Monday, September 14, 2015

Advanced Computer Networks Quiz 1

1.Which of the following does not voilate end to end principle of Internet design?
Select one:
a. Packet sniffer{correct}
b. NAT Router
c. Proxy Server
d. Firewall

2.Which of these is/are become easy to achieve in the Internet using Datagram approach-

Select one or more:
a. Resource Management
b. Providing multiple services{correct}
c. Surviability{correct}
d. Connecting different types of networks{correct}

3.Which of the following is correctly defines RED gatways?
Select one:
a. Differentiate between persistent and intermittent congestion level{correct}
b. Consider only the intermittent congestion level
c. Consider only the persistent congestion level
d. Can not identify the connections, which uses more bandwidth than others

4.Which of the following is NOT true for linear control based congestion control mechanism?
Select one:
a. Multiplicative increase and additive increase improves utilization
b. Multiplicative increase or multiplicative decrease doesn't change in fairness
c. Additive increase reduces fairness and additive decrease improves fairness{correct}
d. Additive increase improves fairness and additive decrease reduces fairness

5.Which of these has not been mentioned as a design goal for the Ineternet design in the Clark's paper on Design Philosophy of DARPA Internet Design?
Select one:
a. Resource Acountability
b. Cost Effectiveness
c. Surviability
d. Security{correct}

6.Which of the following is/are violates the Internet's End to End principle?
Select one or more: 2 are correct but i selected all that's also correct'
a. File Sharing using FTP
b. NAT Firewall{correct}
c. HTTP Proxy Server{correct}
d. Virtual Private Networking (VPN)

7.The TCP's sender side window size is NOT dependent on-
Select one:
a. Maximum Segment Size (MSS){correct}
b. Network Congestion
c. Receiver side buffer space
d. Round Trip Time (RTT)

8.Consider an application that transmits data at a steady rate (for example, the sender generates an N bit unit of data every k time units, where k is small and fixed). Also, when such an application starts, it will continue running for a relatively long period of time. Which type of network will be more appropriate for this application?
Select one:
a. Circuit Switched{correct}
b. Application performance is independent to the Networks types
c. Can not determined
d. Packet Switched

9.Which of the following is not an appropriate reason for congestion collapse
Select one:
a. Undelivered packets in the network
b. Bursty traffic nature{correct}
c. Mismatch of transmission and retransmission packet size
d. Spurious retransmissions of packets still in flight

10.Which of these congestion control policy is not used at Transport layer in the Internet?
Select one:
a. Packet discard policy{correct}
b. Out of order packet caching
 c. Timeout
 d. Negative Acknowledgement

11.Consider, the four flows with their corresponding demands are 2, 2.6, 4 and 5 units. The total capacity of the link is 10 units. What will be the correct sequence of bandwidth allocation for these flows using Max-min algorithm?
Select one:
 a. 2.0, 2.6, 2.6, 2.8
 b. 2.0, 2.6, 2.7, 2.7{correct}
 c. 2.0, 2.6, 2.4, 3.0
 d. 2.6, 2.0, 2.7, 2.7

12.Which of the following tussle example belongs to the Tussle of Trust as per "Tussle in Cyber Space....? paper? 

Select one:
 a. Customer want to share the contents but proprietary content holders do not like it
 b. ISPs does application filtering/monitoring but customer don't like it{correct}
 c. ISPs insists customers to use certain services offered by them only
 d. Customers tussle with providers to get the service at a low price

13.Consider a link having a capacity of 12Mbps. Four flows, f1, f2, f3 and f4 , all send traffic over this link at rates r1=2Mbps, r2=4Mbps, r3=3Mbps and r4=6Mbps respectively. Under max-min fairness allocation, what outgoing rate does each flow receive through this link?
Select one:
 a. f1=2Mbps, f2=3.5Mbps, f3=3Mbps, f4=3.5Mbps{correct}
 b. f1=2Mbps, f2=4Mbps, f3=3Mbps, f4=3Mbps
 c. f1=2Mbps, f2=3.5Mbps, f3=3.5Mbps, f4=3Mbps
 d. f1=2Mbps, f2=2Mbps, f3=3Mbps, f4=5Mbps

14.Host A sends a TCP segment (Seq=43, ACK=103) with payload (i.e. application data) of 20 bytes. The host B successfully received the segment and wants to send a segment with payload of 28 bytes. What will be the value of Seq and ACK field in the reply from host B? Assume that host A sends the first segment to the host B after connection setup.
Select one:
 a. Seq=44, ACK=63
 b. Can't find with given data
 c. Seq=103, ACK=63{correct}
 d. Seq=81, ACK=103

15.The TCP round trip time (RTT) is currently 300 msec. Three RTT samples has been collected as 260, 320, and 240 msec, respectively, what is the new estimated RTT after second sample according to jacobson's formula? Assume α = 0.8
Select one:
 a. 292.6 ms
 b. 292 ms
 c. 297.6 ms{correct}
 d. 296.2 ms

16.Which of the following is/are TRUE for TCP protocol?

Select one or more:
 a. It is a byte stream protocol{correct}
 b. TCP receiver doesn't receive out of order packets
 c. It supports reliable in order delivery of packets{correct}
 d. TCP receiver doesn't send cumulative ACKs
 e. It does flow control{correct}

17.When multiple packets are dropped from a single window, which of the TCP implementation is good in reducing spurious retransmissions?
Select one:
 a. Reno
 b. Vegas
 c. Westwood
 d. SACK{correct}
 e. Tahoe

18.Which of the queuing method implemented at the router does suffer from the global window synchronization problem?
Select one:
 a. RED
 b. FQ + Random
 c. FIFO + DropTail{correct}

19.The three TCP flows are sharing a bottleneck link. The bandwidth share among them is 2,4, and 4 Mbps respectively. What is the fairness ratio for the link?
Select one:
 a. 0.755
 b. 0.852
 c. 0.850
 d. 0.925{correct}
 e. 0.700

20.As per Name Data Networking (NDN) architecture, an interest packet can be forwarded to multiple interfaces by a router. This can lead to a looping problem. Which of the following is the correct justification to say that packet is not going to loop?

Select one:
 a. The information contained in PIT avoids the looping
 b. The uniqueness of interest packets is identified by a time stamp value
 c. The Nonce field in the packet takes care of it{correct}
 d. NDN inherently supports multi-path routing

No comments:

Post a Comment