Practice - Exam 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7
At a glance
Powered by AI
The document discusses concepts related to computer networking and network simulation using NS3. Key topics include protocols, layers of the TCP/IP model, and network devices.

NS3 nodes are used to simulate the computers that originate, route, and terminate data in a simulated network.

ICMP is primarily used for error and diagnostic functions.

EEE 4261 01 Computer Networking Lab

SPRIG 2021
Lab practice Quiz/Exam

• Please note: The following sample questions are mainly study suggestions aiming to help you study for the
graded exam/quiz based on lab material.
• Exam questions will be based on the lab slides, lab assignments and associated code (material uploaded to
CANVAS)
• All students are expected to take the exam at the same time, no makeup exam will be offered.
The following pledge is required on all academic work submitted by undergraduate students at Lawrence
Technological University:
"I have neither given nor received unauthorized aid in completing this work, nor have I presented someone
else's work as my own."

Multiple Choice, Multiple Select and True/False:

1- NS3 nodes are used to simulate:


a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned

2-In NS3 EchoClient, EchoServer, the client must know which information?
a) IP address of Server
b) Port number
c) Both IP address of Server & Port number
d) Only its own IP address

3-HTTP is ________ protocol.


a) application layer
b) transport layer
c) network layer
d) data link layer

4-Ping can _________


a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned

5-NS3 uses a generic term also used by other simulators that originates in Graph Theory — ________
a. Edge
b. Node
c. Flow
d. Tree
e. Graph Theory

6-MAC address is of ___________


a) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits

Page 1 of 7
7-ICMP is primarily used for __________
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing

8-Range of port numbers in Internet model is __________


a) 0 and 32,765(8-bit)
b) 0 and 32,765(16-bit)
c) 0 and 65,535(32-bit)
d) 0 and 65,535(16-bit)

9-In the real world, we connect a computer to a network. Often the media over which data flows in these
networks are called ___________
a. Host
b. End system
c. Channels
d. NetDevice
e. Protocol

10-NS-3 class ________ provides methods for managing connections to Nodes and Channels objects
a. NetDevice
b. Container
c. Attribute
d. None of the mentioned

11-In a large simulated network we need to arrange many connections between Nodes, NetDevices and
Channels. Since connecting NetDevices to Nodes, NetDevices to Channels, assigning IP addresses, etc., are
such common tasks in ns-3, NS-3 provide what we call _________to make this as easy as possible
a. Simulations
b. Addresses
c. Nodes
d. Topology helpers

12-In NS-3, an application within a node generate packets and forwarded to Net Devices through protocol
stack, then, then Net Devices send packets to other node(s) via:
a. Channel
b. Container
c. Attribute
d. None of the mentioned

13-What does the following lines do:


LogComponentEnable("UdpEchoClientApplication", LOG_LEVEL_INFO);
a. will result in the application printing out messages as packets are sent and received during the simulation
b. Crash the simulation
c. None of the mentioned
d. Not enough info

14-Transmission data rate is decided by the ____________


a) network layer
b) physical layer
c) data link layer
d) transport layer
Page 2 of 7
15-The NodeContainer [topology helper] provides a convenient way to create, manage and access any Node
objects, is the following code valid?
NodeContainer nodes;
nodes.Create (2);
a. Yes
b. No
c. Maybe
d. depends

16--The next step in constructing a topology is to connect the nodes together into a network. The simplest
form of network ns-3 supports is a single [point-to-point] link between two nodes, is the following code
valid?
NetDeviceContainer: creating, configuring and installing our devices
NetDeviceContainer devices;
devices = pointToPoint.Install (nodes);
a. Yes
b. No
c. Maybe
d. depends

17-Consider the following NS-3 Code:


Ipv4AddressHelper address;
address.SetBase ("10.1.1.0", "255.255.255.0");
By default the addresses allocated will start at one and increase monotonically, so the first address allocated
from this base will be 10.1.1.1, followed by 10.1.1.2,
a. True
b. False
c. Maybe
d. depends

18-In the following code, on which nodes the echoServer will be installed?
ApplicationContainer serverApps = echoServer.Install (nodes.Get (1));
a. On Node 1
b. On Node who has an IP 10.1.1.1
c. On node 2
d. On node 0

19-What will the following simulation produce? Assume all configurations are done properly:
serverApps.Start (Seconds (1.0));
serverApps.Stop (Seconds (10.0));
clientApps.Start (Seconds (20.0));
clientApps.Stop (Seconds (10.0));
a. No output
b. Crash the simulation
c. None of the mentioned
d. Not enough info

20-What is/are the benefit(s) of the Computer Networking?


A. File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above
Page 3 of 7
21-In the following code:
UdpEchoServerHelper echoServer (9);
echoServer (9);
It is an object used to help us create the actual applications, elaborate on the usage of the parameter ‘9’:
a. Port # which must be carefully selected as some of the ports are reserved
b. None of the mentioned
c. Not enough info
d. depends

22-In packet tracer, Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which
of the following are true?
a. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.
b. Router C will use ICMP to inform Router B that Host 2 cannot be reached.
c. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.
d. Router C will send a Destination Unreachable message type.
e. Router C will send a Router Selection message type.
f. Router C will send a Source Quench message type.

23- NS-3 provides models of how packet data networks work and perform, Select what applies:
a. 1-Provides a simulation engine for users to conduct simulation experiments
b. 2-Perform studies that are more difficult or not possible to perform with real system
c. 3-Study system behavior in a highly controlled, reproducible environment
d. 4-ns-3 model set focuses on modeling how Internet protocols and networks work,

24-NS-3 Main Program Structure, is the following sequence valid? Select the out of order steps (only 1):
a. Included Header files
b. Include Namespace
c. Enable/Disable Logging
d. Configure Topology
e. Setup Internet Stack
f. Create Nodes
g. Setup Application
h. Run Simulation

25-In TCPIP Model, when data is sent from device A to device B, the 5th layer to receive data at B is the _____
a) Application layer
b) Transport layer
c) Link layer
d) Session layer

26-Which of the following is not a Networking Device?


A. Gateways
B. Routers
C. none of the mentioned
D. both of the mentioned

27-Routing tables of a router keeps track of:


A. MAC Address Assignments
B. Port Assignments to network devices
C. Distribute IP address to network devices
D. Routes to use for forwarding data to its destination

Page 4 of 7
28-How many hosts are attached to each of the local area networks?
(exclude first and last addresses)
A. 128
B. 254
C. 256
D.64

29-ICMP (Internet Control Message Protocol) is


A. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address
B. a TCP/IP high level protocol for transferring files from one machine to another
C. a protocol used to monitor computers
D. a protocol that handles error and control messages

30-Which of the following is required to communicate between two computers?


A. communications software
B. protocol
C. communications hardware
D. access to transmission medium
E. All of the above

31-Which of the following is the address of the router?


A. The IP address
B. The TCP address
C. The subnet mask
D. The default gateway
E. None of the above

32-Which of the following specifies the network address and host address of the computer?
A. The IP address
B. The default gateway
C. The subnet mask
D. Both of the mentioned
E. None of the above

33-Retransmission of packets must not be done when _______


a) Packet is lost
b) Packet is corrupted
c) Packet is needed
d) Packet is error-free

34-A global network of millions of business, government, educational, and research networks; computer
systems; database; and end users. Select the best fit for answer:
A. Internet works
B. The Internet
C. Internet revolution
D. Internet technologies

35-Which of the following is an application layer service?


a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned

Page 5 of 7
36-Our “Zoom” meeting is held by linking all of us through a computer network. Not only the participants
exchange information and we able to see each other. What is the name of this service?
A. Telemeeting
B. Telemailing
C. Teleconferencing
D. Teletalking
E. None of the above

37-During debugging, we can use the ____________ program to find if a host is alive and responding.
a) traceroute
b) shell
c) ping
d) java

38-Application layer offers _______ service.


a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned

39-To deliver a message to the correct application program running on a host, the _______ address must be
consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned

40-Which of the following is the address of the router?


A. The IP address
B. The TCP address
C. The subnet mask
D. The default gateway
E. None of the above

41- IPv4 address are 32 bits


a) True
b) False

42- A sniffer can listen to all the data transmitted by the internet browser only
a) True
b) False

43- Wireshark® is a network protocol Layer


a) True
b) False

44- Bluetooth is an example of a Local Area Network


a) True
b) False

45- Physical or logical arrangement of network is called Network topology


a) True
b) False
Page 6 of 7
46- Data communication system within a building or campus is a WAN
a) True
b) False

47- Typical speed of the ethernet nowdays is 10 KBPS


a) True
b) False

48- A router resides at the application layer of the TCP/IP Model


a) True
b) False

49-If computer A is sending traffic to


computer B, which option is the source IP
address when a packet leaves R1 on interface
F0/1?

a. IP address of the R2 interface F0/1


b. Ip address of computer B
c. Ip address of R1 interface F0/1
d. Ip address of Computer A

50-Refer to the following packet tracer simulation. Users on the 172.17.22.0 network cannot reach the server
located on the 172.31.5.0 network. The network administrator connected to router Coffee via the console
port, issued the show ip route command, and was able to ping the server. Based on the output of the show ip
route command and the topology shown in the graphic, what is the cause of the failure?

The network has not fully converged.


a. IP routing is not enabled.
b. A static route is configured incorrectly.
c. The FastEthernet interface on Coffee is disabled.
d. The neighbor relationship table is not correctly updated.

Page 7 of 7

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy