1.
Osnovna jedinica za prenos podataka na mrežnom sloju je:
Correct Answer
C. Paket
Explanation
The correct answer is "Paket". On the network layer, data is divided into packets for transmission. A packet is a unit of data that contains the necessary information for routing and delivery across the network. It includes the source and destination IP addresses, as well as the actual data being transmitted. Packets are used to efficiently transmit data over the network, allowing for reliable and optimized communication between devices.
2.
Mrežni sloj je odgovoran za:
Correct Answer
B. Prosleđivanje paketa sa jednog do drugog kraja mreže
Explanation
The correct answer states that the network layer is responsible for forwarding packets from one end of the network to the other. This means that the network layer handles the routing of packets, ensuring that they are delivered to the correct destination within the network. It is responsible for determining the optimal path for packet transmission and managing the addressing and routing protocols required for this task.
3.
Uređaj koji radi u mrežnom sloju je:
Correct Answer
C. Router
Explanation
A router is a device that operates in the network layer of the OSI model. It is responsible for forwarding data packets between different networks, making decisions based on the destination IP address. Routers are used to connect multiple networks together and facilitate the flow of data between them. Unlike switches and hubs, routers can determine the best path for data transmission and perform network address translation (NAT) to allow multiple devices to share a single public IP address. Therefore, a router is the correct answer as it operates at the network layer.
4.
Tabele rutiranja određuju:
Correct Answer
A. Najbolji sledeći skok na osnovu IP adrese odredišta u paketu
Explanation
Tabele rutiranja određuju najbolji sledeći skok na osnovu IP adrese odredišta u paketu. This means that routing tables determine the next hop for a packet based on the destination IP address. Routing tables are used by routers to make decisions on how to forward packets to their intended destinations. By examining the destination IP address in the packet header, the router consults its routing table to determine the best path for the packet to reach its destination. The routing table contains information about network prefixes and the corresponding next hop or interface to forward the packet.
5.
Mrežni sloj je odgovoran za:
Correct Answer
D. Prosleđivanje paketa sa jednog do drugog kraja mreže
Explanation
The correct answer is "Prosleđivanje paketa sa jednog do drugog kraja mreže" (Forwarding packets from one end of the network to the other). The network layer is responsible for routing and forwarding data packets across different networks or subnetworks. It determines the best path for data transmission and ensures that packets reach their intended destination. This layer also handles addressing and logical network topology.
6.
Karakteristike decentralizovanog rutiranja su:
Correct Answer(s)
B. Odluke o rutiranju se donose u svakom ruteru nezavisno od drugih
C. Ruteri razmenjuju informacije kako bi formirali tabele rutiranja
Explanation
Decentralized routing refers to the process where routing decisions are made independently by each router without any coordination or agreement with other routers. In this type of routing, routers exchange information to form routing tables, which help them determine the best path for forwarding packets. This approach is commonly used in networks that are based on mainframes.
7.
Vrste decentralizovanog rutiranja su:
Correct Answer(s)
B. Statičko rutiranje
E. Dinamičko rutiranje
Explanation
The correct answer is static routing and dynamic routing. Static routing refers to the process of manually configuring the routes in a network, where the network administrator defines the paths that the data packets should take. Dynamic routing, on the other hand, is a more automated approach where routers exchange information with each other to determine the best path for data packets to reach their destination.
8.
Kod statičkog rutiranja karakteristično je sledeće:
Correct Answer(s)
A. Koriste se fiksne tabele rutiranja koje definiše administrator
C. Svaki čvor ima sopstvenu tabelu rutiranja
D. Koristi se kod jednostavnih mreža
Explanation
Static routing is characterized by the use of fixed routing tables defined by the administrator. Each node has its own routing table. It is commonly used in simple networks. Static routing does not dynamically adjust to changes in network topology or current traffic.
9.
Kod dinamičkog rutiranja karakteristično je sledeće:
Correct Answer(s)
A. Zasniva se na automatskom kreiranju i ažuriranju ruting tabela
B. Prate sve promene u topologiji mreže i trenutnom saobraćaju
D. Svaki čvor ima sopstvenu tabelu rutiranja
Explanation
Kod dinamičkog rutiranja, svaki čvor ima sopstvenu tabelu rutiranja koja se automatski kreira i ažurira. Tabele rutiranja prate sve promene u topologiji mreže i trenutnom saobraćaju, omogućavajući efikasno usmeravanje podataka. Za razliku od fiksnih tabela rutiranja koje definiše administrator, dinamičko rutiranje se koristi u složenijim mrežama gde je neophodno prilagođavanje usmeravanja u realnom vremenu.
10.
„Link state routing“ algoritam ima sledeće karakteristike:
Correct Answer(s)
A. Koristi se najsvežija informacija o stanju veze
D. Vrši se periodična razmena stanja veze između čvorova kako bi informacije bile aktuelne
F. Koristi različite informacije (broj skokova, opterećenost, brzina,...)
Explanation
The given answer states that the "Link state routing" algorithm uses different information such as the number of hops, congestion, and speed. It also mentions that there is periodic exchange of link state information between nodes to keep the information up to date. The algorithm uses the freshest information about the state of the links. However, it is slow in achieving network balance and the obtained path is not always optimal. It can only route short packets.
11.
Zagušenje na ruterima može da nastane iz sledećih razloga:
Correct Answer(s)
A. Pojava velikog broja paketa sa zahtevom za istom izlaznom linijom
C. Pojedine linije mogu biti sa malim propusnim opsegom
D. Spori mikroprocesori
Explanation
Router congestion can occur due to several reasons mentioned in the given options. One reason is the occurrence of a large number of packets requesting the same output line, which can overwhelm the router's capacity. Another reason is that certain lines may have a small bandwidth, causing congestion when multiple packets try to use them simultaneously. Additionally, slow microprocessors in the router can also contribute to congestion as they might not be able to handle the incoming traffic efficiently.
12.
Odbacivanje paketa na ruterima kao posledica velikog opterećenja, radi se na sledeći način:
Correct Answer(s)
A. U prenosu datoteka vredniji su stariji paketi
B. Za multimedijalne aplikacije vredniji su noviji paketi
Explanation
In the context of packet rejection on routers due to high load, the statement "U prenosu datoteka vredniji su stariji paketi" means that in file transfer, older packets are considered more valuable. On the other hand, the statement "Za multimedijalne aplikacije vredniji su noviji paketi" states that for multimedia applications, newer packets are considered more valuable. These statements explain the prioritization of packets based on their age in different scenarios, highlighting the importance of older packets in file transfer and newer packets in multimedia applications.
13.
Prekomerni gubitak paketa (npr. 10 do 20%) na prenosnom putu za pošiljaoca znači:
Correct Answer(s)
B. U bežičnim sistemima, to je normalno i treba nastaviti sa predajom
C. U žičnim sistemima, nastupili su problemi i treba usporiti predaju
14.
IPv4 je protokol (OSI i TCP/IP):
Correct Answer
B. Mrežnog sloja
Explanation
IPv4 is a protocol that operates at the network layer of the OSI and TCP/IP models. The network layer is responsible for routing packets across different networks and establishing logical connections between devices. IPv4 provides the addressing scheme used to identify devices on a network and enables the delivery of packets from the source to the destination. Therefore, it is correct to say that IPv4 operates at the network layer.
15.
IP adresa u IPv4 ima dužinu od:
Correct Answer
C. 32 bita
Explanation
The correct answer is 32 bita. In IPv4, an IP address is represented by a 32-bit binary number. This 32-bit number is divided into four octets, with each octet represented by 8 bits. Each octet is then converted to decimal form to create the familiar IPv4 address format, consisting of four numbers separated by periods. Therefore, an IPv4 address has a length of 32 bits.
16.
IPv4 adrese se najčešće predstavljaju:
Correct Answer
B. Decimalno
Explanation
IPv4 adrese se najčešće predstavljaju decimalno jer se sastoje od četiri broja odvojena tačkama, pri čemu svaki broj može imati vrednost od 0 do 255. Ova notacija je lakša za čitanje i razumevanje od binarne ili heksadecimalne notacije. U decimalnoj notaciji, svaki broj predstavlja jedan oktet, dok se u binarnoj notaciji koriste nule i jedinice, a u heksadecimalnoj koriste cifre od 0 do 9 i slova od A do F.
17.
Maksimalna moguća dužina IP paketa je:
Correct Answer
B. 64 KB
Explanation
The maximum possible length of an IP packet is 64 KB. This means that the packet can contain up to 64 kilobytes of data. IP packets are used to transfer data over the internet, and they have a maximum size limit to ensure efficient transmission and prevent network congestion. A larger packet size would require more resources and could potentially cause delays or errors in the transmission. Therefore, 64 KB is the correct answer as it represents the maximum allowable size for an IP packet.
18.
Fragmentacija paketa označava:
Correct Answer
D. Izračunavanje kontrolne sume u cilju pouzdanog prenosa
Explanation
Fragmentacija paketa označava deljenje paketa na veći broj paketa sa manjom dužinom. Ova tehnika se koristi kada se paket prenosi preko mreže koja podržava manju maksimalnu dužinu paketa od izvornog paketa. Svaki fragment sadrži deo podataka iz izvornog paketa, kao i dodatne informacije koje omogućavaju rekonstrukciju izvornog paketa na odredištu. Izračunavanje kontrolne sume je postupak koji se koristi za proveru integriteta paketa tokom prenosa. Kontrolna suma se izračunava na osnovu podataka u paketu i koristi se za proveru da li je paket stigao bez grešaka.
19.
- Krakteristično za fragment nekog paketa je da:
Correct Answer
A. 1. Svaki fragment uvek sadrži kompletno zaglavlje originalnog paketa
Explanation
The correct answer is option 1 because it states that every fragment always contains the complete header of the original packet. This means that even if a packet is fragmented into multiple smaller fragments during transmission, each fragment will still retain the complete header information of the original packet. This is important because the header contains crucial information such as source and destination IP addresses, protocol information, and other control fields that are necessary for proper routing and reassembly of the fragmented packets at the receiving end.
20.
IP adresa po standardu IPv4 sadrži:
Correct Answer
A. Identifikaciju računara u datoj mreži
Explanation
An IP address in the standard IPv4 is used to identify a computer within a network. It is a unique numerical label assigned to each device connected to a network. This allows for the proper routing of data packets between devices and enables communication between them. The IP address does not contain information about the manufacturer of the Ethernet card, its serial number, the user's identification or password, or the country or network identification.
21.
Osim IPv4 adrese za uspešno adresiranje je neophodno imati i:
Correct Answer
A. Masku podmreže (subnet mask)
Explanation
In addition to IPv4 addresses, it is necessary to have a subnet mask for successful addressing. The subnet mask is used to determine the network portion of an IP address and the host portion. It helps in identifying which part of the IP address belongs to the network and which part belongs to the host. Without a subnet mask, it would not be possible to properly allocate IP addresses and establish communication within a network.
22.
Ukoliko su prva dva bita mrežne adrese fiksirana na “01” u pitanju je:
Correct Answer
C. Mreža klase A
Explanation
The given information states that the first two bits of the network address are fixed at "01". In classful addressing, the first two bits of a class A network address are always "0 0". Therefore, if the first two bits are "01", it indicates that the network is a class A network.
23.
Ukoliko su prva dva bita mrežne adrese fiksirana na “10” u pitanju je:
Correct Answer
B. Mreža klase B
Explanation
If the first two bits of the network address are fixed at "10", then it indicates that it is a network of class B. In classful addressing, the first bit of the network address determines the class, and for class B networks, the first two bits are always "10". Class B networks have a larger range of IP addresses compared to class A networks but smaller than class C networks.
24.
Ukoliko su prva tri bita mrežne adrese fiksirana na “110” u pitanju je:
Correct Answer
A. Mreža klase C
Explanation
If the first three bits of the network address are fixed at "110", it indicates that it is a class C network. In classful addressing, the first octet of a class C network starts with binary "110". This means that the network can have a maximum of 2^21 (2,097,152) host addresses.
25.
Rezervacija 8 bitova za mrežu i 14 bita za čvor je karakteristika:
Correct Answer
C. Mreže klase A
Explanation
The given answer, "mreže klase A" (Class A network), is correct because it mentions the allocation of 8 bits for the network and 14 bits for the host. In Class A networks, the first octet is reserved for the network, allowing for a large number of networks (2^7) and a smaller number of hosts per network (2^14). This allocation scheme is consistent with the given information of 8 bits for the network and 14 bits for the host.
26.
Rezervacija 16 bitova za mrežu i 16 bitova za čvor je karakteristika:
Correct Answer
C. Mreže klase B
Explanation
The given answer suggests that the reservation of 16 bits for the network and 16 bits for the host is a characteristic of class B networks. In class B networks, the first 16 bits are reserved for the network address, allowing for a large number of networks with a moderate number of hosts in each network. This allocation of bits allows for a larger number of hosts compared to class C networks, which only reserve 8 bits for the host. Class A networks, on the other hand, reserve the first 8 bits for the network, allowing for a smaller number of networks with a large number of hosts in each network.
27.
Rezervacija 24 bita za mrežu i 8 bitova za čvor je karakteristika:
Correct Answer
C. Mreže klase C
Explanation
The given answer, "mreže klase C" (class C network), is correct because a class C network has 24 bits reserved for the network portion and 8 bits reserved for the host portion. This allows for a larger number of individual networks to be created, but with a smaller number of hosts per network compared to class A and B networks. Class C networks are typically used for smaller organizations or networks that do not require a large number of hosts.
28.
Opseg IPv4 adresa 0.0.0.0-127.255.255.255 je karakteristika:
Correct Answer
A. A klase mreža
Explanation
The given range of IPv4 addresses, 0.0.0.0-127.255.255.255, falls within the range of Class A network addresses. Class A networks have the first octet in the range of 0-127, which matches the given range. Class A networks have a large number of available IP addresses, as they use only the first octet to identify the network, allowing for a maximum of 16,777,214 hosts per network. Therefore, the correct answer is A klase mreža.
29.
Opseg IPv4 adresa 128.0.0.0-191.255.255.255 je karakteristika:
Correct Answer
A. B klase mreža
Explanation
The given range of IPv4 addresses, 128.0.0.0-191.255.255.255, falls within the range of Class B network addresses. Class B networks have a range of 128.0.0.0 to 191.255.255.255 and are typically used for medium-sized networks. They allow for a larger number of hosts compared to Class C networks, but not as many as Class A networks. Therefore, the correct answer is B klase mreža.
30.
Opseg IPv4 adresa 192.0.0.0-223.255.255.255 je karakteristika:
Correct Answer
C. C klase mreža
Explanation
The given IPv4 address range, 192.0.0.0-223.255.255.255, falls within the range of Class C networks. In IPv4, IP addresses are divided into different classes based on their range. Class C networks have the first three octets reserved for network identification, while the last octet is used for host identification. The given address range starts with 192, which falls within the range of Class C networks. Therefore, the correct answer is C klase mreža.
31.
Za adresiranje članova privatne mreže koja ima pristup Internetu mogu se koristiti sledeći opsezi IPv4 adresa:
Correct Answer(s)
B. 10.0.0.0-10.255.255.255
D. 172.16.0.0-172.31.255.255
G. 192.168.0.0-192.168.255.255
Explanation
The given answer lists the valid ranges of IPv4 addresses that can be used for addressing members of a private network with internet access. These ranges include 10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255. These ranges are reserved for private networks and are not routable on the public internet. Therefore, devices within these ranges can communicate with each other within the private network but require network address translation (NAT) to communicate with the internet.
32.
Preciznost kod CIDR podele mreža je:
Correct Answer
A. Bit
Explanation
The correct answer is "bit" because CIDR (Classless Inter-Domain Routing) is a method used to allocate IP addresses and divide networks. It involves specifying the number of bits used for the network prefix in the IP address. Therefore, the precision in CIDR division is measured in bits, as it determines the size of the network.
33.
Regularne mrežne maske su:
Correct Answer(s)
C. 255.128.0.0
D. 255.255.64.0
E. 255.255.128.0
F. 255.255.255.64
G. 255.255.255.248
34.
CIDR zapis mrežne maske “255.255.255.0” je:
Correct Answer
A. /16
Explanation
The CIDR notation is used to represent the subnet mask of a network. In this case, the subnet mask "255.255.255.0" is represented as "/16" in CIDR notation. This means that the first 16 bits of the IP address are used to identify the network, while the remaining 8 bits are used for host addresses.
35.
CIDR zapis mrežne maske “255.255.255.224” je:
Correct Answer
B. /27
Explanation
The CIDR notation "/27" represents the network mask "255.255.255.224". This notation indicates that the first 27 bits in the IP address are used to represent the network portion, while the remaining 5 bits are used for host addressing. This means that there are 32 IP addresses in total, with 30 usable for hosts in the network.
36.
CIDR zapis mrežne maske “255.255.248.0” je:
Correct Answer
B. /21
Explanation
The CIDR notation for the given subnet mask "255.255.248.0" is "/21". CIDR notation is used to represent the network prefix length, which indicates the number of network bits in the subnet mask. In this case, the subnet mask has 21 network bits and 11 host bits, resulting in a subnet with a total of 2,048 IP addresses.
37.
Radeći sa mrežnom maskom 255.255.255.240 sledeći računari mogu da komuniciraju bez posredstva gateway-a:
Correct Answer(s)
A. 192.168.1.97 i 192.168.1.110
C. 192.168.1.162 i 192.168.1.173
E. 192.168.1.225 i 192.168.1.235
Explanation
The given answer is correct because the IP addresses listed are within the same subnet when using the subnet mask 255.255.255.240. This subnet mask allows for a total of 16 IP addresses, with 14 usable addresses for hosts. The IP addresses provided in the answer fall within this range and can communicate directly with each other without the need for a gateway.
38.
IPv6 je protokol (OSI i TCP/IP):
Correct Answer
C. Mrežnog sloja
Explanation
IPv6 is a protocol that operates at the network layer of the OSI and TCP/IP models. The network layer is responsible for routing packets across different networks and establishing end-to-end connections. IPv6, as a network layer protocol, provides unique IP addresses to devices and enables them to communicate with each other over the internet. It also supports features such as improved security, larger address space, and better performance compared to its predecessor, IPv4. Therefore, the correct answer is "mrežnog sloja" which translates to "network layer" in English.
39.
Glavni problem koji rešava IPv6 u odnosu na IPv4 je:
Correct Answer
A. Veći adresni prostor
Explanation
IPv6 solves the main problem of address exhaustion that exists in IPv4. With IPv6, the address space is significantly larger, allowing for a much larger number of unique IP addresses to be assigned. This is important as the number of devices connected to the internet continues to grow. By providing a larger address space, IPv6 ensures that there are enough addresses available for all devices, both now and in the future.
40.
IPv6 adrese se najčešće predstavljaju:
Correct Answer
C. Heksadecimalno
Explanation
IPv6 adrese se najčešće predstavljaju heksadecimalno jer IPv6 adrese koriste 128-bitni format, što znači da se sastoje od 8 blokova po 16 bitova. Svaki blok se može predstaviti sa 4 heksadecimalne cifre, što omogućava lakšu čitljivost i upotrebu adresa. Heksadecimalni sistem ima bazu 16, što znači da se koriste cifre od 0 do 9 i slova od A do F. Ova notacija omogućava kompaktnije prikazivanje IPv6 adresa u odnosu na binarnu ili decimalnu notaciju.
41.
Parametar “Hop Limit” IPv6 paketa može se porediti sa IPv4 parametrom:
Correct Answer
A. Time to Live
Explanation
The "Hop Limit" parameter in IPv6 packets is comparable to the "Time to Live" parameter in IPv4. Both parameters serve the same purpose of limiting the lifespan of a packet and preventing it from circulating indefinitely in the network. The value of the Hop Limit parameter is decremented by each router the packet passes through, and once it reaches zero, the packet is discarded. Similarly, the Time to Live parameter in IPv4 serves to limit the number of hops a packet can take before being discarded.
42.
Adrese IPv6 protokola imaju bitsku dužinu od:
Correct Answer
C. 128 bitova
Explanation
IPv6 addresses have a bit length of 128 bits. This is significantly longer than the previous version, IPv4, which had a bit length of 32 bits. The increase in bit length allows for a much larger number of unique addresses to be created, which is necessary due to the increasing number of devices connected to the internet. The longer bit length also provides better security and more efficient routing of network traffic.
43.
Prenos IPv6 paketa putem IPv4 mreže je moguć:
Correct Answer
B. Putem tunelovanja
Explanation
IPv6 paketi se mogu prenositi putem IPv4 mreže putem tunelovanja. Tunelovanje omogućava da se IPv6 paketi umota u IPv4 pakete kako bi se preneli preko IPv4 mreže. Na odredišnoj strani, IPv6 paketi se odmotavaju iz IPv4 paketa i dalje se rutiraju kao IPv6 paketi. Ovo omogućava komunikaciju između IPv6 mreža preko postojećih IPv4 mreža.
44.
Aktivna mrežna oprema sa podrškom za 3. sloj (Layer 3) projektovana za IPv4 može se koristiti i za IPv6:
Correct Answer
A. Da
Explanation
Active network equipment with support for Layer 3 is designed to handle IP routing. IPv4 and IPv6 are both network layer protocols, so if the equipment is capable of handling IPv4, it can also handle IPv6. Therefore, the answer is "Da" (Yes).
45.
ICMP je protokol (OSI i TCP/IP):
Correct Answer
C. Mrežnog sloja
Explanation
ICMP stands for Internet Control Message Protocol, which is a protocol used in the network layer of the OSI and TCP/IP models. It is responsible for sending error messages and operational information about network conditions. ICMP operates directly on top of IP (Internet Protocol), which is a network layer protocol. Therefore, the correct answer is "mrežnog sloja" (network layer).
46.
ICMP je skraćenica od:
Correct Answer
C. Internet Control Message Protocol
Explanation
ICMP stands for Internet Control Message Protocol. ICMP is a network protocol used by network devices, such as routers, to send error messages and operational information about network conditions. It is primarily used for diagnostic and control purposes, such as reporting errors, testing network connectivity, and troubleshooting network issues. ICMP is an integral part of the Internet Protocol Suite and plays a crucial role in ensuring the smooth operation of network communications.
47.
ICMP poruke:
Correct Answer
B. Enkalsuliraju se u IP datagram
Explanation
ICMP (Internet Control Message Protocol) messages are encapsulated within IP (Internet Protocol) datagrams. This means that ICMP messages are embedded or enclosed within IP packets and are transmitted over IP networks. ICMP messages are used for various network management purposes, such as error reporting and diagnostic functions. They are encapsulated within IP datagrams to ensure that they can be routed across the network and reach their intended destination. This encapsulation allows ICMP messages to be transmitted over IP networks effectively.
48.
ICMP poruke se sastoje od:
Correct Answer(s)
B. Tipa poruke
D. Koda
E. Kontrolne sume
Explanation
ICMP poruke se sastoje od tipa poruke, koda i kontrolne sume. Tip poruke određuje vrstu ICMP poruke, kao što su echo request ili time exceeded. Kod je dodatna informacija koja se koristi za dodatno specificiranje poruke. Kontrolna suma se koristi za provjeru integriteta poruke kako bi se osiguralo da nije došlo do oštećenja podataka tijekom prijenosa.
49.
Primer alata koji koristi ICMP protokol je:
Correct Answer
C. Ping
Explanation
The correct answer is "Ping" because Ping is a tool that uses the ICMP (Internet Control Message Protocol) protocol. ICMP is used to send control messages and error reporting between network devices. Ping is commonly used to test the reachability of a host on an IP network and measure the round-trip time for messages sent from the originating host to a destination computer. TCP and Telnet are not tools that use the ICMP protocol.
50.
TTL parametar IPv4 protokola može prouzrokovati sledeću poruku u okviru ICMP protokola:
Correct Answer
C. Time Exceeded
Explanation
The TTL (Time to Live) parameter in the IPv4 protocol determines the maximum number of hops (routers) that a packet can traverse before being discarded. If the TTL value reaches zero, the router will discard the packet and send an ICMP message back to the source. This message is known as "Time Exceeded" and indicates that the packet has exceeded its allotted time to reach the destination.