FINALTERM EXAMINATION
Fall 2008
CS610- Computer Network
Question No: 1 ( M a r k s: 1 ) http://vuzs.net
In Direct point to point communication adding the Nth computer requires------------ new connections.
► None of the given
► N2
► N-1
► (N2 –N)/2
disadvantage In Direct point to point communication is that adding a new computer to the network requires N-1 new connections .(P# 23)
Question No: 2 ( M a r k s: 1 ) http://vuzs.net
In Point-to-Point topology there are two topologies.
► Tree and Ring
► Star and Ring
► Star and Tree
► None of the given
POINT-TO-POINT:
In Direct point to point communication adding the Nth computer requires------------ new connections.
► None of the given
► N2
► N-1
► (N2 –N)/2
disadvantage In Direct point to point communication is that adding a new computer to the network requires N-1 new connections .(P# 23)
Question No: 2 ( M a r k s: 1 ) http://vuzs.net
In Point-to-Point topology there are two topologies.
► Tree and Ring
► Star and Ring
► Star and Tree
► None of the given
POINT-TO-POINT:
In Point-to-Point topology there are two topologies.
1) STAR topology
2) TREE topology
Question No: 3 ( M a r k s: 1 ) http://vuzs.net
In -------------, network occupies the smaller area like a room a floor or a building
► LAN
► WAN
► MAN
► None of the given
In LAN network occupies the smaller area like a room a floor or a building.(P# 4)
Question No: 4 ( M a r k s: 1 ) http://vuzs.net
Hardware that calculates a CRC uses two simple components.
► AND unit and XOR unit
► Shift register and XOR unit
► Shift register and AND unit
► None of the given
CRC uses just two hardware components:
Question No: 3 ( M a r k s: 1 ) http://vuzs.net
In -------------, network occupies the smaller area like a room a floor or a building
► LAN
► WAN
► MAN
► None of the given
In LAN network occupies the smaller area like a room a floor or a building.(P# 4)
Question No: 4 ( M a r k s: 1 ) http://vuzs.net
Hardware that calculates a CRC uses two simple components.
► AND unit and XOR unit
► Shift register and XOR unit
► Shift register and AND unit
► None of the given
CRC uses just two hardware components:
• Shift register
• Exclusive OR ( XOR unit ) .(P# 20)
Question No: 5 ( M a r k s: 1 ) http://vuzs.net
CRC can detect more errors than a simple checksum.
► true
► false
Question No: 6 ( M a r k s: 1 ) http://vuzs.net
The Gigabit Ethernet hardware operates at a rate of --------
► 10 Mbps
► 100 Mbps
► 1000 Mbps
► None of the given
Gigabit Ethernet that operates at 1 Gbps (1000 Mbps) over fiber optics and twisted pair Ethernet cables.
Question No: 7 ( M a r k s: 1 ) http://vuzs.net
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
10BASE-T:
Question No: 5 ( M a r k s: 1 ) http://vuzs.net
CRC can detect more errors than a simple checksum.
► true
► false
Question No: 6 ( M a r k s: 1 ) http://vuzs.net
The Gigabit Ethernet hardware operates at a rate of --------
► 10 Mbps
► 100 Mbps
► 1000 Mbps
► None of the given
Gigabit Ethernet that operates at 1 Gbps (1000 Mbps) over fiber optics and twisted pair Ethernet cables.
Question No: 7 ( M a r k s: 1 ) http://vuzs.net
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
10BASE-T:
This is another standard of wiring scheme. It is commonly called 10Base-T, Twisted Pair or TP Ethernet. (P# 43)
Question No: 8 ( M a r k s: 1 ) http://vuzs.net
An interface for thin Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
Question No: 9 ( M a r k s: 1 ) http://vuzs.net
A system with redundant bridges might have a problem with_______ in the system.
► Loop
► Filters
► Spanning Trees
► All given choices
Question No: 10 ( M a r k s: 1 ) http://vuzs.net
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
► Greedy algorithm
► Distance vector algorithm
► Dijksta’s algorithm
► Non of the given
Djikstra’s algorithm can accommodate weights on edges in graph. The shortest
Question No: 8 ( M a r k s: 1 ) http://vuzs.net
An interface for thin Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
Question No: 9 ( M a r k s: 1 ) http://vuzs.net
A system with redundant bridges might have a problem with_______ in the system.
► Loop
► Filters
► Spanning Trees
► All given choices
Question No: 10 ( M a r k s: 1 ) http://vuzs.net
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
► Greedy algorithm
► Distance vector algorithm
► Dijksta’s algorithm
► Non of the given
Djikstra’s algorithm can accommodate weights on edges in graph. The shortest
path is then the path with lowest total weight (sum of the weight with all edges). It should
be noted that the shortest path is not necessarily with fewest edges (or hops).
Question No: 11 ( M a r k s: 1 ) http://vuzs.net
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
► Connectionless service paradigm
► Connection-oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given
Question No: 12 ( M a r k s: 1 ) http://vuzs.net
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer.
Question No: 13 ( M a r k s: 1 ) http://vuzs.net
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
► 48-bit
► 32-bit
► 24-bit
► None of the given
An Internet address (IP address) is a unique 32-bit binary number assigned to a
Question No: 11 ( M a r k s: 1 ) http://vuzs.net
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
► Connectionless service paradigm
► Connection-oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given
Question No: 12 ( M a r k s: 1 ) http://vuzs.net
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer.
Question No: 13 ( M a r k s: 1 ) http://vuzs.net
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
► 48-bit
► 32-bit
► 24-bit
► None of the given
An Internet address (IP address) is a unique 32-bit binary number assigned to a
host and used for all communication with the host
Question No: 14 ( M a r k s: 1 ) http://vuzs.net
The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.
► prefix , suffix
► suffix , prefix
► suffix , suffix
► None of the given
PREFIX:
Question No: 14 ( M a r k s: 1 ) http://vuzs.net
The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.
► prefix , suffix
► suffix , prefix
► suffix , suffix
► None of the given
PREFIX:
It identifies the physical network to which the computers are attached.
SUFFIX:
It identifies an individual computer on the network.
Question No: 15 ( M a r k s: 1 ) http://vuzs.net
___________ places the boundary between the first and second octets
► Class A
► Class B
► Class C
► Class D
Class A places the boundary between the first and second octets. Class B places the boundary between the second and third octets, and class C places the boundary between the third and fourth octets.
Question No: 15 ( M a r k s: 1 ) http://vuzs.net
___________ places the boundary between the first and second octets
► Class A
► Class B
► Class C
► Class D
Class A places the boundary between the first and second octets. Class B places the boundary between the second and third octets, and class C places the boundary between the third and fourth octets.
Question No: 16 ( M a r k s: 1 ) http://vuzs.net
___________ places the boundary between the third and fourth octets.
► Class A
► Class B
► Class C
► Class D
Class A places the boundary between the first and second octets. Class B places the boundary between the second and third octets, and class C places the boundary between the third and fourth octets.
Question No: 17 ( M a r k s: 1 ) http://vuzs.net
________ field of header indicates whether a datagram is a fragment or a complete datagram.
► FLAGS
► FLAGMENT OFFSET
► IDENTIFICATION
► None of the given
FRAGMENTATION:
IP uses fragmentation i.e. datagrams can be split into pieces to fit in network with small MTU. Each fragment is an independent datagram. It includes all header fields. Bit in header indicates that the datagram is a fragment
Question No: 18 ( M a r k s: 1 ) http://vuzs.net
______ provides connectionless service.
► TCP
► UDP
► IP
► None of the given
______ provides connectionless service.
► TCP
► UDP
► IP
► None of the given
UDP has the following characteristics.
• It is an end-to-end protocol. It provides application-to-application communication.
• It provides connectionless service.
• It is a Message-Oriented protocol.
• It uses best-effort delivery service.
• It follows arbitrary interaction.
• It is operating system independent
Question No: 19 ( M a r k s: 1 ) http://vuzs.net
UDP and TCP are both_________ layer protocols
► Physical
► Data link
► Network
► Transport
Question No: 20 ( M a r k s: 1 ) http://vuzs.net
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________
► IP
► None of the given
► TCP
► UDP
SERVICE PROVIDED BY TCP:
Question No: 19 ( M a r k s: 1 ) http://vuzs.net
UDP and TCP are both_________ layer protocols
► Physical
► Data link
► Network
► Transport
Question No: 20 ( M a r k s: 1 ) http://vuzs.net
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________
► IP
► None of the given
► TCP
► UDP
SERVICE PROVIDED BY TCP:
Following are the services provided by TCP:
• Connection-oriented service
• Point-to-point
• Complete reliability
• Full-duplex communication
• Stream interface
• Reliable connection startup
• Graceful connection shutdown
Question No: 21 ( M a r k s: 1 ) http://vuzs.net
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer
Question No: 21 ( M a r k s: 1 ) http://vuzs.net
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer
Question No: 22 ( M a r k s: 1 ) http://vuzs.net
________identifies which application program on receiving computer should receive the data
► Logical address
► Source port
► Destination Port
► None of the given
FieldDestinationPort identifies which application program on receiving computer should receive the data. While field source port identifies the application programs that sent the data. (reference from E-books)
Question No: 23 ( M a r k s: 1 ) http://vuzs.net
________ identifies the application program that sent the data.
► DestinationPort
► Source port
► Logical address
► None of the given
FieldDestinationPort identifies which application program on receiving computer should receive the data. While field source port identifies the application programs that sent the data. (reference from E-books)
Question No: 24 ( M a r k s: 1 ) http://vuzs.net
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP
► Both UDP and TCP
► None of the given
BORDER GATEWAY PROTOCOL:
It is most popular Exterior Gateway Protocol in Internet. It has following characteristics:
"It provides routing among autonomous systems (EGP).
"It provides policies to control routes advertised.
"It uses reliable transport (TCP).
Question No: 25 ( M a r k s: 1 ) http://vuzs.net
Which of the following protocols allows the sender and receiver to enforce polices.
► RIP
► OSPF
► BGP
► RIP and OSPF
Question No: 26 ( M a r k s: 1 ) http://vuzs.net
____________ uses distance vector approach to define routing
► BGP
► OSPF
► RIP
► None of the given
ROUTING INFORMATION PROTOCOL (RIP):
Question No: 25 ( M a r k s: 1 ) http://vuzs.net
Which of the following protocols allows the sender and receiver to enforce polices.
► RIP
► OSPF
► BGP
► RIP and OSPF
Question No: 26 ( M a r k s: 1 ) http://vuzs.net
____________ uses distance vector approach to define routing
► BGP
► OSPF
► RIP
► None of the given
ROUTING INFORMATION PROTOCOL (RIP):
It has the following characteristics:
"It is used for routing within an autonomous system (IGP).
"Hop Count Metric: RIP measures distance in network hops, where each network
between the source and destination counts as a single hop.
"It uses UDP for all message transmissions.
"RIP is used over LAN. Version 1 of RIP uses hardware broadcast and version 2 allows
delivery via multicast.
"It can be used to advertise default route propagation. An organization can use RIP to
install a default route in each router.
"It uses distance vector algorithm.
Question No: 27 ( M a r k s: 1 ) http://vuzs.net
ICMP message transport is acted upon by getting ICMP encrypted in IP.
► True
► False
ICMP message transport is acted upon by getting ICMP encapsulated in IP (P# 117)
Question No: 28 ( M a r k s: 1 ) http://vuzs.net
Protocol addresses are abstractions provided by ___________.
► hardware
► software
► operating system
► internet
Protocol addresses are abstractions provided by software
Question No: 29 ( M a r k s: 1 ) http://vuzs.net
These packets serve same purpose on ________ as frames on ______
► Intranet, LAN
► Internet, WAN
► Intranet, WAN
► Internet, LAN
VIRTUAL PACKETS:
Question No: 27 ( M a r k s: 1 ) http://vuzs.net
ICMP message transport is acted upon by getting ICMP encrypted in IP.
► True
► False
ICMP message transport is acted upon by getting ICMP encapsulated in IP (P# 117)
Question No: 28 ( M a r k s: 1 ) http://vuzs.net
Protocol addresses are abstractions provided by ___________.
► hardware
► software
► operating system
► internet
Protocol addresses are abstractions provided by software
Question No: 29 ( M a r k s: 1 ) http://vuzs.net
These packets serve same purpose on ________ as frames on ______
► Intranet, LAN
► Internet, WAN
► Intranet, WAN
► Internet, LAN
VIRTUAL PACKETS:
These packets serve same purpose in Internet as frames on LAN
Question No: 30 ( M a r k s: 1 ) http://vuzs.net
Address mask defines how many bits of address are in suffix?
► True
► False
Address mask defines how many bits of address are in prefix. Prefix defines how much of address used to identify network.
Question No: 31 ( M a r k s: 1 ) http://vuzs.net
A single networking technology is best for all needs.
► True
► False
There is no single networking technology that is best for all needs
Question No: 32 ( M a r k s: 1 ) http://vuzs.net
A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
► True
► False
The chief problems with multiple networks are as follows:
Question No: 30 ( M a r k s: 1 ) http://vuzs.net
Address mask defines how many bits of address are in suffix?
► True
► False
Address mask defines how many bits of address are in prefix. Prefix defines how much of address used to identify network.
Question No: 31 ( M a r k s: 1 ) http://vuzs.net
A single networking technology is best for all needs.
► True
► False
There is no single networking technology that is best for all needs
Question No: 32 ( M a r k s: 1 ) http://vuzs.net
A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
► True
► False
The chief problems with multiple networks are as follows:
• A computer attached to a given network can only communicate with other
computers attached to the same network.
Question No: 33 ( M a r k s: 1 ) http://vuzs.net
The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
► itself
► prefix
► suffix
► mask
Question No: 33 ( M a r k s: 1 ) http://vuzs.net
The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
► itself
► prefix
► suffix
► mask
Classful IP addresses are self-identifying because the class of the address can be computed from the address itself
Question No: 34 ( M a r k s: 1 ) - Please choose one
Find the class of the address.
10100111 11011011 10001011 01101111
► A
► B
► E
► C
Reference table handouts P # 87
Question No: 34 ( M a r k s: 1 ) - Please choose one
Find the class of the address.
10100111 11011011 10001011 01101111
► A
► B
► E
► C
Reference table handouts P # 87
Question No: 35 ( M a r k s: 1 ) http://vuzs.net
Find the class of the address:
11110011 10011011 11111011 00001111
► A
► C
► E
► B
Reference table handouts P # 87
Question No: 36 ( M a r k s: 1 ) http://vuzs.net
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T
► D
► C
► T, C
Find the class of the address:
11110011 10011011 11111011 00001111
► A
► C
► E
► B
Reference table handouts P # 87
Question No: 36 ( M a r k s: 1 ) http://vuzs.net
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T
► D
► C
► T, C
Reference table handouts P # 97
Question No: 37 ( M a r k s: 1 ) http://vuzs.net
Which method of Address Resolution Protocol requires hardware broadcast?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► D
► T
► C
► T, D
Reference table handouts P # 97
Question No: 38 ( M a r k s: 1 ) http://vuzs.net
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, D
► c
► T
► T, C
Reference table handouts P # 97
Question No: 39 ( M a r k s: 1 ) http://vuzs.net
In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, C
► T
► C
► D
Reference table handouts P # 97
Question No: 40 ( M a r k s: 1 ) http://vuzs.net
On of the design goals for unicast route propagation is __________.
► Consistency
► inconsistency
► stability
► dynamic addressing
On of the design goals for unicast route propagation is stability—continual changes in route are undesirable because they lead to higher jitter and datagram arriving out of order. Thus, once a unicast routing protocol finds a shortest path, it usually retains the route until a failure makes the path unusable. (Reference from E-book)
Question No: 37 ( M a r k s: 1 ) http://vuzs.net
Which method of Address Resolution Protocol requires hardware broadcast?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► D
► T
► C
► T, D
Reference table handouts P # 97
Question No: 38 ( M a r k s: 1 ) http://vuzs.net
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, D
► c
► T
► T, C
Reference table handouts P # 97
Question No: 39 ( M a r k s: 1 ) http://vuzs.net
In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, C
► T
► C
► D
Reference table handouts P # 97
Question No: 40 ( M a r k s: 1 ) http://vuzs.net
On of the design goals for unicast route propagation is __________.
► Consistency
► inconsistency
► stability
► dynamic addressing
On of the design goals for unicast route propagation is stability—continual changes in route are undesirable because they lead to higher jitter and datagram arriving out of order. Thus, once a unicast routing protocol finds a shortest path, it usually retains the route until a failure makes the path unusable. (Reference from E-book)
Question No: 41 ( M a r k s: 1 ) http://vuzs.net
Propagation multicast routing information differs dramatically from unicast route propagation?
► True
► False
Propagating multicast routing information differs dramatically from unicast route propagation. The difference arises because internet multicast allows dynamic group membership and autonomous senders
Question No: 42 ( M a r k s: 1 ) http://vuzs.net
The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.
► One or more
► only one
► no
► many
Question No: 43 ( M a r k s: 1 ) http://vuzs.net
To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
► True
► False
To save traffic, an EGP summerize routing information from the autonomous system before passing it to another autonomous system. More important an EGP implements policy constraints that allow a system manager to determine exactly what information is released outside the organization. (Reference from E-book)
Question No: 44 ( M a r k s: 1 ) http://vuzs.net
In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.
► Anycast
► Unicast
► Multicast
► Non of the given
Following are special types of addresses, IPv6 uses:
Unicast: It is used for single destination computer.
Multicast: It is used for multiple destinations; possibly not at same site.
Cluster: This type of address is used for collection of computers with same prefix,
datagram is delivered to one out of cluster.
Question No: 45 ( M a r k s: 1 ) http://vuzs.net
Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
► Unicast
► Anycast
► Multicast
► Non of the given
Following are special types of addresses, IPv6 uses:
Question No: 45 ( M a r k s: 1 ) http://vuzs.net
Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
► Unicast
► Anycast
► Multicast
► Non of the given
Following are special types of addresses, IPv6 uses:
Unicast: It is used for single destination computer.
Multicast: It is used for multiple destinations; possibly not at same site.
Cluster: This type of address is used for collection of computers with same prefix,
datagram is delivered to one out of cluster.
Question No: 46 ( M a r k s: 1 ) http://vuzs.net
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
► True
► False
UDP offers application programs a Message-Oriented Interface. It does not divide messages into packets for transmission and does not combine messages for delivery.
Question No: 46 ( M a r k s: 1 ) http://vuzs.net
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
► True
► False
UDP offers application programs a Message-Oriented Interface. It does not divide messages into packets for transmission and does not combine messages for delivery.
ADVANTAGES:
• Applications can depend on protocol to preserve data boundaries.
Question No: 47 ( M a r k s: 1 ) http://vuzs.net
Reliability is the responsibility of the _________ layer
► Network
► Datalink
► Transport
► Application
Reliability is the responsibility of the Transport layer
Question No: 47 ( M a r k s: 1 ) http://vuzs.net
Reliability is the responsibility of the _________ layer
► Network
► Datalink
► Transport
► Application
Reliability is the responsibility of the Transport layer
Question No: 48 ( M a r k s: 1 ) http://vuzs.net
TCP uses _______ mechanism to control the flow of data.
► door
► window
► acknowledgment
► retransmission
TCP uses window mechanism to control the flow of data.
Question No: 49 ( M a r k s: 1 ) http://vuzs.net
The time for acknowledgement to arrival of packet depends on.
► Distance to destination and Current traffic conditions
► Current traffic conditions
► Distance to destination
► non of these
The time for acknowledgement to arrive depends on:
TCP uses _______ mechanism to control the flow of data.
► door
► window
► acknowledgment
► retransmission
TCP uses window mechanism to control the flow of data.
Question No: 49 ( M a r k s: 1 ) http://vuzs.net
The time for acknowledgement to arrival of packet depends on.
► Distance to destination and Current traffic conditions
► Current traffic conditions
► Distance to destination
► non of these
The time for acknowledgement to arrive depends on:
• Distance to destination
• Current traffic conditions
Question No: 50 ( M a r k s: 1 ) http://vuzs.net
FDDI can transmits data at a rate of ----------
► 100 million bits per second
► 10 million bits per second
► 1000 million bits per second
► None of the given
FDDI: Fiber distributed data interconnect (FDDI) is another ring technology. Its most
Question No: 50 ( M a r k s: 1 ) http://vuzs.net
FDDI can transmits data at a rate of ----------
► 100 million bits per second
► 10 million bits per second
► 1000 million bits per second
► None of the given
FDDI: Fiber distributed data interconnect (FDDI) is another ring technology. Its most
important features are:
It uses fiber optics between stations and transmits data at 100Mbps.
Question No: 51 ( M a r k s: 2 )
How can we prove that we have 2,147,483,648 addresses in class A?
Question No: 52 ( M a r k s: 2 )
Why is internet multicast routing difficult?
Question No: 53 ( M a r k s: 2 )
Define what is the Extension Headers in IPv6.
Question No: 54 ( M a r k s: 3 )
How does IP software reassemble fragments that arrive out of order?
Question No: 55 ( M a r k s: 3 )
What is the first address in the block if one of the addresses is 167.199.170.82/27?
Question No: 56 ( M a r k s: 3 )
In internet routing how does a host join or leave a group?
Question No: 57 ( M a r k s: 5 )
What is the role of area in open shortest path first (OSPF)?
Question No: 58 ( M a r k s: 5 )
Write a note on Address Resolution.
Question No: 59 ( M a r k s: 10 )
What is the concept of classes for IP Addresses? Briefly describe each class.
Question No: 51 ( M a r k s: 2 )
How can we prove that we have 2,147,483,648 addresses in class A?
Question No: 52 ( M a r k s: 2 )
Why is internet multicast routing difficult?
Question No: 53 ( M a r k s: 2 )
Define what is the Extension Headers in IPv6.
Question No: 54 ( M a r k s: 3 )
How does IP software reassemble fragments that arrive out of order?
Question No: 55 ( M a r k s: 3 )
What is the first address in the block if one of the addresses is 167.199.170.82/27?
Question No: 56 ( M a r k s: 3 )
In internet routing how does a host join or leave a group?
Question No: 57 ( M a r k s: 5 )
What is the role of area in open shortest path first (OSPF)?
Question No: 58 ( M a r k s: 5 )
Write a note on Address Resolution.
Question No: 59 ( M a r k s: 10 )
What is the concept of classes for IP Addresses? Briefly describe each class.