
D)identifer
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
A 4 byte IP address consists of
A)only network address
B)only host address
C)network address & host address
D)network address & mac address
A)only network address
B)only host address
C)network address & host address
D)network address & mac address
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
Consider a situation in which you are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem?
A)netware 4.11 defaults to 802.2 encapsulation
B)netware 4.11 defaults to 802.3 encapsulation
C)cisco routers only work with netware 3.11
D)netware 3.11 defaults to 802.2 encapsulation
A)netware 4.11 defaults to 802.2 encapsulation
B)netware 4.11 defaults to 802.3 encapsulation
C)cisco routers only work with netware 3.11
D)netware 3.11 defaults to 802.2 encapsulation
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
NetWare IPX addressing uses a network number and a node number. Which statement is not true?
A)the network address is administratively assigned and can be up to 16 hexadecimal digits long
B)the node address is always administratively assigned
C)the node address is usually the mac address
D)if the mac address is used as the node address, then ipx eliminates the use of arp
A)the network address is administratively assigned and can be up to 16 hexadecimal digits long
B)the node address is always administratively assigned
C)the node address is usually the mac address
D)if the mac address is used as the node address, then ipx eliminates the use of arp
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck