CS6250 COMPUTER NETWORKS EXAM 1 QUESTIONS
WITH VERIFIED ACCURATE ANSWERS 2026
How did Licklider and his team in the early 1960s experiment with a precursor to the
Internet? - Answers -Connecting two computers over a dial up telephone line
What is the Domain Name System (DNS) designed to do primarily? - Answers -
Translate domain names into IP addresses
What is the architectural design of the Internet protocol stack based on? - Answers -
Layers
Both the data link and transports layer protocols may provide error correction - Answers
-True
What allows for communication between the application layer and the transport layer? -
Answers -Sockets
Which of the following protocols belong to the application layer?
Ethernet
IP (Internet Protocol)
DNS (Domain Name Service)
UDP (User Datagram Protocol) - Answers -DNS (Domain Name Service)
Which two protocols belong to the transport layer?
UDP
TCP
HTTP
IP - Answers -UDP and TCP
When an application sends a packet of information across the network, this packet
travels down the IP stack and undergoes what process? - Answers -Encapsulation
According to the end-to-end principle, where should most of the Internet's
functionality/intelligence be implemented? - Answers -At the edges of a network
, What is the difference between hubs, bridges, and routers? - Answers -They operate
on different layers of the IP stack
The transport layer protocols offer a logical connection between processes only if the
hosts reside in the same network - Answers -False
A sending host receives a message from the application layer and encapsulates it with
the transport layer header before passing it down to the network layer - Answers -True
An application running on a host can bind to multiple sockets simultaneously - Answers
-True
The identifier of a UDP socket is a tuple of destination IP address and port - Answers -
True
The identifier of a TCP socket is a tuple of source IP address and port - Answers -False
UDP is considered more lightweight than TCP - Answers -True
One of the functionalities that UDP offers is to increase or decrease the pace with which
the sender sends data to the receiver - Answers -False
UDP offers basic error checking - Answers -True
Assume Hosts A, B, and C. Host A has a UDP socket with port 123. Hosts B and C
each send their own UDP segment to Host A. Hosts B and C cannot use the same
destination port 123 for sending their UDP segment - Answers -False
TCP offers in-order delivery of the packets, flow control, and congestion control -
Answers -True
TCP detects packet loss using timeouts and triple duplicate acknowledgements -
Answers -True
Flow control is a rate control mechanism to protect the receiver's buffer from overflowing
- Answers -True
Congestion control is a rate control mechanism to protect the network from congestion -
Answers -True
In TCP, the number of unacknowledged segments that a sender can have is the
minimum of the congestion window and the receive window. - Answers -True
Consider the TCP Reno, congestion window is cut in half in both of the following events:
a) a timeout occurs b) a triple duplicate acknowledgement occurs - Answers -False
WITH VERIFIED ACCURATE ANSWERS 2026
How did Licklider and his team in the early 1960s experiment with a precursor to the
Internet? - Answers -Connecting two computers over a dial up telephone line
What is the Domain Name System (DNS) designed to do primarily? - Answers -
Translate domain names into IP addresses
What is the architectural design of the Internet protocol stack based on? - Answers -
Layers
Both the data link and transports layer protocols may provide error correction - Answers
-True
What allows for communication between the application layer and the transport layer? -
Answers -Sockets
Which of the following protocols belong to the application layer?
Ethernet
IP (Internet Protocol)
DNS (Domain Name Service)
UDP (User Datagram Protocol) - Answers -DNS (Domain Name Service)
Which two protocols belong to the transport layer?
UDP
TCP
HTTP
IP - Answers -UDP and TCP
When an application sends a packet of information across the network, this packet
travels down the IP stack and undergoes what process? - Answers -Encapsulation
According to the end-to-end principle, where should most of the Internet's
functionality/intelligence be implemented? - Answers -At the edges of a network
, What is the difference between hubs, bridges, and routers? - Answers -They operate
on different layers of the IP stack
The transport layer protocols offer a logical connection between processes only if the
hosts reside in the same network - Answers -False
A sending host receives a message from the application layer and encapsulates it with
the transport layer header before passing it down to the network layer - Answers -True
An application running on a host can bind to multiple sockets simultaneously - Answers
-True
The identifier of a UDP socket is a tuple of destination IP address and port - Answers -
True
The identifier of a TCP socket is a tuple of source IP address and port - Answers -False
UDP is considered more lightweight than TCP - Answers -True
One of the functionalities that UDP offers is to increase or decrease the pace with which
the sender sends data to the receiver - Answers -False
UDP offers basic error checking - Answers -True
Assume Hosts A, B, and C. Host A has a UDP socket with port 123. Hosts B and C
each send their own UDP segment to Host A. Hosts B and C cannot use the same
destination port 123 for sending their UDP segment - Answers -False
TCP offers in-order delivery of the packets, flow control, and congestion control -
Answers -True
TCP detects packet loss using timeouts and triple duplicate acknowledgements -
Answers -True
Flow control is a rate control mechanism to protect the receiver's buffer from overflowing
- Answers -True
Congestion control is a rate control mechanism to protect the network from congestion -
Answers -True
In TCP, the number of unacknowledged segments that a sender can have is the
minimum of the congestion window and the receive window. - Answers -True
Consider the TCP Reno, congestion window is cut in half in both of the following events:
a) a timeout occurs b) a triple duplicate acknowledgement occurs - Answers -False