CS610 Midterm Solved Paper 2010-2


CS610- Computer Network - Midterm Examination - Solved Paper
of Spring 2010 - 4
 

 Time: 60 min
Marks= M = 40

Question No: 1 ( M - 1 ) http://vuzs.net
No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.
True
► False
No error detection scheme is perfect because transmission errors can affect the additional information as well as the data. A cyclicly redunduncy chcek, which is slightly more difficult to computer can detect more errors then a Parity or Check sum mechnasim.
 
Question No: 2 ( M - 1 ) http://vuzs.net
------ Program sends a message to a remote computer and reports whether the computer responds.
Ping 
► Traceroute
► ICMP
► Non of the given
 
Question No: 3 ( M - 1 ) http://vuzs.net
---------- was especially concerned about the lack of high powered computers.
ARPA
► IEEE
► EIA
► Non of the given
The US Department of Defense Advanced Research Projects Agency (ARPA) was especially concerned about the lack of high-powered computers. Many of the ARPA research projects needed access to the latest equipment
 
Question No: 4 ( M - 1 ) http://vuzs.net
The term -------- is used to denote the definition of a packet used with a specific type of network.
► Packet
Frame
► Data
► None of the given
To help distinguish between the general idea of packet transmission and the specific definition of packets for a given hardware technology, we use the term frame to denote the definition of a packet used with a specific type of network. Thus one might refer the maximum amount of data a frame can hold or the order in which bits of a frame are sent across a network.
 
Question No: 5 ( M - 1 ) http://vuzs.net
Computer networks are often called -------------- because they use packet technology.
► Ethernet
► Switch networks
► Packet networks
► None of the given

Question No: 6 ( M - 1 ) http://vuzs.net
-------------- have advantages arisen from the size and ease of computation.
► CRC
► Parity
► Checksums
► None of given
 
Question No: 7 ( M - 1 ) http://vuzs.net
Most LANs that employ ring topology use an access mechanism known as-------
► CSMA/CD
► CSMA/CA
TOKEN PASSING
► None of the given
Most LANs that employ ring technology use an access mechanism known as token passing. A token ring operates as a single, shared medium. When a computer wants to send data, it must wait until it obtains the token, when it is in control of the ring
 
Question No: 8 ( M - 1 ) http://vuzs.net
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
8 octets
► 8 bytes
► 8 bits
► None of the given



Question No: 9 ( M - 1 ) http://vuzs.net
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
10 Base T
► None of the given
 
 
twisted pair ethernet
·         Formally called 10 Base –T
·         Also twisted pair Ethernet or simply TP Ethernet
 
Question No: 10 ( M - 1 ) http://vuzs.net
An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
an interface for twisted pair Ethernet must have an RJ-45 connector, and must generate signals according to the 10BaseT specification.  (P# 683 E-books)
 
Question No: 11 ( M - 1 ) http://vuzs.net
A bridges function in the _________ layers(s).
► Physical (MAC)
► Data link
►Network
► Physical (MAC) and Data link
Question No: 12 ( M - 1 ) http://vuzs.net
A Bridge can ________
► Filter a frame
► Forward a frame
► Extend a LAN
Do all the above
A bridge is a hardware device also used to connect two LAN segments to extend a LAN. It listens to all traffic and recognizes frame format. It also forwards only correct complete frames and discards the collided and error frames.
The most important task a bridge performs is frame filtering.

Question No: 13 ( M - 1 ) http://vuzs.net
A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________
► Layer 2 source address
► Source node’s physical address
Layer 2 destination address
► Layer 3 destination address
 
Question No: 14 ( M - 1 ) http://vuzs.net
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
► Greedy algorithm
► Distance vector algorithm
Dijksta’s algorithm
► Non of the given
Dijkstras algorithm computes shortest paths in a graph by using weights on edg as a measure of distance. A path with the fewest number of edges may not be the path with least weight. (P# 173 e-books)
 
Question No: 15 ( M - 1 ) http://vuzs.net
___________ is used for audio and video, since these have predefined maximum data rates
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
CONSTANT BIT RATE (CBR):
It is used for audio and video, since these have predefined maximum data rates.
Question No: 16 ( M - 1 ) http://vuzs.net
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .
Connectionless service paradigm
► Connection oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given
Switched Multi megabit Data Service (SMDS) is also a Telco service. It is a connection less service.
FRAME RELAY:
It is used for Telco service for delivering blocks of data. It is connection based
Service ATM uses the concept of connection-oriented networking
 
Question No: 17 ( M - 1 ) http://vuzs.net
A network with throughput T and delay D has a total of ________ bit in transit at any time.
► T / D
T x D
► T + D
► None of the given
A network with throughput T and delay D has a total of T x D bits in transit at 
any time. (e-books)
Question No: 18 ( M - 1 ) http://vuzs.net
ATM is designed to work on___________.
► Twisted Pair
► Coaxial
► Radio Frequency
Fiber
ATM is designed to work on fiber (but can be used with twisted pair). (P# 72)

Question No: 19 ( M - 1 ) http://vuzs.net
Computers attached to an ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.
CSMA/CD
► CSMA/CA
► TOKEN PASSING
► None of the given
All computers attached to the Ethernet use CSMA/CD to co-ordinate their activities. A computer wishing to transmit checks for electrical activity on the cable, informally called a carrier. If there is no carrier, the computer can transmit. If a carrier is present, the computer waits for the sender to finish before proceeding
 
Question No: 20 ( M - 1 ) http://vuzs.net
FDDI can transmits data at a rate of ----------
100 million bits per second
► 10 million bits per second
► 1000 million bits per second
► None of the given
FDDI: Fiber distributed data interconnect (FDDI) is another ring technology. Its most important features are: It uses fiber optics between stations and transmits data at 100Mbps.
 
Question No: 21 ( M - 2 )
What is the difference between the physical and logical topologies?
 
Question No: 22 ( M - 2 )
Define Vector-Distance Algorithm.
 
Question No: 23 ( M - 3 )
What is the concept of store and forward technology?
 
Question No: 24 ( M - 3 )
How can Switched Virtual Network be established?
 
Question No: 25 ( M - 5 )
How can a bridge know whether to forward frames?
 
Question No: 26 ( M - 5 )
Compare connection oriented and connectionless Service.

Leave a Reply

Related Posts Plugin for WordPress, Blogger...