CS610 Finalterm Solved Paper 2008-1

FINALTERM EXAMINATION Fall 2008
CS610- Computer Network
 
Time: 120 min
M a r k s: 70
 
Question No: 1      ( M a r k s: 1 ) http://vuzs.net
Computer networks are often called -------------- because they use packet technology.
 
       ► Ethernet
       ► Switch networks
        Packet networks
       ► None of the given
 
 Question No: 2      ( M a r k s: 1 ) http://vuzs.net
A network uses a ------arranges for computers to be connected in a closed loop.
 
       ► Star Topology
       ► Ring Topology
       ► Bus Topology
       ► None of the given
 In a ring topology each computer is connected to other thorough a ring
Question No: 3      ( M a r k s: 1 ) http://vuzs.net
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

       ► Explicit frame type
        ► Ideal frame type
        ► Implicit frame type
        ► None of the given
EXPLICIT FRAME TYPE:
In this type the identifying value is included with frame describes types of
included data.
 
 
Question No: 4      ( M a r k s: 1 ) http://vuzs.net
An interface for thin Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
 
       ► RJ-45, 10 Base T 
        ► RJ-45, 10 Base 5
         BNC, 10 Base 2
        ► BNC, 10 Base T
 
Question No: 5      ( M a r k s: 1 ) http://vuzs.net
A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_________
 
       ► Layer 2 source address
       ► Source node’s physical address
        Layer 2 destination address    
       ► Layer 3 destination address
 
 Question No: 6      ( M a r k s: 1 ) http://vuzs.net
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________
 
        ► Hierarchal address
        ► Default route
        ► Shortest path
        ► None of the given
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called Default route. The mechanism allows a single entry in a forwarding table to replace a long list of entries that have the same next hope value
 
Question No: 7      ( M a r k s: 1 ) http://vuzs.net
________ of TCP/IP layering model, corresponds to basic network hardware.
 
       ► Physical Layer
       ► Network Interface Layer
       ► Internet Layer
       ► Transport Layer
 LAYER 1:
Corresponds to basic network hardware layer in OSI
 
Question No: 8      ( M a r k s: 1 ) http://vuzs.net
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
 
       ► Physical Layer
       ► Network Interface Layer
       ► Internet Layer
        Transport Layer
Fourth layer which is transport layer will take care of reliable transfer
 
Question No: 9      ( M a r k s: 1 ) http://vuzs.net
________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.
 
       ► IP
       ► UDP
       ► TCP
       ► None of the given
 UDP has the following characteristics.
It is an end-to-end protocol. It provides application-to-application communication.

Question No: 10      ( M a r k s: 1 )
____________ uses distance vector approach to define routing
 
      ► BGP
      ► OSPF
       RIP
      ► None of the given
DISTANCE-VECTOR ROUTING:
• It is very simple to implement.
• Packet switch updates its own routing table first.
• It is used in RIP
 
 
Question No: 11      ( M a r k s: 1 ) http://vuzs.net
_______    is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
 
        Flood-and -Prune
       ► Configuration-and -Tunneling
       ► Core-Based Discovery
       ► None of the given
FLOOD-AND-PRUNE:
Flood-and-prune is ideal in a situation where the group is small and all members
are attached to contiguous Local Area Networks.

Question No: 12      ( M a r k s: 1 ) http://vuzs.net
Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source address
 
       ► 3
       ► 2
       ► 1
       ► 0
 outer that decrements TTL to 0 sends ICMP time exceeded message, with router’s
address as source address
 
Question No: 13      ( M a r k s: 1 ) http://vuzs.net
Protocol addresses are abstractions provided by ___________.
 
       ► hardware
       ► software
       ► operating system
       ► internet
 PROTOCOL ADDRESSES AND PACKET DELIVERY:
Protocol addresses are abstractions provided by software
 
Question No: 14      ( M a r k s: 1 ) http://vuzs.net
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
 
       ► True
       ► False
 CASHING ARP RESPONSES:
Although message exchange can be used to bind addresses, sending a request for
each binding is hopelessly inefficient
 
  Question No: 15      ( M a r k s: 1 ) http://vuzs.net
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
 
       ► 32, 48
       ► 24, 32
       ► 32, 64
       ► 32, 128
 ARP is almost always used to bind a 32-bit IP address to a 48-bit Ethernet address
Question No: 16      ( M a r k s: 1 ) http://vuzs.net
In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.
 
        ► False
        ► True

Question No: 17      ( M a r k s: 1 ) http://vuzs.net
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

Features
 
Types of
Resolution
Use full with any hardware
T
Address change affects all hosts
T
Protocol address is determined by hardware address
C
       ► T
       ► D
       ► C
       ► T, C
 
 
 
 
 
Question No: 18      ( M a r k s: 1 ) http://vuzs.net
 
The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.
       ► True
       ► False
Header contains all information needed to deliver datagram to the destination
computer. It contains:
• Destination address
• Source address
• Identifier
• Other delivery information
 
 
Question No: 19      ( M a r k s: 1 ) http://vuzs.net
To save traffic, an EGP does not summarize routing information from the autonomous system before passing it to another autonomous system.
       ► True
        False
 
Question No: 20      ( M a r k s: 1 ) http://vuzs.net
Which of the following is a correct representation of the IPv6?
       ► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255 
       ► 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255 
       ► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256
       ► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255
Question No: 21      ( M a r k s: 2 )
 
Is there a comparison between TCP/IP reference model and OSI reference model.
Both the TCP/IP and OSI are international standards for data communication. Both use the concept of protocol layering. These are the conceptual tools that is often used to show how various protocols and technologies fit together to implement networks. The functions that the model represents are much the same. This means that the TCP/IP and the OSI models are really quite similar in nature even if they don't carve up the network functionality pie in precisely the same way. There is a fairly natural correspondence between the TCP/IP and OSI layers; it just isn't always a “one-to-one” relationship. Since the OSI model is used so widely, it is common to explain the TCP/IP architecture both in terms of the TCP/IP layers and the corresponding OSI layers
 
Question No: 22      ( M a r k s: 2 )
 
How can a datagram be transmitted across a physical network that does not understand the datagram format?
Encapsulate!
  • The network interface layer encapsulates an entire datagram in the data area of a hardware frame.
  • The network hardware ignores the datagram format.
  • The hardware treats a frame containing a datagram like any other frame.
  • The sender places a frame type in the frame header indicating that the frame contains a datagram.
  • The receiver reads the frame type and knows the frame contains a datagram.
Question No: 23      ( M a r k s: 2 )
 
What is the basic concept of Twice NAT (Network Address Translation)?          
 
Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.
Question No: 24      ( M a r k s: 3 )
 
What format is used for an internet packet?
 
Question No: 25      ( M a r k s: 3 )
 
“To achieve a hierarchy, OSPF allows an autonomous system to be partitioned for routing purposes”. Does this feature make OSPF more complex or powerful?
 
Question No: 26      ( M a r k s: 3 )
 
Why does IPv6 use separate Extension Headers?
 
IPv6 use separate Extension Headers. Fragmentation information is kept in separate extension header. Each fragment has base header and (inserted) fragmentation header. Entire datagram including originalheader may be fragmented.
 
 Question No: 27      ( M a r k s: 5 )
Consider the IP addresses: 178.200.127.5 and the corresponding subnet masks 255.255.255.0, then find out the following:
a.       The number of bits used for subnetting  (Answer 8 bits)
b.      Total number of host in the subnet (Answer 254 )  
 = 2^8 = 256-2 = 254 ( 8 bits are used for host and -2 is used for broadcast and netwrok ID)
c.       The network address of the subnet. (Answer 178.200.127.0)
d.       The subnet address of the IP address.  http://www.subnet-calculator.com/subnet.php?net_class=B


 (By Zubair ,vuzs.net, feb11)
 Start by using 256, the subnet mask, which is 256-0=256. The first subnet is 8. The next subnet would be 16, then 24, and then 32. This host is in the 24 subnet, the broadcast address is 31, and the valid host range is 25 through 31. See Chapter 3 for more information on IP addressing.

Here is the online calculator for subnetting
http://www.subnetmask.info/
 
NOTE. This is just for concept not included in the answer
 
The subnet mask determines what portion of the TCP/IP address represents your network and what portion can be used for your hosts. The network number represents the street I live on, and the host portion is used for the numbers on all the houses on my street. 
A subnet mask of
 255.255.255.0 means that the first three octets of the address will be used for the network, and thus our network number is192.168.1. This means we can have 254 computers on this network, because the fourth octet is not being used by the network portion of the address. We know this because of the 0 in the subnet mask (255.255.255.0).
 
Question No: 28      ( M a r k s: 5 )
 
How does IP software reassemble fragments that arrive out of order?
A unique ID number of each outgoing datagram
  • When a router fragments the datagram, the router copies the ID number into each fragment.
  • The fragment OFFSET field tells a receiver how to order fragmentswithin a given datagram
  • The process of creating a copy of the original datagram from fragments is called reassembly.
Question No: 29      ( M a r k s: 5 ) 
Write down the comparison of Distance- vector and Link – state algorithm?
COMPARISON:
DISTANCE-VECTOR ROUTING:
 It is very simple to implement.
 Packet switch updates its own routing table first.
 It is used in RIP.
LINK-STATE ALGORITHM:
 It is much more complex.
 Switches perform independent computations.
 It is used in OSPF.


Question No: 30      ( M a r k s: 10 )
 
Descibe in detail what is the purpose of the following table? What sort of information can be extracted?
 
First Four Bits Of address
Table index in decimal
Class of Address
0000
0
A
0001
1
A
0010
2
A
0011
3
A
0100
4
A
0101
5
A
0110
6
A
0111
7
A
1000
8
B
1001
9
B
1010
10
B
1011
11
B
1100
12
C
1101
13
C
1110
14
D
1111
15
E
 
The table shows in the figure, how the class of address can be computed.
 
Question No: 31      ( M a r k s: 10 )
 
List down and describe atleast five charachteristics of Routing Information Protocol.
 
ROUTING INFORMATION PROTOCOL (RIP):
It has the following characteristics:
"It is used for routing within an autonomous system (IGP).
"Hop Count Metric: RIP measures distance in network hops, where each network
between the source and destination counts as a single hop.
"It uses UDP for all message transmissions.
"RIP is used over LAN. Version 1 of RIP uses hardware broadcast and version 2 allows
delivery via multicast.
"It can be used to advertise default route propagation. An organization can use RIP to
install a default route in each router.
"It uses distance vector algorithm.
"RIP allows hosts to listen passively and update its routing table

Leave a Reply

Related Posts Plugin for WordPress, Blogger...