Sample2(1)
.docx
keyboard_arrow_up
School
George Mason University *
*We aren’t endorsed by this school
Course
105
Subject
Computer Science
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by ChiefRiver7339 on coursehero.com
1.
How many layers are there in the TCP/IP protocol suite?
a.
2
b.
3
c.
4
d.
5
e.
6
2. IPv6 addresses are how many bits long?
a.
32
b.
64
c.
100
d.
128
e.
256
3. UDP provides sequencing, error control and flow control just like TCP
a.
True
b.
False
4. Which of the following are standard twisted pair cables?
a.
CAT 2
b.
CAT 3
c.
CAT 5
d.
All of the above
e.
None of the above
5.
Which technology uses software and hardware to automatically collect and analyze data about a device's surroundings, to present relevant, actionable information to the end user?
a.
Edge Computing
b.
Workplace Hub
c.
Contextual Computing
d.
5G Wireless
6.
Which technology serves as a centralized IT ecosystem that automates IT processes and unifies all of user’s existing technologies (including hardware, software, and services) into a one stop connected platform?
a.
Edge Computing
b.
Workplace Hub
c.
Contextual Computing
d.
5G Wireless
7.
Which are simulation types for implementing of virtual reality technology?
a.
Non-Immersive
b.
Semi-Immersive
c.
Fully-Immersive
d.
All of the above
e.
None of the above
8.
Which of the following are Deep Learning Algorithms?
a.
Convolutional Neural Network (CNN)
b.
Deep Neural Network (DNN) c.
Long Short-Term Memory (LSTM)
d.
All of the Above
e.
None of the Above
9.
Which of the following is the process of examining large and varied data sets to uncover hidden patterns, correlations, and information to help make business decisions?
a.
Internet of Everything (IOE)
b.
Big Data Analytics
c.
Contextual Computing
d.
Mobile Payments
10. Which of the following networks is a subnet?
a.
128.5.0.0
b.
10.0.0.0
c.
192.168.1.0
d.
172.16.64.0
11. In terms of classful IPv4 addressing, what class is the following IPv4 address 75.0.0.7?
a.
Class A
b.
Class B
c.
Class C
d.
Class D
e.
Class E
12. Decryption is the process of converting plaintext into ciphertext
a.
True
b.
False
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Subject - Data communication networks
How can you write the following IPv4 address 192.168.10.2 in IPv6 format?
A network on the Internet has a subnet mask of 255.255.248.0. What is the maximum number of hosts it can handle?
Explain two problems of SMTP.
Thank you in advance!
arrow_forward
Name two types of network edges?
What is the main task of the network router?
What is a protocol?
Name two network core tasks?
List the types of delays in the network with its mathematical formulation.
How does packet loss happen in the network?
Define the following terms, network sniffing, IP spoofing
what is the difference between DoS vs. DDoS attacks?
List two benefits of network layering
list OSI and TCP layers
What is the difference between frame and packet?
What is the difference between broadcast and multicast?
arrow_forward
Q2.Part A:
Suppose COMPUTER-A send a message “I will work hard in Finals” on internet to COMPUTER-B. How that communication takes place according to OSI 7 layers model? Write very short description of each of 7 layers DIAGRAM for your answers on both computers.
Part B:
Mentioned differences and similarities between term “TCP/IP” and “OSI Model” in your own words?
arrow_forward
Why do HTTP, FTP, SMTP, and POP3 run on top TCP rather than on UDP?
2. What is the difference between Routing and Forwarding?
3. What is HOL blocking? Does it occur in input ports or output ports?
arrow_forward
Q1: Simple, compare between each of the following?
TCP and UDP protocols
Network and transport layers
RDT 2.1 and RDT 2.2
Pipelined protocols and Stop and wait protocols
Q2. Write the definition of each TCP header filed.
Q3. State and example to clarify the bad performance of RDT 3.0
arrow_forward
QUESTION 54
Network layer provides two basic functionalities (_______), and(_______)
QUESTION 55
Network layer consists of two planes:(_________) , and(_______).
QUESTION 56
What is AIMD in TCP stands for?
What is the main purpose of it?
QUESTION 57
Link layer uses IP for source and destination addresses
True
False
QUESTION 58
SHA-1 is a Cryptographic hash function
True
False
QUESTION 59
CRC is a cryptographic hash function
True
False
arrow_forward
1. What is the purpose of an IP address mask? Suppose an IP address isidentified as 200.60.40.88/24. What is the network address in this case?What is the host address? How many hosts can this network addresssupport? Repeat this exercise for the IP address 222.66.44.80/26.2. Explain the concept of a DHCP lease. How is it obtained? How is itused? What does it provide?3. Explain the operation of the Address Resolution Protocol.4. Explain the relationship between corresponding layers at the sourceand destination nodes of a TCP/IP communication connection.
arrow_forward
13.9 What is the purpose of an IP address mask? Suppose an IP address is identified as 222.44.66.88/24. What is the network address in this case? What is the host address? How many hosts can this network address support? Repeat this exercise for the IP address 200.40.60.80/26.
13.10 Explain the concept of a DHCP lease. How is it obtained? How is it used? What does it provide?
14.5 In recent years, much of the storage and communication of data has been in digital form, even if the source data is actually analog. Even most television is now transmitted digitally. What benefits and advantages are gained by using digital storage and signaling?
arrow_forward
6.Which one of the followings is a network layer device?
Switch
Repeater
Router
Modem
7.Which port number is used for HTTP protocol ?
110
80
21
24
8.In frame format, which field is used to detect bit errors ?
parity
checksum
TTL
type
9.Which protocol/protocols allow sender to send more than one packet at the same time according to the number that is defined by window size?
Pipeline protocols
Rdt protocol
DHCP protocol
Stop-and-wait protocol
10.Which one is not a layer of TCP/IP protocol stack?
Physical layer
Session layer
Link layer
Application layer
arrow_forward
2. Explain the concept of a DHCP lease. How is it obtained? How is itused? What does it provide?
3. Explain the operation of the Address Resolution Protocol.
4. Explain the relationship between corresponding layers at the sourceand destination nodes of a TCP/IP communication connection.
arrow_forward
Assume that a private internet requires that the messages at the application layer be encrypted and decrypted for security purposes. If we need to add some information about the encryption/decryption process (such as the algorithms used in the process), does it mean that we are adding one layer to the TCP/IP protocol suite? Redraw the TCP/IP layers (Figure 2.4 part b) if you think OS
arrow_forward
16.How many layers are there in OSI reference model?
7
5
6
4
17.Which one is true for the following sentence ? " In IP routing path to destination is determined by the ..................................... .
source address
source and destination address
virtual circuit numbers
destination address
18.To divide a network into 6 subnets, how many bits do need to borrow from the bits that are used for the devices in a network?
6
3
8
4
19.Which is a protocol of transport layer
TCP
DHCP
FTP
HDP
20.For the network that includes the device with IP address 194.80.26.110, how many hosts are there in the network?
145
194
255
110
arrow_forward
QUESTION 16
Should DHCP be used to set up server ip?
True
False
QUESTION 17
RSA is a public cryptography algorithm
True
False
QUESTION 18
RSA is slower than DES
True
False
QUESTION 19
DNS is a scalable protocol
True
False
QUESTION 20
Network layer is implemented only in the network core
True
False
arrow_forward
Networking Assignment
1) Flow control is provided by TCP and UDP.
True
False
2) Which class of routing algorithms is likely to send more messages over the network?
Link State
Distance Vector
3)A switch's interface has a transmission rate of 70 Mbps. How long will the switch take to transmit a full Ethernet frame of 1526 bytes?
174 microseconds
200 microseconds
45 microseconds
9 milliseconds
4) What is the primary responsibility of the physical layer?
To transmit individual bits across a medium
To transmit data between two directly connected network devices
To transmit data between two hosts across a network of many interconnected devices
To provide end-to-end services such as reliable delivery, flow control, and persistent connection
To provide a service to the end user such as delivering a web page or transferring a file
5) Suppose users share a 20 Mbps link. Also suppose each user transmits continuously at 2 Mbps when transmitting, but each user…
arrow_forward
Question 5. Write a note on the following a. Compare the header format of IPv4 and IPv6. How tunneling is used to transition fromIPv4 to IPv6?b. Use Dijkstra’s algorithm on the following network to find shortest paths.
c. Data 01110001101010100 is received where receiver uses odd parity. Is the data corrupted.Justify your answerd. What are the three main classes of MAC protocols? Explain each a one or two linese. Give steps of ARP mapping from IP to MAC address.
arrow_forward
QUESTION 67
Explain what happen in the following scenario in TCP
A sends the first segment to B (successfully delivered)
A sends the second segment to B (successfully delivered)
B sends the ACK for the first segment (dropped)
B sends the ACK for the second segment (successfully delivered)
QUESTION 68
What is the need to IP address? why not to simply use MAC addresses?
arrow_forward
Using both TCP and UDP, which of the following protocols is it?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Related Questions
- Subject - Data communication networks How can you write the following IPv4 address 192.168.10.2 in IPv6 format? A network on the Internet has a subnet mask of 255.255.248.0. What is the maximum number of hosts it can handle? Explain two problems of SMTP. Thank you in advance!arrow_forwardName two types of network edges? What is the main task of the network router? What is a protocol? Name two network core tasks? List the types of delays in the network with its mathematical formulation. How does packet loss happen in the network? Define the following terms, network sniffing, IP spoofing what is the difference between DoS vs. DDoS attacks? List two benefits of network layering list OSI and TCP layers What is the difference between frame and packet? What is the difference between broadcast and multicast?arrow_forwardQ2.Part A: Suppose COMPUTER-A send a message “I will work hard in Finals” on internet to COMPUTER-B. How that communication takes place according to OSI 7 layers model? Write very short description of each of 7 layers DIAGRAM for your answers on both computers. Part B: Mentioned differences and similarities between term “TCP/IP” and “OSI Model” in your own words?arrow_forward
- Why do HTTP, FTP, SMTP, and POP3 run on top TCP rather than on UDP? 2. What is the difference between Routing and Forwarding? 3. What is HOL blocking? Does it occur in input ports or output ports?arrow_forwardQ1: Simple, compare between each of the following? TCP and UDP protocols Network and transport layers RDT 2.1 and RDT 2.2 Pipelined protocols and Stop and wait protocols Q2. Write the definition of each TCP header filed. Q3. State and example to clarify the bad performance of RDT 3.0arrow_forwardQUESTION 54 Network layer provides two basic functionalities (_______), and(_______) QUESTION 55 Network layer consists of two planes:(_________) , and(_______). QUESTION 56 What is AIMD in TCP stands for? What is the main purpose of it? QUESTION 57 Link layer uses IP for source and destination addresses True False QUESTION 58 SHA-1 is a Cryptographic hash function True False QUESTION 59 CRC is a cryptographic hash function True Falsearrow_forward
- 1. What is the purpose of an IP address mask? Suppose an IP address isidentified as 200.60.40.88/24. What is the network address in this case?What is the host address? How many hosts can this network addresssupport? Repeat this exercise for the IP address 222.66.44.80/26.2. Explain the concept of a DHCP lease. How is it obtained? How is itused? What does it provide?3. Explain the operation of the Address Resolution Protocol.4. Explain the relationship between corresponding layers at the sourceand destination nodes of a TCP/IP communication connection.arrow_forward13.9 What is the purpose of an IP address mask? Suppose an IP address is identified as 222.44.66.88/24. What is the network address in this case? What is the host address? How many hosts can this network address support? Repeat this exercise for the IP address 200.40.60.80/26. 13.10 Explain the concept of a DHCP lease. How is it obtained? How is it used? What does it provide? 14.5 In recent years, much of the storage and communication of data has been in digital form, even if the source data is actually analog. Even most television is now transmitted digitally. What benefits and advantages are gained by using digital storage and signaling?arrow_forward6.Which one of the followings is a network layer device? Switch Repeater Router Modem 7.Which port number is used for HTTP protocol ? 110 80 21 24 8.In frame format, which field is used to detect bit errors ? parity checksum TTL type 9.Which protocol/protocols allow sender to send more than one packet at the same time according to the number that is defined by window size? Pipeline protocols Rdt protocol DHCP protocol Stop-and-wait protocol 10.Which one is not a layer of TCP/IP protocol stack? Physical layer Session layer Link layer Application layerarrow_forward
- 2. Explain the concept of a DHCP lease. How is it obtained? How is itused? What does it provide? 3. Explain the operation of the Address Resolution Protocol. 4. Explain the relationship between corresponding layers at the sourceand destination nodes of a TCP/IP communication connection.arrow_forwardAssume that a private internet requires that the messages at the application layer be encrypted and decrypted for security purposes. If we need to add some information about the encryption/decryption process (such as the algorithms used in the process), does it mean that we are adding one layer to the TCP/IP protocol suite? Redraw the TCP/IP layers (Figure 2.4 part b) if you think OSarrow_forward16.How many layers are there in OSI reference model? 7 5 6 4 17.Which one is true for the following sentence ? " In IP routing path to destination is determined by the ..................................... . source address source and destination address virtual circuit numbers destination address 18.To divide a network into 6 subnets, how many bits do need to borrow from the bits that are used for the devices in a network? 6 3 8 4 19.Which is a protocol of transport layer TCP DHCP FTP HDP 20.For the network that includes the device with IP address 194.80.26.110, how many hosts are there in the network? 145 194 255 110arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Comptia A+ Core 1 Exam: Guide To Computing Infras...Computer ScienceISBN:9780357108376Author:Jean Andrews, Joy Dark, Jill WestPublisher:Cengage LearningA+ Guide to Hardware (Standalone Book) (MindTap C...Computer ScienceISBN:9781305266452Author:Jean AndrewsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning