FINALTERM EXAMINATION Spring 2010
CS610- Computer Network
Time: 90 min
M a r k s: 60
Question No: 1( M a r k s: 1 ) http://vuzs.net
A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.
► Static addressing scheme
► Configurable addressing scheme
► Dynamic addressing scheme
► None of the given
Question No: 2 ( M a r k s: 1 ) http://vuzs.net
An interface for thin Ethernet must have an ____________ connector , and must enerate signals according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
Question No: 3( M a r k s: 1 ) http://vuzs.net
A system with redundant bridges might have a problem with_______ in the system.
► Loop
► Filters
► Spanning Trees
► All given choices
Question No: 4( M a r k s: 1 ) http://vuzs.net
A Bridge can ________
► Filter a frame
► Forward a frame
► Extend a LAN
► Do all the above
Question No: 5( M a r k s: 1 ) http://vuzs.net
________ is used for typical data applications (where the data rate
may be unknown and bursty) and allows use of whatever bandwidth is
available at a given time.
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
Question No: 6( M a r k s: 1 ) http://vuzs.net
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
► 21-bit
► 22-bit
► 23-bit
► 24-bit
The VC is identified by a 24-bit value formed from the VPI or Virtual Path Indicator (8-
bit),
Question No: 7( M a r k s: 1 ) http://vuzs.net
________ of TCP/IP layering model, corresponds to basic network hardware.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
Question No: 8( M a r k s: 1 ) http://vuzs.net
_________ places the boundary between the second and third octets
► Class A
► Class B
► Class C
► Class D
the primary classes use octet boundaries to partition an address
into prefix and suffix. Class A places the boundary between the first
and second octets. Class B places the boundary between the second and
third octets, and class C places the boundary between the third and
fourth octets.
Question No: 9( M a r k s: 1 ) http://vuzs.net
UDP and TCP are both_________ layer protocols
► Physical
► Data link
► Network
Question No: 10( M a r k s: 1 ) http://vuzs.net
Connection-oriented service, Point-to-point, Complete reliability,
Full-duplex communication, Stream interface, Reliable connection startup
and Graceful connection shutdown are the services provided by__________
► IP
► None of the given
► TCP
► UDP
Question No: 11( M a r k s: 1 ) http://vuzs.net
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
Question No: 12( M a r k s: 1 ) http://vuzs.net
________identifies which application program on receiving computer should receive the data
► Logical address
► Source port
► Destination Port
► None of the given
Question No: 13( M a r k s: 1 ) http://vuzs.net
________ identifies the application program that sent the data.
► Destination Port
► Source port
► Logical address
► None of the given
Question No: 14( M a r k s: 1 ) http://vuzs.net
Which of the following are interior routing protocols?
► RIP
► OSPF
► BGP
► RIP and OSPF
Most common routing protocols, such as
RIP and OSPF, are interior routing protocols. The basic routable element
is the IP network or subnetwork
Question No: 15( M a r k s: 1 ) http://vuzs.net
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP
► Both UDP and TCP
► None of the given
Border Gateway Protocol (BGP) uses TCP
sockets to communicate with other routers. Consequently, the groundwork
to make BGP highly available
Question No: 16( M a r k s: 1 ) http://vuzs.net
__________measures distance in network hops, where each network between the source and destination counts as single hop.
► BGP
► OSPF
► RIP
► None of the given
RIP measures distance in network hops, where each network between the source and destination counts as a single hop
Question No: 17( M a r k s: 1 ) http://vuzs.net
OSPF is based on____
► Distance vector routing
► Link state routing
► Path vector routing
► Distance vector routing and Link state routing
SPF is based on link-state technology
that has several advantages over distance-vector protocols such as RIP:
no hop count limitations
Question No: 18( M a r k s: 1 ) http://vuzs.net
_________ performs local multicast and uses IP-in-IP encapsulation
to send multicast datagrams from one site on the Internet to another.
► Distance Vector Multicast Routing Protocol (DVMRP)
► Core Based Trees (CBT)
► Protocol Independent Multicast_ Sparse Mode (PIM-SM)
► Protocol Independent Multicast _ Dense Mode (PIM-DM)
DVMRP performs local multicast and uses
IP-in-IP encapsulation to send multi cast data grams from one site on
the Internet to another
Question No: 19( M a r k s: 1 ) http://vuzs.net
The length of time required to send a variable length packet is
variable and does not require a complicated interrupt scheme to detect
completion of transmission.
► True
► False
The length of time required to send a
variable length packet is variable and requires complicated interrupt
scheme to detect completion of transmission
Question No: 20( M a r k s: 1 ) http://vuzs.net
Question No: 20( M a r k s: 1 ) http://vuzs.net
NEXT HEADER field in the base header defines type of header and it appears at end of fixed-size base header.
► True
► False
NEXT HEADER field in the base header
defines type of header and it appears at end of fixed-size base header.
Some extension headers are
Question No: 21( M a r k s: 1 ) http://vuzs.net
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
► True
► False
CASHING ARP RESPONSES:
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
Question No: 22( M a r k s: 1 ) http://vuzs.net
Address mask defines how many bits of address are in suffix?
► True
► False
Next hop stored as IP address of router
Address mask defines how many bits of address are in prefix
Prefix defines how much of address used to identify network
Question No: 23( M a r k s: 1 ) http://vuzs.net
A computer attached to a given network can only communicate with
other computers attached to the same network. Is this a problem with
multiple networks?
► True
► False
The chief problem with multiple networks is obvious:
A computer attached to a given network can only communicate with other computers attached to the same network
The problem became evident in the 1970s as large organizations began to acquire multiple networks
Each network in the organization formed an island
Question No: 24( M a r k s: 1 ) http://vuzs.net
In the 1970s large organizations began to acquire multiple
networks. Each network in the organization formed island. Employees
needed to choose a computer appropriate for each task. So they needed
multiple screens, keyboards and computers.
► False
► True
Question No: 25( M a r k s: 1 ) http://vuzs.net
The term self-identifying is used for Classful IP addresses because
the class of the address can be computed from the address__________.
► itself
► prefix
► suffix
► mask
Classful IP addresses are self-identifying because the class of the address can be computed from the address itself.
Question No: 26( M a r k s: 1 ) http://vuzs.net
In which method of Address Resolution Protocol the protocol address independent of hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, C
► D
► C
► T, D
Page 94
Question No: 27( M a r k s: 1 ) http://vuzs.net
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T
► D
► C
► T, C
Page94
Question No: 28( M a r k s: 1 ) http://vuzs.net
Reconstruction of original datagram is called reassembly.
► True
► False
Reconstruction of original datagram is
call reassembly; Ultimate destination performs reassembly; Fragments may
arrive out of order;
Question No: 29( M a r k s: 1 ) http://vuzs.net
A computer needs a complete stack of protocols to run either a client or a server.
► True
► False
Question No: 30( M a r k s: 1 ) http://vuzs.net
TCP uses _______ mechanism to control the flow of data.
► door
► window
► acknowledgment
► retransmission
TCP uses a window mechanism to control the flow of data and prevent data overrun
Each end of the connection allocates a buffer and notifies the other end of its size