PLEASE READ CAREFULLY BEFORE YOU START

Similar documents
PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM

CSCI 466 Midterm Networks Fall 2013

CPSC 441 COMPUTER NETWORKS MIDTERM EXAM

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer

Student ID: CS457: Computer Networking Date: 3/20/2007 Name:

CSE 3214: Computer Network Protocols and Applications. Midterm Examination

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

Lecture 12. Application Layer. Application Layer 1

Computer Networks - Midterm

CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM SOLUTION

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

Computer Networks - Midterm

CPS 706 Computer Networks (Fall 2011)

Review of Previous Lecture

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

Computer Network 2015 Mid-Term Exam.

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

Review for Internet Introduction

CSC 4900 Computer Networks:

MOCK EXAMINATION. Computer Networks

Module 2 Overview of Computer Networks

Module 2 Overview of. Computer Networks

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

CSC 4900 Computer Networks: End-to-End Design

CSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

Operating Systems CS 571

Different Layers Lecture 21

CMPE150 Midterm Solutions

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer

Introduction to computer networking

Application Layer: HTTP

Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa

Computer Communication Networks Midterm Review

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4

===================================================================== Exercises =====================================================================

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

COMP 562: Advanced Topics in Networking

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication

Chapter 2 Application Layer

CMSC 322 Computer Networks Applications and End-To- End

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Chapter 11: Wide-Area Networks and the Internet

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

4. The transport layer

Goal and A sample Network App

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

DATA COMMUNICATOIN NETWORKING

CS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Question Points Score total 100

Introduction to the Application Layer. Computer Networks Term B14

Q U E S T I O N 3 In the current version of IP (IPv4), the use of TCP and UDP headers differ in which of the following ways?

CSEN 404 Introduction to Networks. Mervat AbuElkheir Mohamed Abdelrazik. ** Slides are attributed to J. F. Kurose

Chapter 2 Network Models 2.1

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

Data Communication & Computer Networks MCQ S

COE 431 Computer Networks. Welcome to Exam I Thursday April 02, Instructor: Wissam F. Fawaz

Chapter 2 Application Layer

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

Sirindhorn International Institute of Technology Thammasat University

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11

Session 2. Background. Lecture Objectives

NT1210 Introduction to Networking. Unit 10

Introduction to Networking

Chapter 1. Computer Networks and the Internet

ECE 650 Systems Programming & Engineering. Spring 2018

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

Application Layer Network Layer

Data Communication & Networks Final Exam (Fall 2008) Page 1 / 13. Course Instructors: Engr. Waleed Ejaz. Marks Obtained Marks

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

Layered Model. DoD Model. ISO/OSI Model

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Summer 2008) Midterm. Date: June 12, 2008

THE UNIVERSITY OF NEW SOUTH WALES

Expected Time: 90 min PART-A Max Marks: 42

Data Communications and Networks

Chapter 2. Application Layer

Internet Architecture & Performance. What s the Internet: nuts and bolts view

NWEN 243. Networked Applications. Transport layer and application layer

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Computer Networking. Introduction. Quintin jean-noël Grenoble university

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

ECE 4400:427/527 - Computer Networks Spring 2017

CS 640: Introduction to Computer Networks

Application Level Protocols

Transcription:

MIDTERM EXAMINATION #1 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Intersession 2009 Question Paper NOTE: Students may take this question paper with them after the examination. PLEASE READ CAREFULLY BEFORE YOU START 1. This is a CLOSED book test; no notes, textbooks, calculators or computer aids are allowed. 2. PRINT your name legibly and clearly with your Student ID in the space on the Scantron sheet. Use an HB pencil and carefully and thoroughly fill in the circle corresponding to the answer selection for each question. 3. You will be asked to sign your name once before leaving the exam room (sign-out). 4. PLACE ANSWERS on the Scantron sheet provided. 5. If you need more space for rough work you may use any additional space on the examination. 6. You are not allowed to give or receive unauthorized help with your test. Any misconduct, as outlined by the Senate bylaw 31 article I, will be reported accordingly. 7. You have 65 minutes to complete this test. 8. Copies of the original Midterm examination answer sheets will be returned to students. 9. This examination has a maximum of 54 marks. Good Luck! All questions are either Multiple Choice or True-False. For each Multiple Choice question, you are to choose only one response which best answers the question. For True-False questions you may only choose one option (True or False). If an error is made on the Scantron sheet you must carefully erase the error and then carefully and completely indicate your intended choice of answer. NOTATION: The following symbols are used in the examination. MB megabyte (1024 KB) KB kilobyte (1024 B) B - 1 byte (8 b) b bit m metre km kilometer (1000 m) Mbps megabits per second kbps kilobits per second (1024 b) km/s kilometers per second msec millisecond (1/1000 second) 2009 by Dr. R. Kent All Rights Reserved. No part of this document may be reproduced without written author permission. Page 1 of 9

1. In the Client-Server approach, clients communicate directly with each other. 2. TCP and UDP are sometimes called connection oriented protocols. 3. HTTP is called a stateless protocol. 4. A user requests a Web page that consists of some text and two JPEG images. For this page, the client will send one request message and receive three response messages. 5. Two distinct document references (for example, cs.uwindsor.ca/60-367/index.html and cs.uwindsor.ca/60-367/image01.jpeg) can be sent over the same persistent connection. 6. In the Client-Server approach, clients may have dynamic IP addresses. 7. With non-persistent connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages. 8. The DATE: header in the HTTP response message indicates when the object the response was last modified. 2009 by Dr. R. Kent All Rights Reserved. No part of this document may be reproduced without written author permission. Page 2 of 9

9. Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. What application layer protocols are needed in this scenario? A) DNS and HTTP B) TCP for DNS; TCP for HTTP C) UDP for DNS; TCP for HTTP D) None of the above are correct responses. 10. Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. What transport layer protocols besides HTTP are needed in this scenario? A) DNS and HTML B) TCP for DNS; TCP for HTTP C) UDP for DNS; TCP for HTTP D) All of the above are correct responses. 11. Cookies maintain state at sender/receiver over multiple transactions by. A) Maintaining open connections B) Providing protocol endpoints C) Utilizing the OSI Session Layer D) Placing data in JAR files 12. Which of the following is not a proper layer of the TCP stack? A) Application B) Network C) Session D) Link 13. HTTP is referred to as a stateless protocol because. A) clients do not maintain historic information about transactions with servers B) servers and clients do not maintain open connections C) server maintains no information about past client requests D) All of the above responses are correct 14. Cookies may be used to maintain user-server state. 2009 by Dr. R. Kent All Rights Reserved. No part of this document may be reproduced without written author permission. Page 3 of 9

15. Store and Forward refers to storing a complete message on each router before forwarding it to the next router on the way to the receiver. 16. Congestion is the primary cause of. A) processing delay B) queuing delay C) transmission delay D) propagation delay 17. UDP is a reliable protocol. 18. TCP is a reliable protocol. 19. Most local area networks use electrostatic network hardware. 20. A network s speed is expressed in terms of. A) Routing protocol B) Round trip time C) Bit rate and latency D) I/O buffer response 21. Photonic networks utilize switches. A) LAN B) IP C) CBR D) ATM 22. TCP abstracts data communication to appear as an apparent stream of flowing data. 2009 by Dr. R. Kent All Rights Reserved. No part of this document may be reproduced without written author permission. Page 4 of 9

23. Both UDP and TCP require that the applications recognize their own data formats. 24. Which of the following is not a proper layer of the OSI stack? A) Propagation B) Network C) Session D) Link 25. Applications require which of the following transport services. A) Data loss and Security B) Timing C) Throughput D) All of the above responses are correct 26. Modern networks support networking sharing using techniques such as. A) Time division multiplexing B) Frequency division multiplexing C) Packet switching D) All of the above responses are correct 27. Using TCP, two messages are exchanged before a connection exists. 28. Multiple TCP streams can distinguished on a given machine using. A) Ports B) IP addresses C) network interface cards D) All of the above responses are correct. 29. A machine (and even a single program) may have several open sockets at any time. 2009 by Dr. R. Kent All Rights Reserved. No part of this document may be reproduced without written author permission. Page 5 of 9

30. HTTP is called a protocol, SMTP is called a protocol. A) Pull (HTTP) / Pull (SMTP) B) Push (HTTP) / Pull (SMTP) C) Push (HTTP) / Push (SMTP) D) Pull (HTTP) / Push (SMTP) 31. MIME protocol refers to. A) micromedia email extension B) movement for internet multimedia email C) multimedia mail extension D) None of these responses are correct. 32. Domain Name System (DNS) is a transport-layer protocol where host, routers and name servers communicate to resolve names (that is, provide address/name translation). 33. Consider a packet of length 1024 bytes. Assuming the packet must travel over a link of distance 2500 kilometers with propagation speed 2.5 x 10 8 m/s and transmission rate 2 Mbps, what is the propagation delay? A) 21 msec B) 10 msec C) 1 msec D) 10 microsec 34. Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1 = 500 kbps, R2 = 2 Mbps and R3 = 1 Mbps. Assuming no other traffic in the network, what is the throughput for the file transfer? A) 500 kbps B) 2 Mbps C) 1 Mbps D) 3.5 Mbps 35. The type of domain that deals with edu, com, net, org, and other similar extensions, is called a. A) Root DNS servers B) Top-level DNS servers C) Authoritative DNS servers D) Local DNS servers 2009 by Dr. R. Kent All Rights Reserved. No part of this document may be reproduced without written author permission. Page 6 of 9

36. FTP makes use of connections. A) UDP for data and UDP for control B) TCP for data and UDP for control C) TCP for data and TCP for control D) None of these responses are correct 37. The socket that represents a passive open is a(n) socket. A) Client B) Server C) TCP D) Application 38. All datagrams contain 2 ports. 39. Message encapsulation refers to. A) designating message contents with descriptive data B) embedding message payloads and protocol headers within logically layered packages C) reliance upon IP for transmitting messages D) allowing for message content verification 40. UDP and TCP are examples of layer protocols. A) Application B) Presentation C) Transport D) Network 41. Transport services and protocols. A) provide logical communication between app processes running on different hosts B) are provided in end systems C) make more than one transport protocol available to applications D) All of the above responses are correct 2009 by Dr. R. Kent All Rights Reserved. No part of this document may be reproduced without written author permission. Page 7 of 9

42. In order to deal with the situation where, too many sources send too much data too fast for a network to handle, it is necessary to use a technique called. A) Flow control B) Congestion control C) Routing control D) Dynamic packet management 43. Routers provide feedback to end systems to assist. A) Network-assisted congestion control B) Network-assisted flow control C) End-end congestion control D) End-end flow control 44. TCP is not suitable for supporting circuit switched connections because. A) it does not maintain persistent connections B) it does not support quality of service C) routers used for TCP packet processing must acknowledge receipt of every packet D) All of the above responses is correct 45. By using Web caching. A) it is possible to reduce response time for client request B) it is possible to reduce traffic on an institution s access link C) the cache acts as both client and server D) All of the above responses is correct 46. Delivery and storage of email messages to a server is achieved using. A) Post Office Protocol (POP) B) Internet Mail Access Protocol (IMAP) C) Simple Mail Transfer Protocol (SMTP) D) Hypertext Transfer Protocol (HTTP) 47. Pure Peer-to-Peer systems do not use always on servers. 2009 by Dr. R. Kent All Rights Reserved. No part of this document may be reproduced without written author permission. Page 8 of 9

48. Peer-to-Peer networks are used. A) for content sharing B) for Instant Messaging C) for IP based telephony D) All of the above responses are correct. 49. Suppose Host A wants to send a large file of size 4 MB to Host B. The path from Host A to Host B has three links, of rates R1 = 500 kbps, R2 = 2 Mbps and R3 = 1 Mbps. Roughly, how long will it take to transmit the file to Host B? A) 6.4 seconds B) 10.7 seconds C) 32 seconds D) 64 seconds 50. A Denial-of-Service attack can be performed by bombarding a server with connection requests. 51. Trojan Horses may be embedded in web page plugins. 52. Sending packets with false source address is called. A) Packet sniffing B) IP spoofing C) Record and Playback D) Worms 53. A stream is a sequence of packets that flow into or out of a process. 54. UDP provides unreliable transfer of datagrams between client and server. 2009 by Dr. R. Kent All Rights Reserved. No part of this document may be reproduced without written author permission. Page 9 of 9