CS610 Finalterm Solved Paper 2008-2

  FINALTERM EXAMINATION
Fall 2008
CS610- Computer Network

Question No: 1 ( M a r k s: 1 ) http://vuzs.net

In Direct point to point communication adding the Nth computer requires------------ new connections.


► None of the given

► N2

► N-1

► (N2 –N)/2

disadvantage In Direct point to point communication is that adding a new computer to the network requires N-1 new connections .(P# 23)

Question No: 2 ( M a r k s: 1 ) http://vuzs.net

In Point-to-Point topology there are two topologies.

► Tree and Ring

► Star and Ring

► Star and Tree

► None of the given

POINT-TO-POINT:


In Point-to-Point topology there are two topologies.
1) STAR topology
2) TREE topology

Question No: 3 ( M a r k s: 1 ) http://vuzs.net

In -------------, network occupies the smaller area like a room a floor or a building


► LAN

► WAN

► MAN

► None of the given

In LAN network occupies the smaller area like a room a floor or a building.(P# 4)

Question No: 4 ( M a r k s: 1 ) http://vuzs.net

Hardware that calculates a CRC uses two simple components.

► AND unit and XOR unit

► Shift register and XOR unit

► Shift register and AND unit

► None of the given

CRC uses just two hardware components:
Shift register
Exclusive OR ( XOR unit ) .(P# 20)

Question No: 5 ( M a r k s: 1 ) http://vuzs.net

CRC can detect more errors than a simple checksum.


► true

► false


Question No: 6 ( M a r k s: 1 ) http://vuzs.net

The Gigabit Ethernet hardware operates at a rate of --------

► 10 Mbps

► 100 Mbps

► 1000 Mbps

► None of the given

Gigabit Ethernet that operates at 1 Gbps (1000 Mbps) over fiber optics and twisted pair Ethernet cables.

Question No: 7 ( M a r k s: 1 ) http://vuzs.net



Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given

10BASE-T:
This is another standard of wiring scheme. It is commonly called 10Base-T, Twisted Pair or TP Ethernet. (P# 43)

Question No: 8 ( M a r k s: 1 ) http://vuzs.net

An interface for thin Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.

► RJ-45, 10 Base T

► RJ-45, 10 Base 5


► BNC, 10 Base 2


► BNC, 10 Base T

Question No: 9 ( M a r k s: 1 ) http://vuzs.net

A system with redundant bridges might have a problem with_______ in the system.


Loop

► Filters

► Spanning Trees

► All given choices



Question No: 10 ( M a r k s: 1 ) http://vuzs.net

________ computes shortest paths in a graph by using weights on edges as a measure of distance.

► Greedy algorithm

► Distance vector algorithm

► Dijksta’s algorithm

► Non of the given

Djikstra’s algorithm can accommodate weights on edges in graph. The shortest
path is then the path with lowest total weight (sum of the weight with all edges). It should
be noted that the shortest path is not necessarily with fewest edges (or hops).

Question No: 11 ( M a r k s: 1 ) http://vuzs.net

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.


► Connectionless service paradigm

► Connection-oriented service paradigm

► Both Connectionless and Connection-oriented service paradigm

► None of the given


Question No: 12 ( M a r k s: 1 ) http://vuzs.net

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.


► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer


LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer.

Question No: 13 ( M a r k s: 1 ) http://vuzs.net

An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host


► 48-bit

► 32-bit

► 24-bit

► None of the given


An Internet address (IP address) is a unique 32-bit binary number assigned to a
host and used for all communication with the host

Question No: 14 ( M a r k s: 1 ) http://vuzs.net


The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.


► prefix , suffix

► suffix , prefix

► suffix , suffix

► None of the given


PREFIX:
It identifies the physical network to which the computers are attached.
SUFFIX:
It identifies an individual computer on the network.

Question No: 15 ( M a r k s: 1 ) http://vuzs.net


___________ places the boundary between the first and second octets



► Class A

► Class B

► Class C

► Class D

Class A places the boundary between the first and second octets. Class B places the boundary between the second and third octets, and class C places the boundary between the third and fourth octets.


Question No: 16 ( M a r k s: 1 ) http://vuzs.net


___________ places the boundary between the third and fourth octets.

► Class A

► Class B

► Class C

► Class D

Class A places the boundary between the first and second octets. Class B places the boundary between the second and third octets, and class C places the boundary between the third and fourth octets.


Question No: 17 ( M a r k s: 1 ) http://vuzs.net


________ field of header indicates whether a datagram is a fragment or a complete datagram.


► FLAGS

► FLAGMENT OFFSET

► IDENTIFICATION

► None of the given


FRAGMENTATION:
IP uses fragmentation i.e. datagrams can be split into pieces to fit in network with small MTU. Each fragment is an independent datagram. It includes all header fields. Bit in header indicates that the datagram is a fragment

Question No: 18 ( M a r k s: 1 ) http://vuzs.net

______ provides connectionless service.

► TCP

► UDP

► IP

► None of the given

UDP has the following characteristics.
It is an end-to-end protocol. It provides application-to-application communication.
It provides connectionless service.
It is a Message-Oriented protocol.
It uses best-effort delivery service.
It follows arbitrary interaction.
It is operating system independent


Question No: 19 ( M a r k s: 1 ) http://vuzs.net


UDP and TCP are both_________ layer protocols


► Physical

► Data link

► Network


► Transport



Question No: 20 ( M a r k s: 1 ) http://vuzs.net

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________

► IP

► None of the given

► TCP

► UDP
SERVICE PROVIDED BY TCP:
Following are the services provided by TCP:
Connection-oriented service
Point-to-point
Complete reliability
Full-duplex communication
Stream interface
Reliable connection startup
Graceful connection shutdown

Question No: 21 ( M a r k s: 1 ) http://vuzs.net

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer

LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer


Question No: 22 ( M a r k s: 1 ) http://vuzs.net


________identifies which application program on receiving computer should receive the data

► Logical address

► Source port

► Destination Port

► None of the given


FieldDestinationPort identifies which application program on receiving computer should receive the data. While field source port identifies the application programs that sent the data. (reference from E-books)

Question No: 23 ( M a r k s: 1 ) http://vuzs.net


________ identifies the application program that sent the data.

DestinationPort

► Source port

► Logical address

► None of the given

FieldDestinationPort identifies which application program on receiving computer should receive the data. While field source port identifies the application programs that sent the data. (reference from E-books)

Question No: 24 ( M a r k s: 1 ) http://vuzs.net


The Border Gateway Protocol (BGP) uses_________ for all communication


► UDP

► TCP

► Both UDP and TCP


► None of the given
 
BORDER GATEWAY PROTOCOL:
It is most popular Exterior Gateway Protocol in Internet. It has following characteristics:
"It provides routing among autonomous systems (EGP).
"It provides policies to control routes advertised.
"It uses reliable transport (TCP).


Question No: 25 ( M a r k s: 1 ) http://vuzs.net



Which of the following protocols allows the sender and receiver to enforce polices.

► RIP

► OSPF

► BGP

► RIP and OSPF


Question No: 26 ( M a r k s: 1 ) http://vuzs.net

____________ uses distance vector approach to define routing


► BGP

► OSPF

► RIP

► None of the given


ROUTING INFORMATION PROTOCOL (RIP):
It has the following characteristics:
"It is used for routing within an autonomous system (IGP).
"Hop Count Metric: RIP measures distance in network hops, where each network
between the source and destination counts as a single hop.
"It uses UDP for all message transmissions.
"RIP is used over LAN. Version 1 of RIP uses hardware broadcast and version 2 allows
delivery via multicast.
"It can be used to advertise default route propagation. An organization can use RIP to
install a default route in each router.
"It uses distance vector algorithm.

Question No: 27 ( M a r k s: 1 ) http://vuzs.net


ICMP message transport is acted upon by getting ICMP encrypted in IP.

► True

► False

ICMP message transport is acted upon by getting ICMP encapsulated in IP (P# 117)

Question No: 28 ( M a r k s: 1 ) http://vuzs.net

Protocol addresses are abstractions provided by ___________.

► hardware

► software

► operating system

► internet

Protocol addresses are abstractions provided by software

Question No: 29 ( M a r k s: 1 ) http://vuzs.net


These packets serve same purpose on ________ as frames on ______

► Intranet, LAN

► Internet, WAN

► Intranet, WAN

► Internet, LAN

VIRTUAL PACKETS:
These packets serve same purpose in Internet as frames on LAN

Question No: 30 ( M a r k s: 1 ) http://vuzs.net


Address mask defines how many bits of address are in suffix?

► True

► False

Address mask defines how many bits of address are in prefix. Prefix defines how much of address used to identify network.

Question No: 31 ( M a r k s: 1 ) http://vuzs.net


A single networking technology is best for all needs.

► True

► False

There is no single networking technology that is best for all needs

Question No: 32 ( M a r k s: 1 ) http://vuzs.net


A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?


► True

► False

The chief problems with multiple networks are as follows:
A computer attached to a given network can only communicate with other
computers attached to the same network.

Question No: 33 ( M a r k s: 1 ) http://vuzs.net


The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.

► itself

► prefix

► suffix

► mask
Classful IP addresses are self-identifying because the class of the address can be computed from the address itself

Question No: 34 ( M a r k s: 1 ) - Please choose one

Find the class of the address.
10100111 11011011 10001011 01101111

► A

► B

► E

► C
Reference table handouts P # 87

Question No: 35 ( M a r k s: 1 ) http://vuzs.net

Find the class of the address:
11110011 10011011 11111011 00001111

► A

► C

► E

► B

Reference table handouts P # 87

Question No: 36 ( M a r k s: 1 ) http://vuzs.net


In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► T

► D

► C

► T, C
 
Reference table handouts P # 97


Question No: 37 ( M a r k s: 1 ) http://vuzs.net


Which method of Address Resolution Protocol requires hardware broadcast?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► D

► T

► C

► T, D

Reference table handouts P # 97

Question No: 38 ( M a r k s: 1 ) http://vuzs.net


Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► T, D

► c

► T

► T, C

Reference table handouts P # 97
Question No: 39 ( M a r k s: 1 ) http://vuzs.net

In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► T, C

► T

► C

► D

Reference table handouts P # 97
Question No: 40 ( M a r k s: 1 ) http://vuzs.net


On of the design goals for unicast route propagation is __________.

► Consistency

► inconsistency

► stability

► dynamic addressing

On of the design goals for unicast route propagation is stability—continual changes in route are undesirable because they lead to higher jitter and datagram arriving out of order. Thus, once a unicast routing protocol finds a shortest path, it usually retains the route until a failure makes the path unusable. (Reference from E-book)


Question No: 41 ( M a r k s: 1 ) http://vuzs.net


Propagation multicast routing information differs dramatically from unicast route propagation?

► True

► False

Propagating multicast routing information differs dramatically from unicast route propagation. The difference arises because internet multicast allows dynamic group membership and autonomous senders
Question No: 42 ( M a r k s: 1 ) http://vuzs.net

The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.

► One or more

► only one

► no

► many

Question No: 43 ( M a r k s: 1 ) http://vuzs.net


To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.

► True

► False

To save traffic, an EGP summerize routing information from the autonomous system before passing it to another autonomous system. More important an EGP implements policy constraints that allow a system manager to determine exactly what information is released outside the organization. (Reference from E-book)


Question No: 44 ( M a r k s: 1 ) http://vuzs.net


In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.

► Anycast

► Unicast

► Multicast

► Non of the given

Following are special types of addresses, IPv6 uses:
Unicast: It is used for single destination computer.
Multicast: It is used for multiple destinations; possibly not at same site.
Cluster: This type of address is used for collection of computers with same prefix,
datagram is delivered to one out of cluster.

Question No: 45 ( M a r k s: 1 ) http://vuzs.net


Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.


► Unicast

► Anycast

► Multicast

► Non of the given

Following are special types of addresses, IPv6 uses:
Unicast: It is used for single destination computer.
Multicast: It is used for multiple destinations; possibly not at same site.
Cluster: This type of address is used for collection of computers with same prefix,
datagram is delivered to one out of cluster.

Question No: 46 ( M a r k s: 1 ) http://vuzs.net


UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.

► True

► False

UDP offers application programs a Message-Oriented Interface. It does not divide messages into packets for transmission and does not combine messages for delivery.
ADVANTAGES:
Applications can depend on protocol to preserve data boundaries.

Question No: 47 ( M a r k s: 1 ) http://vuzs.net


Reliability is the responsibility of the _________ layer

► Network

► Datalink

► Transport

► Application

Reliability is the responsibility of the Transport layer

Question No: 48 ( M a r k s: 1 ) http://vuzs.net


TCP uses _______ mechanism to control the flow of data.

► door

► window

► acknowledgment

► retransmission

TCP uses window mechanism to control the flow of data.

Question No: 49 ( M a r k s: 1 ) http://vuzs.net


The time for acknowledgement to arrival of packet depends on.


► Distance to destination and Current traffic conditions

► Current traffic conditions

► Distance to destination

► non of these

The time for acknowledgement to arrive depends on:
Distance to destination
Current traffic conditions

Question No: 50 ( M a r k s: 1 ) http://vuzs.net


FDDI can transmits data at a rate of ----------


► 100 million bits per second

► 10 million bits per second

► 1000 million bits per second

► None of the given

FDDI: Fiber distributed data interconnect (FDDI) is another ring technology. Its most
important features are:
It uses fiber optics between stations and transmits data at 100Mbps.

Question No: 51 ( M a r k s: 2 )


How can we prove that we have 2,147,483,648 addresses in class A?


Question No: 52 ( M a r k s: 2 )


Why is internet multicast routing difficult?


Question No: 53 ( M a r k s: 2 )


Define what is the Extension Headers in IPv6.


Question No: 54 ( M a r k s: 3 )


How does IP software reassemble fragments that arrive out of order?


Question No: 55 ( M a r k s: 3 )



What is the first address in the block if one of the addresses is 167.199.170.82/27?


Question No: 56 ( M a r k s: 3 )


In internet routing how does a host join or leave a group?


Question No: 57 ( M a r k s: 5 )


What is the role of area in open shortest path first (OSPF)?



Question No: 58 ( M a r k s: 5 )


Write a note on Address Resolution.


Question No: 59 ( M a r k s: 10 )


What is the concept of classes for IP Addresses? Briefly describe each class.

Leave a Reply

Related Posts Plugin for WordPress, Blogger...