0% found this document useful (0 votes)
18 views20 pages

CN Exam

The document consists of multiple-choice questions covering various networking topics, including congestion control, subnetting, IP addressing, DHCP, NAT, and routing protocols. It also addresses concepts like packet loss, network performance, and the roles of different agents in Mobile IP. Additionally, it discusses advanced topics such as MPLS, MTU, and error message types in networking.

Uploaded by

itsmeaung01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views20 pages

CN Exam

The document consists of multiple-choice questions covering various networking topics, including congestion control, subnetting, IP addressing, DHCP, NAT, and routing protocols. It also addresses concepts like packet loss, network performance, and the roles of different agents in Mobile IP. Additionally, it discusses advanced topics such as MPLS, MTU, and error message types in networking.

Uploaded by

itsmeaung01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Multiple Choice

1• In which one of the following, the congestion control is


easy?
A) Datagram
B) Virtual circuit
C) Both (A) and (B)
D) None of the above

2• The IP network 192.168.50.0 is to be divided into 10


equal sized subnets. Which of the following subnet masks
can be used for the above requirement?
A) 255.255.0.0
B) 255.255.240.0
C) 255.255.255.0
D) 255.255.255.240

3• Which of the following address belongs class A?


A) 121.12.12.248
B) 130.12.12.248
C) 128.12.12.248
D) 129.12.12.248

4• Which of the following IP addresses can be used as a


loop-back addresses?
• A. 0.0.0.0
• B. 255.255.255.255
• C. 127.0.0.1
• D. 224.0.0.0

5• Addresses are reserved for multicasting.


• A) Class B
• B) Class C
• C) Class D
• D) Class E

6• Which of the following is not a mechanism that DHCP


supports for IP address allocation?
• A) Automatic allocation
• B) Static allocation
• C) Dynamic allocation
• D) Manual allocation

7• What is the primary function of the network layer?


• a) Data encryption
• b) Routing packets from source to destination
• c) Error detection and correction
• d) Establishing a session between devices

8• What is the main purpose of subnetting in IP-


addressing?
A. To increase the address space
B. To assign multiple addresses to a single device
C. To facilitate NAT translation
D. To reduce the size of the routing tables

9• What is delay in the context of network performance?


A. The amount of data that can be transmitted in a given
amount of time
B. The time it takes for a packet to travel from the source
to the destination
C. The number of errors occurring during data
transmission
D. The ability to maintain a connection without dropping
packets

10• Packet loss in a network is most commonly caused


by:
A. High bandwidth
B. Network congestion
C. Reduced latency
D. Increased jitter

11• Which port number does DHCP use for the server?
a) 67
b) 68
c) 69
d) 80
12• Which of the following is NOT a message type used
in DHCP?
a) DHCPDISCOVER
b) DHCPREQUEST
c) DHCPFORWARD
d) DHCPOFFER

13• What is the primary purpose of NAT?


a) To translate domain names to IP addresses
b) To allow multiple devices on a local network to share a
single public IP address
c) To encrypt data during transmission
d) To provide dynamic IP addresses

14• What is the purpose of the DHCP lease time?


A) To specify the duration for which the IP address is valid
B) To specify the server response time
C) To determine the client request frequency
D) To measure the server uptime

15• To allow a many-to-many relationship between


private-network hosts and external server programs, the
NAT translation table is created with
A. IP-addresses
B. port addresses
C. Both IP-addresses and port addresses
D. Either IP addresses or port addresses
1. In a typical router, which of the following is not stored
in the routing table?
a) Destination address
b) Next hop
c) Time to Live (TTL)
d) Interface

2. The primary difference between ICMP and IP is that


ICMP:
a) Provides error reporting and diagnostic functions
b) Is responsible for routing packets
c) Establishes connections between hosts
d) Manages data encryption 22.8.2024

3. The protocol used to discover the MAC address


associated with a given IP address in IPv4 is:
a) ARP
b) RARP
c) ICMP
d) DHCP

4. The primary purpose of the Internet Protocol (IP) is to:


a) Manage data encryption
b) Route packets from source to destination
c) Handle error correction
d) Control network congestion

5. In Mobile IP, what is the role of the Home Agent (HA)?


a) To provide the mobile device with a new IP address
b) To forward packets to the mobile device’s current
location
c) To manage the routing tables of the network
d) To authenticate users on the network

6. What is a Care-of Address (CoA) in Mobile IP?


a) A temporary IP address assigned to a mobile node
while it is away from its home network
b) The permanent IP address of a mobile node
c) The IP address of the Home Agent
d) The MAC address of a mobile device

7. In Mobile IP, the process of registering a Care-of


Address (CoA) with the Home Agent is known as:
a) Encapsulation
b) Tunneling
c) Registration
d) Routing

8. What is the purpose of the Foreign Agent (FA) in Mobile


IP?
a) To provide the mobile node with a new permanent IP
address
b) To route packets to the mobile node when it is away
from its home network
c) To assign the mobile node a Care-of Address
d) To maintain the routing table for the network

9. An ICMP "Time Exceeded" message is typically sent


when:
a) A packet is too large for the network
b) A packet's TTL (Time to Live) value reaches zero
c) A host is unreachable
d) A packet is successfully delivered

10. Which ICMP message type is used to report


congestion in the network?
a) Echo reply
b) Time exceeded
c) Router advertisement
d) Source quench

1. Choose the correct answer.


i.Which of the following algorithms is commonly used in
unicast routing to find the shortest path?
a) Bellman-Ford algorithm
b) Dijkstra’s algorithm
c) Path vector algorithm
d) Distance vector algorithm

ii.In distance-vector routing, each router shares its


knowledge with:
a) All routers in the network
b) Its neighbors
c) Only the destination router
d) Only the source router

iii.Which of the following is NOT a characteristic of the


Open Shortest Path First (OSPF) protocol?
a) Link-state routing
b) Uses Dijkstra's algorithm
c) Broadcasts the entire routing table periodically
d) Supports hierarchical routing

iv.What is the main purpose of the Border Gateway


Protocol (BGP)?
a) Intra-domain routing
b) Inter-domain routing
c) Network congestion control
d) Address resolution

v.In distance-vector routing, each router shares its


knowledge with:
a) All routers in the network
b) Its neighbors
c) Only the destination router
d) Only the source router

1. Choose the correct answer.


i.In multicast routing, which type of tree structure is
typically used for high-density networks?
a) Unicast tree
b) Source-based tree
c) Shared tree
d) Hybrid tree

ii.What is the purpose of Reverse Path Forwarding (RPF)


in multicast routing?
a) To prevent loops in the routing process
b) To ensure multicast data flows on the optimal path
c) To ensure that multicast traffic is sent to all networks
d) To reverse the data flow direction
iii.Which of the following protocols is most commonly
used for multicast group management?
a) DVMRP
b) MOSPF
c) PIM
d) IGMP
iv.Which of the following is NOT a valid IPv6 address?
a) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
b) fe80::1
c) 2004:5678:9abc:def0:1234:5678:9abc:def0:1234
d) ::1

v.What is the primary reason for the transition from IPv4


to IPv6?
a) Increased bandwidth
b) Better encryption
c) Larger address space
d) Faster transmission speeds
vi.Which of the following protocols is responsible for
neighbor discovery in IPv6?
a) Autoconfiguration
b) ICMPv6
c) RIP
d) OSPFv3

Chapter-18

18.3.3 – Packet Loss


➢When a router receives a packet while processing
another packet, the received packet needs to be stored in
the input buffer waiting for its turn.
➢A router, however, has an input buffer with a limited
size. A time may come when the buffer is full and the
next packet needs to be dropped.
➢The effect of packet loss on the Internet network layer
is that the packet needs to be resent, which in turn may
create overflow and cause more packet loss.
➢Alot of theoretical studies have been done in queuing
theory to prevent the overflow of queues and prevent
packet loss.
Network Congestion
➢The reduced quality of service that occurs when a
network node is carrying more data than it can handle.
➢Typical effects : queuing delay, packet loss or the
blocking of connections
➢Consequence of congestion- an incremental increase in
offered load leads either only to a small increase or even
a decrease in network throughput.

18.4.4 -Dynamic Host Configuration Protocol


(DHCP)
➢Dynamic Host Configuration Protocol (DHCP) is an
application-layer program, using the client-server
paradigm, that actually helps TCP/IP at the network layer.
➢A network manager can configure DHCP to assign
permanent IP addresses to the host and routers. DHCP
can also be configured to provide temporary, on demand,
IP addresses to hosts.
➢In addition to its IP address, a computer also needs to
know the network prefix (or address mask).
➢Most computers also need two other pieces of
information, such as the address of a default router to be
able to communicate with other networks and the
address of a nameserver to be able to use names instead
of addresses.
➢In other words, four pieces of information are normally
needed: the computer address, the prefix, the address of
a router, and the IP address of a name server. DHCP can
be used to provide these pieces of information to the
host.

Multi-Protocol Label Switching (MPLS)


• In MPLS standard, some conventional routers in the
Internet can be replaced by MPLS routers, which can
behave like a router and a switch.
• When behaving like a router, MPLS can forward the
packet based on the destination address; when behaving
like a switch, it can forward a packet based on the label.
• To simulate connection-oriented switching using a
protocol like IP, the first thing that is needed is to add a
field to the packet that carries the label.
• TheIPv4packet format does not allow this extension.
• The solution is to encapsulate the IPv4 packet in an
MPLS packet
• The whole IP packet is encapsulated as the payload in
an MPLS packet and an MPLS header is added.
Chapter-19

MAXIMUM TRANSFER UNIT (MTU)


• Each link-layer protocol has its own frame format. One
of the features of each format is the maximum size of the
payload that can be encapsulated.
• When a datagram is encapsulated in a frame, the total
size of the datagram must be less than this maximum
size.
• When a datagram is fragmented, each fragment has its
own header with most of the fields repeated.
• A fragmented datagram may itself be fragmented if it
encounters a network with an even smaller MTU.
• A datagram may be fragmented several times before it
reaches the final destination.
• A datagram can be fragmented by the source host or
any router in the path. The reassembly of the datagram,
however, is done only by the destination host, because
each fragment becomes an independent datagram.
• The host or router that fragments a datagram must
change the values of three fields: flags, fragmentation
offset, and total length.
• The rest of the fields must be copied. Of course, the
value of the checksum must be recalculated regardless of
fragmentation.

TYPES OF ERROR MESSAGES


1. Destination Unreachable: uses to define the type of
error message and the reason why a datagram has not
reached its final destination.
2. Source quench: informs the sender that the network
has encountered congestion and the datagram has been
dropped, the source needs to slow down sending more
datagrams.
3. Redirection message: uses when the source uses a
wrong router to send out its message, informs the source
that it needs to change its default router in the future.
4. Parameter problem: sends this message when either
there is a problem in the header of a datagram or some
options are missing or cannot be interpreted.
5. Query messages: uses to test the liveliness of hosts or
routers in the Internet, find the one-way or the round-trip
time for an IP datagram between two devices, or even
find out whether the clocks in two devices are
synchronized. Naturally, query messages come in pairs:
request and reply
➢echo request and echo reply
➢Timestamp request and timestamp reply
COMMUNICATION BETWEEN AGENTS
To communicate with a remote host, a mobile host goes
through three phases: agent discovery, registration, and
data transfer.

Chapter-20

Distance Vectors
• The concept of a distance vector is the rationale for the
name distance-vector routing.
• A least-cost tree is a combination of least-cost paths
from the root of the tree to all destinations.
• These paths are graphically glued together to form the
tree. Distance-vector routing unglues these paths and
creates a distance vector, a one-dimensional array to
represent the tree.
• Note that the name of the distance vector defines the
root, the indexes define the destinations, and the value
of each cell defines the least cost from the root to the
destination.

Link-State Routing
• Link-state (LS) routing uses the term link-state to define
the characteristic of a link (an edge) that represents a
network in the internet.
• In this algorithm the cost associated with an edge
defines the state of the link.
• Links with lower costs are preferred to links with higher
costs; if the cost of a link is infinity, it means that the link
does not exist or has been broken.

Two reasons for using a single protocol


✓A scalability problem and an administrative issue
✓Scalability problem means that the size of the
forwarding tables becomes huge, searching for a
destination in a forwarding table becomes time-
consuming, and updating creates a huge amount of
traffic.
✓The administrative issue is related to the Internet
structure.
✓Each ISP is run by an administrative authority.
✓The administrator needs to have control in its
system.
✓The organization must be able to use as many
subnets and routers as it needs, may desire that the
routers be from a particular manufacturer, may wish to
run a specific routing algorithm to meet the needs of
the organization, and may want to impose some
policy on the traffic passing through its ISP.

Chapter-21

Chapter-22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy