Unit 5 - Practice Quiz

CSE306 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following best defines the primary function of the Network Layer in the OSI model?

A. Framing and physical addressing
B. Node-to-node delivery with error control
C. Process-to-process delivery
D. Routing and logical addressing

2 In the context of routing algorithms, what does the Optimality Principle state?

A. If router is on the optimal path from router to router , then the optimal path from to also falls along the same route.
B. All routers must use the same operating system to achieve optimality.
C. The optimal path is determined solely by the bandwidth of the links.
D. The shortest path is always the one with the fewest number of hops.

3 Which algorithm is commonly used to calculate the shortest path tree in Link State routing protocols like OSPF?

A. Spanning Tree Protocol
B. Dijkstra's Algorithm
C. Bellman-Ford Algorithm
D. Floyd-Warshall Algorithm

4 In Distance Vector Routing, what information does a router send to its neighbors?

A. The status of its own links only
B. Hello packets to discover neighbors
C. The complete topology map of the network
D. Its entire routing table (vectors of distances)

5 The Count-to-Infinity problem is a specific characteristic/drawback of which routing approach?

A. Distance Vector Routing
B. Link State Routing
C. Path Vector Routing
D. Source Routing

6 Which mechanism prevents the Count-to-Infinity problem by prohibiting a router from advertising a route back onto the interface from which it learned it?

A. Hold-down Timers
B. Triggered Updates
C. Split Horizon
D. Route Poisoning

7 In the Leaky Bucket algorithm, what happens if a packet arrives when the bucket is full?

A. The packet is queued indefinitely.
B. The packet is sent immediately at a higher rate.
C. The bucket expands to accommodate the packet.
D. The packet is discarded (dropped).

8 What is the primary difference between Leaky Bucket and Token Bucket algorithms?

A. Leaky Bucket allows bursty traffic; Token Bucket enforces a constant rate.
B. Leaky Bucket enforces a constant output rate; Token Bucket allows for bursty traffic.
C. Leaky Bucket is used for routing; Token Bucket is used for error control.
D. There is no functional difference.

9 Which routing protocol is an Exterior Gateway Protocol (EGP) used for routing between different Autonomous Systems (AS)?

A. EIGRP
B. BGP
C. RIP
D. OSPF

10 In RIP (Routing Information Protocol), what is the value of the metric that signifies a destination is unreachable (infinity)?

A. 100
B. 255
C. 15
D. 16

11 Which packet is sent by a router to the source to signal congestion, effectively telling the source to slow down?

A. Choke Packet
B. Hello Packet
C. Keepalive Packet
D. LSA Packet

12 In Link State Routing, how is the topological information disseminated?

A. By querying the DNS server.
B. By sending path vectors to the central controller.
C. By flooding Link State Packets (LSPs) to all routers in the area.
D. By exchanging routing tables with neighbors only.

13 Congestion control that relies on the receiver sending feedback to the sender is classified as:

A. Closed-loop congestion control
B. Static congestion control
C. Forward error correction
D. Open-loop congestion control

14 What is the formula for the updating rule in the Bellman-Ford equation used in Distance Vector routing? (Where is the cost from to , and is the cost to neighbor )

A.
B.
C.
D.

15 Which of the following describes Flooding?

A. A packet received on one line is sent out on all other lines.
B. Packets are sent based on a probability distribution.
C. A packet is sent only to the destination address.
D. Packets are held in a buffer until the line is clear.

16 OSPF (Open Shortest Path First) divides an Autonomous System into:

A. Segments
B. Areas
C. Zones
D. Clusters

17 What is Backpressure in the context of congestion control?

A. Prioritizing voice traffic over data traffic.
B. Node-by-node congestion propagation in the reverse direction of data flow.
C. Discarding packets at the tail of the queue.
D. Increasing the window size to push more data.

18 Which of the following is a Unicast routing protocol?

A. RIP
B. MOSPF
C. PIM
D. DVMRP

19 The Token Bucket algorithm requires which two parameters?

A. Bucket size and Leak rate
B. Token generation rate and Bucket capacity
C. Hop count and Bandwidth
D. Burst size and Maximum delay

20 Which mechanism allows a router to randomly drop packets before its queue becomes full to prevent global synchronization of TCP sessions?

A. Tail Drop
B. Leaky Bucket
C. Priority Queuing
D. RED (Random Early Detection)

21 BGP uses which type of routing algorithm?

A. Link State
B. Distance Vector
C. Shortest Path First
D. Path Vector

22 In Hierarchical Routing, routers are grouped into:

A. Subnets only
B. Regions or Clusters
C. Datagrams
D. Vectors

23 Which of the following is a symptom of severe congestion?

A. Increased bandwidth
B. Low latency
C. High throughput
D. Packet loss and increased delay

24 In the TCP Congestion Control mechanism (often discussed in network layer contexts regarding flow interaction), what happens during the 'Slow Start' phase?

A. The sender stops sending packets.
B. The congestion window increases linearly.
C. The congestion window remains constant.
D. The congestion window increases exponentially.

25 What is the 'Poison Reverse' technique?

A. Flooding bad packets to clear the buffer.
B. A security attack on routing tables.
C. Reversing the path of the packet to the source.
D. A variation of Split Horizon where the route is advertised with a cost of infinity.

26 Which routing algorithm requires a global knowledge of the network topology?

A. Distance Vector
B. Random Walk
C. Flooding
D. Link State

27 What is the standard administrative distance (trustworthiness) order for these protocols (Lowest to Highest implies Most to Least trusted)?

A. Connected Interface < OSPF < RIP
B. RIP < OSPF < Connected Interface
C. OSPF < Connected Interface < RIP
D. RIP < Connected Interface < OSPF

28 Which concept refers to the maximum amount of data that the network can transmit per unit of time?

A. Jitter
B. Packet Delay
C. Throughput
D. Latency

29 In the context of Quality of Service (QoS), Jitter refers to:

A. The size of the packet header.
B. The total time taken for a packet to reach the destination.
C. The number of packets lost.
D. The variation in packet arrival times.

30 In Congestion Control, what is Load Shedding?

A. Dropping packets when routers cannot process them fast enough.
B. Adding more routers to the network.
C. Compressing data to reduce size.
D. Distributing traffic equally among all links.

31 Which BGP attribute is used to detect loops in routing paths?

A. Next Hop
B. MED
C. Local Preference
D. AS_PATH

32 What happens in the Congestion Avoidance phase of TCP (AIMD)?

A. Window size doubles every RTT.
B. Window size is cut to zero.
C. Window size grows exponentially.
D. Window size increases by 1 segment (MSS) every RTT.

33 ECN (Explicit Congestion Notification) allows routers to:

A. Drop packets immediately.
B. Mark packets to signal impending congestion to endpoints without dropping them.
C. Increase the bandwidth of the link.
D. Reroute packets to a faster path.

34 The Knee in the throughput vs. load graph represents:

A. The point where throughput stops increasing linearly and delay starts increasing rapidly.
B. The point of zero latency.
C. The maximum capacity of the link.
D. The point where throughput drops to zero.

35 Which of the following is true for Static Routing?

A. It is suitable for very large, changing networks.
B. It uses complex algorithms like Dijkstra.
C. Routes are manually configured by the administrator.
D. Routes are updated automatically when topology changes.

36 In OSPF, the Backbone Area is numbered as:

A. Area 1
B. Area 255
C. Area 100
D. Area 0

37 Which variable tracks the available capacity in a Token Bucket algorithm?

A. Counter
B. Sequence Number
C. TTL
D. Window Size

38 What is the main disadvantage of Flooding?

A. It is not robust.
B. It requires complex routing tables.
C. It always finds the longest path.
D. It generates a vast number of duplicate packets, wasting bandwidth.

39 RIP updates are sent periodically every:

A. 60 seconds
B. 30 seconds
C. 90 seconds
D. 10 seconds

40 Traffic Shaping is about:

A. Encrypting the payload.
B. Compressing headers.
C. Controlling the rate of traffic sent to the network to comply with a profile.
D. Dropping packets that exceed limits.

41 In the context of routing, what is Convergence?

A. The merging of two distinct packets.
B. The process of combining two networks.
C. The compression of routing tables.
D. The state where all routers share a consistent view of the network.

42 What type of graph search does the Distance Vector algorithm effectively perform?

A. Breadth-First Search
B. Depth-First Search
C. Minimum Spanning Tree
D. Distributed Bellman-Ford

43 Which field in the IP header is used to prevent infinite looping of packets?

A. Checksum
B. Fragment Offset
C. Time to Live (TTL)
D. Version

44 In a Datagram network (Connectionless), routing decisions are made:

A. Only at the source node.
B. Only at the destination node.
C. For every individual packet.
D. Only once at the connection setup.

45 If a router receives a packet with a destination address that is not in its routing table, and no default route exists, what does it usually do?

A. Broadcasts the packet to all ports.
B. Sends the packet back to the sender.
C. Discards the packet and sends an ICMP Destination Unreachable message.
D. Holds the packet until a route appears.

46 The Cliff in the Load vs. Throughput/Delay graph signifies:

A. The point where congestion begins.
B. The start of the slow start phase.
C. The point where throughput collapses heavily due to extreme congestion.
D. The ideal operating point.

47 RSVP (Resource Reservation Protocol) is used primarily for:

A. Detecting link failures.
B. Assigning IP addresses.
C. Reserving resources (bandwidth/buffers) for QoS flows.
D. Routing table updates.

48 In Dijkstra's algorithm, which data structure is typically used to select the node with the smallest tentative distance?

A. Queue
B. Linked List
C. Priority Queue
D. Stack

49 What is the primary metric used by OSPF to calculate cost?

A. Bandwidth
B. Delay
C. Load
D. Hop Count

50 Which of the following describes Multipath Routing?

A. Distributing traffic load over multiple available paths to the same destination.
B. Sending the same packet over multiple paths for redundancy.
C. Routing all traffic through a single best path.
D. Routing based on multiple metrics like delay and cost combined.