Computer-Networks
Question 1 |
S1: Destination MAC address of an ARP reply is a broadcast address.
S2: Destination MAC address of an ARP request is a broadcast address.
Which of the following choices is correct?
A | Both S1and S2are true. |
B | S1is true and S2is false. |
C | S1is false and S2is true. |
D | Both S1and S2are false. |
Question 2 |
A | If the second fragment is lost, R will resend the fragment with the IP identification value 0x1234. |
B | If the second fragment is lost, P is required to resend the whole TCP segment. |
C | Two fragments are created at R and the IP datagram size carrying the second fragment is 620 bytes. |
D | TCP destination port can be determined by analysing only the second fragment. |

Question 3 |
- The time taken for processing the data frame by the receiver is negligible.
- The time taken for processing the acknowledgement frame by the sender is negligible.
- The sender has an infinite number of frames available for transmission.
- The size of the data frame is 2,000 bits and the size of the acknowledgment frame is 10 bits.
- The link data rate in each direction is 1 Mbps (=106bits per second).
- One way propagation delay of the link is 100 milliseconds.
A | 51 |
Tt(packet) = L / B.W => 2000 bits / 10^6 bps = 2 x 10^-3 sec = 2 millisec
Tt(Ack) = L / B.W. => 10 bits / 10^6 bps = 10^-5 sec = 10^-2 millisec = 0.01 millisec
Tp = 100 millisec
Total time = Tt(packet) + 2 x Tp + Tt(Ack)
=> 2 + 2 x 100 + 0.01 = 202.01 millisec
Efficiency = 50 % = ½
Efficiency = Useful Time / Total time
½ = n x Tt / Total time
=> 2 x n x Tt = Total time
=>2 x n x 2 = 202.01
=> n = 202.01 / 4 => 50.50
For minimum, we have to take ceil, Hence size of window = 51
Question 4 |
A | If the client was waiting to receive a packet, it may wait indefinitely. |
B | If the client sends a packet after the server reboot, it will receive a RST segment. |
C | The TCP server application on S can listen on P after reboot. |
D | If the client sends a packet after the server reboot, it will receive a FIN segment. |
- True
Since broken connections can only be detected by sending data, the receiving side will wait forever. This scenario is called a “half-open connection” because one side realizes the connection was lost but the other side believes it is still active. - True
The situation resolves itself when client tries to send data to server over the dead connection, and server replies with an RST packet (not FIN). - True
Yes, a TCP Server can listen to the same port number even after reboot. For example, the SMTP service application usually listens on TCP port 25 for incoming requests. So, even after reboot the port 25 is assigned to SMTP. - False
The situation resolves itself when client tries to send data to server over the dead connection, and server replies with an RST packet (not FIN), causing client to finally to close the connection forcibly.
FIN is used to close TCP connections gracefully in each direction (normal close of connection), while TCP RST is used in a scenario where TCP connections cannot recover from errors and the connection needs to reset forcibly.
Question 5 |
What is the distance of the following code 000000, 010101, 000111, 011001, 111111?
A | 2 |
B | 3 |
C | 4 |
D | 1 |
010101 ⊕ 011001 = 001100
Question 6 |
Consider a TCP connection between a client and a server with the following specifications: the round trip time is 6 ms, the size of the receiver advertised window is 50 KB, slow start threshold at the client is 32 KB, and the maximum segment size is 2 KB. The connection is established at time t=0. Assume that there are no timeouts and errors during transmission. Then the size of the congestion window (in KB) at time t+60 ms after all acknowledgements are processed is ______.
A | 44 |
Here, t + 60 is nothing but at the 10 RTT (60/6 = 10), but here it’s asking after all acknowledgement are processed it means after the 10th RTT, i.e., at the 11RTT.
1st transmission: 2 KB
2nd transmission: 4 KB
3rd transmission: 8 KB
4th transmission: 16 KB
5th transmission: 32 KB (Threshold reached)
6th transmission: 34 KB
7th transmission: 36 KB
8th transmission: 38 KB
9th transmission: 40 KB
10th transmission: 42 KB
At the completion of 10th transmission RTT = 10*6 = 60 ms
For the 11th transmission, The congestion window size is 44 KB.
Question 7 |
An organization requires a range of IP addresses to assign one to each of its 1500 computers. The organization has approached an Internet Service Provider (ISP) for this task. The ISP uses CIDR and serves the requests from the available IP address space 202.61.0.0/17. The ISP wants to assign an address space to the organization which will minimize the number of routing entries in the ISP’s router using route aggregation. Which of the following address spaces are potential candidates from which the ISP can allot any one to the organization?
I. 202.61.84.0/21 II. 202.61.104.0/21 III. 202.61.64.0/21 IV. 202.61.144.0/21
A | I and II only
|
B | III and IV only
|
C | II and III only
|
D | I and IV only
|
And to Assign an IP address for 1500 computer, we require 11 bit from HID part.
So NID + SID = 17 + 4 = 21 bits and HID = 11 bits
NID HID
202.61.0 0000 000.00000000
So, from the given option, possible IP Address is
I. 84 -> 0 1010 100 (Because in HID bit 1 is not possible)
II. 104 -> 0 1101 000
III. 64 -> 0 1000 000
IV. 144 -> 1 0010 000 (Because in NID bit 1 is not possible )
Question 8 |
Consider the following statements about the functionality of an IP based router.
- I. A router does not modify the IP packets during forwarding.
II. It is not necessary for a router to implement any routing protocol.
III. A router should reassemble IP fragments if the MTU of the outgoing link is larger than the size of the incoming IP packet.
Which of the above statements is/are TRUE?
A | I and II only |
B | II only |
C | I only |
D | II and III only
|
II: Is True.
III: Reassemble is not necessary at the router.
Question 9 |
Assume that you have made a request for a web page through your web browser to a web server. Initially the browser cache is empty. Further, the browser is configured to send HTTP requests in non-persistent mode. The web page contains text and five very small images. The minimum number of TCP connections required to display the web page completely in your browser is ______.
A | 6 |
Hence, 1 Text + 5 Image = 6 Objects
Question 10 |
Suppose that in an IP-over-Ethernet network, a machine X wishes to find the MAC address of another machine Y in its subnet. Which one of the following techniques can be used for this?
A | X sends an ARP request packet to the local gateway's IP address which then finds the MAC address of Y and sends to X |
B | X sends an ARP request packet with broadcast IP address in its local subnet |
C | X sends an ARP request packet to the local gateway's MAC address which then finds the MAC address of Y and sends to X |
D | X sends an ARP request packet with broadcast MAC address in its local subnet |
Since both are present in the same subnet thus an ARP request packet can be sent as broadcast MAC address, all will see but the only destination will reply as a unicast reply.
Video Reference :
http://eclassesbyravindra.com/mod/page/view.php?id=147
Question 11 |
Consider that 15 machines need to be connected in a LAN using 8-port Ethernet switches. Assume that these switches do not have any separate uplink ports. The minimum number of switches needed is _____.
A | 3 |
B | 7 |
C | 1 |
D | 5 |
Therefore, the total required number of the switches = Ceil (15 /7) = 3

Question 12 |
In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also known that Φ(n) = 2880, where Φ() denotes Euler's Quotient Function, then the prime factor of n which is greater than 50 is ______.
A | 107 |
B | 97 |
C | 45 |
D | 92 |
n = 3007, fi(n) = 2880 → fi(n) = (p – 1) (q – 1),
where p, q are prime factor of n.
The unit place of n is 7, it is a prime number and factor will be
1.7=7
11*17
21*37
31*47
….
31*97 =>3007
n = 3007 => 31*97
Therefore, 31 & 97 are the two prime numbers, which is satisfying the condition and 97 is greater than 50.
So, 97 is the correct answer.
Other methods:
When ϕ(n) is given when n=pq where p and q are prime numbers, then we have
ϕ(n) = (p−1)(q−1) = pq−(p+q)+1
But pq=n,
therefore, ϕ(n) = n−(p+q)+1 and p+q = n+1−ϕ(n).
Now, p and q are the roots of the equation,
x2 − (p+q)x + pq = (x-p)(x-q)
Substituting for p+q and pq in the above equation
x2 - (n+1-ϕ(n))x + n
Question 13 |
Consider three machines M, N and P with IP addresses 100.10.5.2, 100.10.5.5, and 100.10.5.6 respectively. The subnet mask is set to 255.255.255.252 for all the three machines. Which one of the following is true?
A | M, N, and P all belong to the same subnet |
B | Only M and N belong to the same subnet |
C | M, N and P belong to three different subnets |
D | Only N and P belong to the same subnet |

Therefore, N and P belong to the same subnet.
Question 14 |
The value of 351 mod 5 is ______.
A | 3 |
B | 5 |
C | 2 |
D | 1 |
⇒ 31 = 3 ⇒ 3 mod 5 = 3
32 ⇒ 9 mod 5 = 4
33 ⇒ 27 mod 5 = 2
34 ⇒ 81 mod 5 = 1
35 ⇒ 243 mod 5 = 3
For every four numbers sequence is repeating.
So, (51 % 4) = 3
⇒ 33 = 27
⇒ 27 mod 5 = 2
Question 15 |
Which of the following protocol pairs can be used to send and retrieve e-mails (in that order)?
A | SMTP, MIME |
B | SMTP, POP3 |
C | IMAP, POP3 |
D | IMAP, SMTP |
POP3: Post Office Protocol (Responsible for retrieve email)
SMTP: Simple Mail Transfer Protocol (Responsible for send Email)
IMAP: Internet Message Access protocol (Responsible for store and view)
MIME: Multi purpose Internet Mail Extensions (For media)
Question 16 |
Consider an IP packet with a length of 4,500 bytes that includes a 20-byte IPv4 header and a 40-byte TCP header. The packet is forwarded to an IPv4 router that supports a Maximum Transmission Unit (MTU) of 600 bytes. Assume that the length of the IP header in all the outgoing fragments of this packet is 20 bytes. Assume that the fragmentation offset value stored in the first fragment is 0.
The fragmentation offset value stored in the third fragment is __________.
A | 144 |
B | 145 |
C | 146 |
D | 147 |
Therefore Payload = 600 - 20 = 580 bytes.
As we know fragment size should be multiple of 8 but 580 bytes is not a multiple of 8, therefore fragment size is 576 bytes.
Offset value of kth fragment = Fragment size *( kth fragment - 1) / scaling factor
Offset value of third fragment = 576 * (3-1) / 8 = 144
Question 17 |
Consider a simple communication system where multiple nodes are connected by a shared broadcast medium (like Ethernet or wireless). The nodes in the system use the following carrier-sense based medium access protocol. A node that receives a packet to transmit will carrier-sense the medium for 5 units of time. If the node does not detect any other transmission in this duration, it starts transmitting its packet in the next time unit. If the node detects another transmission, it waits until this other transmission finishes, and then begins to carrier-sense for 5 time units again. Once they start to transmit, nodes do not perform any collision detection and continue transmission even if a collision occurs. All transmissions last for 20 units of time. Assume that the transmission signal travels at the speed of 10 meters per unit time in the medium.
Assume that the system has two nodes P and Q, located at a distance d meters from each other. P starts transmitting a packet at time t=0 after successfully completing its carrier-sense phase. Node Q has a packet to transmit at time t=0 and begins to carrier-sense the medium.
The maximum distance d (in meters, rounded to the closest integer) that allows Q to successfully avoid a collision between its proposed transmission and P’s ongoing transmission is ___________.
A | 50 |
B | 51 |
C | 52 |
D | 53 |
Now signal travels at the speed of 10 meters per unit time.
Therefore, in 5 unit time, it can travel a maximum distance (d) of 50 m (5*10), which allows the receiver (Q) to sense that the channel is busy.
Question 18 |
(i) The cwnd increase by 2 MSS on every successful acknowledgement.
(ii) The cwnd approximately doubles on every successful acknowledgement.
(iii) The cwnd increase by 1 MSS every round trip time.
(iv) The cwnd approximately doubles every round trip time.
Which one of the following is correct?
A | Only (ii) and (iii) are true |
B | Only (i) and (iii) are true
|
C | Only (iv) is true |
D | Only (i) and (iv) are true |
Initially, TCP starts with cwnd of 1 MSS. On every ack, it increases cwnd by 1 MSS.
That is, cwnd doubles every RTT.
Initially sends 1 segment. On ack, sends 2 segments.
After these 2 acks come back, sends 4 segments etc.
TCP rate increases exponentially during slow start.
Slow start continues till cwnd reaches threshold.
After threshold is reached, cwnd increases more slowly, by one 1 MSS every RTT.
Question 19 |
Match the following:
Field Length in bits P. UDP Header's Port Number I. 48 Q. Ethernet MAC Address II. 8 R. IPv6 Next Header III.32 S. TCP Header's Sequence Number IV. 16
A | P-III, Q-IV, R-II, S-I |
B | P-II, Q-I, R-IV, S-III |
C | P-IV, Q-I, R-II, S-III |
D | P-IV, Q-I, R-III, S-II |
Q. Ethernet MAC Address - 48 bits
R. IPV6 Next Header - 8 bits
S. TCP Header’s Sequence Number - 32 bits
Question 20 |
Consider a long-lived TCP session with an end-to-end bandwidth of 1 Gbps (= 109 bits/second). The session starts with a sequence number of 1234. The minimum time (in seconds, rounded to the closest integer) before this sequence number can be used again is _________.
A | 33 |
B | 34 |
C | 35 |
D | 36 |
The process of using all the sequence number and repeating a previously used sequence number.
The time taken to wrap around is called wrap around time:
Minimum Time = Wrap around time = Total number of bits in sequence number / Bandwidth = 232 * 8 / 109 = 34.35 == 34 (closest integer)
Question 21 |
Match the pairs in the following questions by writing the corresponding letters only.
(A) IEEE 488 (P) specifies the interface for connecting a single device (B) IEEE 796 (Q) specifies the bus standard for connecting a computer to other devices including CPU’s (C) IEEE 696 (R) specifies the standard for an instrumentation bus (D) RS232-C (S) specifies the bus standard for the “backplane” bus called multibus.
A | Out of syllabus. |
Question 22 |
Start and stop bits do not contain an ‘information’ but are used in serial communication for
A | Error detection |
B | Error correction |
C | Synchronization |
D | Slowing down the communications |
Question 23 |
A simple and reliable data transfer can be accomplished by using the ‘handshake protocol’. It accomplishes reliable data transfer because for every data item sent by the transmitter __________.
A | in this case receiver has to respond that receiver can be able to receive the data item. |
Question 24 |
- For any two letters, the code assigned to one letter must not be a prefix of the code assigned to the other letter.
- For any two letters of the same frequency, the letter which occurs earlier in the dictionary order is assigned a code whose length is at most the length of the code assigned to the other letter.
A | 21 |
B | 30 |
C | 23 |
D | 25 |
Input String : abbccddeee
The character frequencies are
Character |
a |
b |
c |
d |
e |
Frequency |
1 |
2 |
2 |
2 |
3 |
Binary Code |
? |
? |
? |
? |
? |


Question 25 |
A | 135 |
1 frames takes = Tt = L / B.w. => 1000 / 10^6 = 1 millisec
1000 frame Tt = 1000 x 1 millisec = 1 sec
In 1 sec, 1000 frames sends, which is 1 millisec per frame.
So, G = 1
Efficiency of Pure Aloha (η) = G x e-2G
where G = Number of requests per time slot willing to transmit.
e = Mathematical constant approximately equal to 2.718
So, η = 1 x 2.718(-2 x 1) = 0.1353
Therefore, In 1 sec1000 frames = 0.1353 x 1000 = 135.3(closest integer) =>135
Throughput => 135
Question 26 |
A | The next hop router for a packet from R to P is Y. |
B | The distance from R to Q will be stored as 7. |
C | The next hop router for a packet from R to Q is Z. |
D | The distance from R to P will be stored as 10. |
Given R gets the distance vector (3,2,5)
After the one iteration distance vector from X to P, Y to P, and Z to P is (7, 6, 5) respectively
The distance vector from R to P via X Y Z is (3+7, 2+6, 5+5) =(10, 8, 10)
So Take minimum distance from R to P which is 8 via Y
After the iteration distance vector from X to Q, Y to Q, Z to Q is ( 4, 6, 8) respectively
The distance vector from R to Q via X Y Z is (3+4, 2+6, 5+8) = (7, 8 13)
So Take minimum distance from R to Q which is 7 via X.
Question 27 |
A | 111 |
B | 100 |
C | 101 |
D | 110 |

Question 28 |
A | SYN bit = 1, SEQ number = X+1, ACK bit = 0, ACK number = Y, FIN bit = 0 |
B | SYN bit = 0, SEQ number = X+1, ACK bit = 0, ACK number = Y, FIN bit = 1 |
C | SYN bit = 1, SEQ number = Y, ACK bit = 1, ACK number = X+1, FIN bit = 0 |
D | SYN bit = 1, SEQ number = Y, ACK bit = 1, ACK number = X, FIN bit = 0 |
Q will send the SYN bit = 1 to the connection establishment.
Q Seq number will be Y different from X
ACK bit = 1 because sending the ACK
ACK number = X+1 (Next seq number id)
FIN bit = 0 (Because establishing the connection)
Question 29 |
A | 33 |
1 sec = 20^30 / 8 bytes
=> 1 sec = 20^30 / 8 sequence number
=> 60 sec =20^30 x 60 / 8 bytes
Number of sequence bits required = log (20^30 x 60 / 8) => 33
Question 30 |
A | 7.08 ms |
Tt = L / B => 1000 x 8 bits / 10^8 bps = 0.08 ms
Tp = D / V => 2100 x 1000 m / 3 x10^8 ms = 7 ms
Therefore, Total time = 7.08 ms
Question 31 |

The routers exchange distance vector routing information and have converged on the routing tables, after which the link Q−R fails. Assume that P and Q send out routing updates at random times, each at the same average rate. The probability of a routing loop formation (rounded off to one decimal place) between P and Q, leading to count-to-infinity problem, is___________.
A | 1 |
If asked for R, from among P, Q, R
Probability = 1 /3
Question 32 |

Which of the following prefixes in CIDR notation can be collectively used to correctly aggregate all of the subnets in the routing table?
A | 12.20.164.0/20 |
B | 12.20.164.0/22 |
C | 12.20.164.0/21 |
D | 12.20.168.0/22 |
Question 33 |
A | 3 |
1.root server, 2. TLD DNS server, 3. authoritative server.
So there will be three pairs of request and response here.
Question 34 |

What is the number of subnets inside the enterprise network?
A | 3 |
B | 12 |
C | 6 |
D | 8 |
Where router 2 (via Firewall) has the half of the addresses.
Router 1 (via web server) has other half which is further divided into two subnets which is web server and router 3. So total of 3 subnets possible.
Question 35 |
Suppose that the maximum transmit window size for a TCP connection is 12000 bytes. Each packet consists of 2000 bytes. At some point of time, the connection is in slow-start phase with a current transmit window of 4000 bytes. Subsequently, the transmitter receives two acknowledgements. Assume that no packets are lost and there are no time-outs. What is the maximum possible value of the current transmit window?
A | 4000 bytes |
B | 8000 bytes |
C | 10000 bytes |
D | 12000 bytes |
and packet size =2000 B (or MSS)
Receiver window size = 6 MSS and
Current sender window size = 2 MSS
Slow start threshold = receiver window/2 = 3 MSS
Now current sender window size = 2 MSS <3 MSS,
which implies transmission is in slow start phase.
After receiving first Ack: Current sender window should increase exponentially to 4 MSS but since threshold = 3 MSS, current sender window size goes to threshold which is 3 MSS, then after receiving second Ack: Since now it is in congestion avoidance phase, sender window size increases linearly which makes current sender window
= 4 MSS
= 4 × 2000 B
= 8000 B
Question 36 |
A TCP message consisting of 2100 bytes is passed to IP for delivery across two networks. The first network can carry a maximum payload of 1200 bytes per frame and the second network can carry a maximum payload of 400 bytes per frame, excluding network overhead. Assume that IP overhead per packet is 20 bytes. What is the total IP overhead in the second network for this transmission?
A | 40 bytes |
B | 80 bytes |
C | 120 bytes |
D | 160 bytes |
2120B reach R1's network layer. It removes original IP header, fragments data part at IP and then appends IP header to all fragments and forwards . So, it divides 2100 Bytes into two fragments of size 1200 and 900. And both fragments are sent to R2.
At Router-2:
Both fragments that reach R2 exceed MTU at R2. So, both are fragmented. First packet of 1200B is fragmented into 3 packets of 400 Bytes each. And second packet of 900B is fragmented into 3 fragments of 400, 400 and 100 Bytes respectively.
So, totally 6 packets reach destinations.
So, total IP overhead = 6 × 20 = 120 Bytes
Question 37 |
Consider a simplified time slotted MAC protocol, where each host always has data to send and transmits with probability p = 0.2 in every slot. There is no backoff and one frame can be transmitted in one slot. If more than one host transmits in the same slot, then the transmissions are unsuccessful due to collision. What is the maximum number of hosts which this protocol can support, if each host has to be provided a minimum through put of 0.16 frames per time slot?
A | 1 |
B | 2 |
C | 3 |
D | 4 |
0.16 = 0.2 × 0.8N-1
⇒ 0.8 = 0.8N-1
⇒ N = 2
Question 38 |
In the TCP/IP protocol suite, which one of the following is NOT part of the IP header?
A | Fragment Offset |
B | Source IP address |
C | Destination IP address |
D | Destination port number |
Question 39 |
A 20 Kbps satellite link has a propagation delay of 400 ms. The transmitter employs the "go back n ARQ" scheme with n set to 10. Assuming that each frame is 100 bytes long, what is the maximum data rate possible?
A | 5 Kbps |
B | 10 Kbps |
C | 15 Kbps |
D | 20 Kbps |

Question 40 |
In a data link protocol, the frame delimiter flag is given by 0111. Assuming that bit stuffing is employed, the transmitter sends the data sequence 01110110 as
A | 01101011 |
B | 011010110 |
C | 011101100 |
D | 0110101100 |
Thus using the above logic,
Delimiter flag: 0111
Data sequence: 01110110
So, for a flag of 4 bits we will compare data sequence with a pattern of 3 bits, i.e., 011.
0 1 1 0 1 0 1 1 0 0
In the above pattern the underlined bits are found matched. Hence, 0 in italics is stuffed. Thus resulting in the data sequence as 0110101100 which is option (D).
Question 41 |
In a sliding window ARQ scheme, the transmitter's window size is N and the receiver's window size is M. The minimum number of distinct sequence numbers required to ensure correct operation of the ARQ scheme is
A | min (M,N) |
B | max (M,N) |
C | M + N |
D | MN |
Question 42 |
Consider a 10 Mbps token ring LAN with a ring latency of 400 µs. A host that needs to transmit seizes the token. Then it sends a frame of 1000 bytes, removes the frame after it has circulated all around the ring, and finally releases the token. This process is repeated for every frame. Assuming that only a single host wishes to transmit, the effective data rate is
A | 1Mbps |
B | 2Mbps |
C | 5Mbps |
D | 6Mbps |
Question 43 |
A serial transmission T1 uses 8 information bits, 2 start bits, 1 stop bit and 1 parity bit for each character. A synchronous transmission T2 uses 3 eight bit sync characters followed by 30 eight bit information characters. If the bit rate is 1200 bits/second in both cases, what are the transfer rates of T1 and T2?
A | 100 characters/sec, 153 characters/sec |
B | 80 characters/sec, 136 characters/sec |
C | 100 characters/sec, 136 characters/sec |
D | 80 characters/sec, 153 characters/sec |
Transfer rate = 1200/12 = 100 char/sec
T2: Transfer character in bits = 24 + 240 = 264 bits
In 264 = 30 characters
Then in 1200 = ? 264/30 = 1200/x
x = 136.3 char/sec
So, correct option is (C).
Question 44 |
Consider the following statements:
I. telnet, ftp and http are application layer protocols.
II.l EJB (Enterprise Java Beans) components can be deployed in a J2EE (Java2 Enterprise Edition) application server.
III. If two languages conform to the Common Language Specification (CLS) of the Microsoft.NET framework, then a class defined in any one of them may be inherited in the other.
Which statements are true?
A | l and II only |
B | II and III only |
C | l and III only |
D | I, II and III |
Then there are certain compliance rules which may be used for inheritance. So other statement (I) and (II) are True.
Question 45 |
In TCP, a unique sequence number is assigned to each
A | byte |
B | word |
C | segment |
D | message |
Question 46 |
Which of the following objects can be used in expressions and scriplets in JSP (Java Server Pages) without explicitly declaring them?
A | session and request only |
B | request and response only |
C | response and session only |
D | session, request and response |
Question 47 |
A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet?
A | 14 |
B | 30 |
C | 62 |
D | 126 |
= 26- 2
= 64 - 2
= 62
Question 48 |
A host is connected to a Department network which is part of a University network. The University network, in turn, is part of the Internet. The largest network in which the Ethernet address of the host is unique is:
A | the subnet to which the host belongs |
B | the Department network |
C | the University network |
D | the Internet |
Question 49 |
Which one of the following statements is FALSE?
A | Packet switching leads to better utilization of bandwidth resources than circuit switching. |
B | Packet switching results in less variation in delay than circuit switching. |
C | Packet switching requires more per packet processing than circuit switching. |
D | Packet switching can lead to reordering unlike in circuit switching. |
Question 50 |
Which one of the following statements is FALSE?
A | TCP guarantees a minimum communication rate |
B | TCP ensures in-order delivery |
C | TCP reacts to congestion by reducing sender window size |
D | TCP employs retransmission to compensate for packet loss
|
Sequence numbers can allow receivers to discard duplicate packets and properly sequence reordered packets.
Option C:
If the congestion is deleted, the transmitter decreases the transmission rate by a multiplicative factor.
Option D:
Acknowledgement allows the sender to determine when to retransmit lost packets.