• Courses
  • Tutorials
  • Jobs
  • Practice
  • Contests

Network Layer

Question 41

IPv4 addressing system already gives information about network and host. Along with the Internet Protocol address of host, subnet mask is also needed by the routers inorder to direct the packet to intended network. Host doesn’t redirect packets, then Why does host need subnet mask ?
  • Host need subnet mask for ANDing process inorder to know own network.
  • To get the IP address of destination host
  • To know if intended packet is supposed to send to router or not.
  • To resolve the logical address from DNS server.

Question 42

Consider an IP packet with a length of 4,500 bytes that includes a 20-byte IPv4 header ans 40-byte TCP header. The packet is forwarded to an IPv4 router that supports a Maximum Transmission Unit (MTU) of 600 bytes. Assume that the length of the IP header in all the outgoing fragments of this packet is 20 bytes. Assume that the fragmentation offset value stored in the first fragment is 0. The fragmentation offset value stored in the third fragment is ______ . Note -This was Numerical Type question.
  • 0
  • 72
  • 144
  • 216

Question 43

__________ do not take their decisions on measurements or estimates of the current traffic and topology.
  • Static algorithms
  • Adaptive algorithms
  • Non - adaptive algorithms
  • Recursive algorithms

Question 44

The IP address __________ is used by hosts when they are being booted.
  • 0.0.0.0
  • 1.0.0.0
  • 1.1.1.1
  • 255.255.255.255

Question 45

Which of the given wireless technologies used in IoT, consumes the least amount of power ?
  • Zigbee
  • Bluetooth
  • Wi-Fi
  • GSM/CDMA

Question 46

Which of the following statements are true ? (a) The fragmentation fields in the base header section of IPv4 have moved to the fragmentation extension header in IPv6. (b) The authentication extension header is new in IPv6. (c) The record route option is not implemented in IPv6.
  • (a) and (b) Only
  • (b) and (c) Only
  • (a) and (c) Only
  • (a), (b) and (c)

Question 47

Which of the following routing technique / techniques is / are used in distributed systems ? (a) Fixed Routing (b) Virtual Routing (c) Dynamic Routing
  • (a) only
  • (a) and (b) only
  • (c) only
  • All (a), (b), (c)

Question 48

Match with the suitable one:
List-I                                      List-II
(A) Multicast group membership              1. Distance vector routing
(B) Interior gateway protocol               2. IGMP
(C) Exterior gateway protocol               3. OSPF
(D) RIP                                     4. BGP
  • A-2, B-3, C-4, D-1
  • A-2, B-4, C-3, D-1
  • A-3, B-4, C-1, D-2
  • A-3, B-1, C-4, D-2

Question 49

Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milliseconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is ________.
  • 20
  • 10
  • 30
  • 40

Question 50

In RSA public key cryptosystem suppose n = p ∗ q where p and q are primes. (e, n) and (d, n) are public and private keys respectively. Let M be an integer such that o < M < n and φ(n) = (p – 1)(q – 1). Which of the following equations represent RSA public key cryptosystem ?
     I. C ≡ Me(mod n)         
        M ≡ (C)d(mod n) 
    II.ed ≡ 1(mod n)
   III.ed ≡ 1(mod φ(n))           
    IV. C ≡ Me(mod φ(n))
        M ≡ Cd(mod φ(n))
Codes :
  • I and II
  • I and III
  • II and III
  • I and IV

There are 88 questions to complete.

Last Updated :
Take a part in the ongoing discussion