Sunday 29 July 2012

CS 610 Final 2008 Solved With References


FINALTERM EXAMINATION
Fall 2008
CS610- Computer Network
Solved With Refernce By Farhat Qudsia
vuZs Solution Team
Solution is provided by vuZs Solution Team.You are free to distribute and use it. In case you wanted to host or re-distribute it. Please don’t remove the links of group and website
Question No: 1 ( M a r k s: 1 ) http://vuzs.net
In Direct point to point communication adding the Nth computer requires------------ new connections.


► None of the given

► N2

► N-1

► (N2 –N)/2
disadvantage In Direct point to point communication is that adding a new computer to the network requires N-1 new connections .(P# 23)

Question No: 2 ( M a r k s: 1 ) http://vuzs.net

In Point-to-Point topology there are two topologies.

► Tree and Ring

► Star and Ring

► Star and Tree

► None of the given
POINT-TO-POINT:



In Point-to-Point topology there are two topologies.
1) STAR topology
2) TREE topology

Question No: 3 ( M a r k s: 1 ) http://vuzs.net

In -------------, network occupies the smaller area like a room a floor or a building


► LAN

► WAN

► MAN

► None of the given
In LAN network occupies the smaller area like a room a floor or a building.(P# 4)
www.vuzs.net/

Question No: 4 ( M a r k s: 1 ) http://vuzs.net

Hardware that calculates a CRC uses two simple components.

► AND unit and XOR unit

► Shift register and XOR unit

► Shift register and AND unit

► None of the given
CRC uses just two hardware components:
• Shift register
• Exclusive OR ( XOR unit ) .(P# 20)

Question No: 5 ( M a r k s: 1 ) http://vuzs.net

CRC can detect more errors than a simple checksum.


► true

► false


Question No: 6 ( M a r k s: 1 ) http://vuzs.net

The Gigabit Ethernet hardware operates at a rate of --------

► 10 Mbps

► 100 Mbps

► 1000 Mbps

► None of the given
Gigabit Ethernet that operates at 1 Gbps (1000 Mbps) over fiber optics and twisted pair Ethernet cables.

Question No: 7 ( M a r k s: 1 ) http://vuzs.net



Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given
10BASE-T:
This is another standard of wiring scheme. It is commonly called 10Base-T, Twisted Pair or TP Ethernet. (P# 43)

Question No: 8 ( M a r k s: 1 ) http://vuzs.net

An interface for thin Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.

► RJ-45, 10 Base T

► RJ-45, 10 Base 5


► BNC, 10 Base 2


► BNC, 10 Base T

Question No: 9 ( M a r k s: 1 ) http://vuzs.net

A system with redundant bridges might have a problem with_______ in the system.


► 
Loop

► Filters

► Spanning Trees

► All given choices



Question No: 10 ( M a r k s: 1 ) http://vuzs.net

________ computes shortest paths in a graph by using weights on edges as a measure of distance.

► Greedy algorithm

► Distance vector algorithm

► Dijksta’s algorithm

► Non of the given
Djikstra’s algorithm can accommodate weights on edges in graph. The shortest
path is then the path with lowest total weight (sum of the weight with all edges). It should
be noted that the shortest path is not necessarily with fewest edges (or hops).

Question No: 11 ( M a r k s: 1 ) http://vuzs.net

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.


► Connectionless service paradigm

► Connection-oriented service paradigm

► Both Connectionless and Connection-oriented service paradigm

► None of the given


Question No: 12 ( M a r k s: 1 ) http://vuzs.net

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.


► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer

LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer.
www.vuzs.net/

Question No: 13 ( M a r k s: 1 ) http://vuzs.net

An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host


► 48-bit

► 32-bit

► 24-bit

► None of the given

An Internet address (IP address) is a unique 32-bit binary number assigned to a
host and used for all communication with the host

Question No: 14 ( M a r k s: 1 ) http://vuzs.net


The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.


► prefix , suffix

► suffix , prefix

► suffix , suffix

► None of the given

PREFIX:
It identifies the physical network to which the computers are attached.
SUFFIX:
It identifies an individual computer on the network.

Question No: 15 ( M a r k s: 1 ) http://vuzs.net


___________ places the boundary between the first and second octets



► Class A

► Class B

► Class C

► Class D
Class A places the boundary between the first and second octets. Class B places the boundary between the second and third octets, and class C places the boundary between the third and fourth octets.


Question No: 16 ( M a r k s: 1 ) http://vuzs.net


___________ places the boundary between the third and fourth octets.

► Class A

► Class B

► Class C

► Class D
Class A places the boundary between the first and second octets. Class B places the boundary between the second and third octets, and class C places the boundary between the third and fourth octets.


Question No: 17 ( M a r k s: 1 ) http://vuzs.net


________ field of header indicates whether a datagram is a fragment or a complete datagram.


► FLAGS

► FLAGMENT OFFSET

► IDENTIFICATION

► None of the given

FRAGMENTATION:
IP uses fragmentation i.e. datagrams can be split into pieces to fit in network with small MTU. Each fragment is an independent datagram. It includes all header fields. Bit in header indicates that the datagram is a fragment
Question No: 18 ( M a r k s: 1 ) http://vuzs.net

______ provides connectionless service.

► TCP

► UDP

► IP

► None of the given

UDP has the following characteristics.
• It is an end-to-end protocol. It provides application-to-application communication.
• It provides connectionless service.
• It is a Message-Oriented protocol.
• It uses best-effort delivery service.
• It follows arbitrary interaction.
• It is operating system independent


Question No: 19 ( M a r k s: 1 ) http://vuzs.net


UDP and TCP are both_________ layer protocols


► Physical

► Data link

► Network


► Transport



Question No: 20 ( M a r k s: 1 ) http://vuzs.net

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________

► IP

► None of the given

► TCP

► UDP
SERVICE PROVIDED BY TCP:
Following are the services provided by TCP:
• Connection-oriented service
• Point-to-point
• Complete reliability
• Full-duplex communication
• Stream interface
• Reliable connection startup
• Graceful connection shutdown

Question No: 21 ( M a r k s: 1 ) http://vuzs.net

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer
LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer
 
www.vuzs.net/
 

Question No: 22 ( M a r k s: 1 ) http://vuzs.net


________identifies which application program on receiving computer should receive the data

► Logical address

► Source port

► Destination Port

► None of the given

FieldDestinationPort identifies which application program on receiving computer should receive the data. While field source port identifies the application programs that sent the data. (reference from E-books)

Question No: 23 ( M a r k s: 1 ) http://vuzs.net


________ identifies the application program that sent the data.

► 
DestinationPort

► Source port

► Logical address

► None of the given
FieldDestinationPort identifies which application program on receiving computer should receive the data. While field source port identifies the application programs that sent the data. (reference from E-books)

Question No: 24 ( M a r k s: 1 ) http://vuzs.net


The Border Gateway Protocol (BGP) uses_________ for all communication


► UDP

► TCP

► Both UDP and TCP


► None of the given
 
BORDER GATEWAY PROTOCOL:
It is most popular Exterior Gateway Protocol in Internet. It has following characteristics:
"It provides routing among autonomous systems (EGP).
"It provides policies to control routes advertised.
"It uses reliable transport (TCP).


Question No: 25 ( M a r k s: 1 ) http://vuzs.net



Which of the following protocols allows the sender and receiver to enforce polices.

► RIP

► OSPF

► BGP

► RIP and OSPF


Question No: 26 ( M a r k s: 1 ) http://vuzs.net

____________ uses distance vector approach to define routing


► BGP

► OSPF

► RIP

► None of the given

ROUTING INFORMATION PROTOCOL (RIP):
It has the following characteristics:
"It is used for routing within an autonomous system (IGP).
"Hop Count Metric: RIP measures distance in network hops, where each network
between the source and destination counts as a single hop.
"It uses UDP for all message transmissions.
"RIP is used over LAN. Version 1 of RIP uses hardware broadcast and version 2 allows
delivery via multicast.
"It can be used to advertise default route propagation. An organization can use RIP to
install a default route in each router.
"It uses distance vector algorithm.

Question No: 27 ( M a r k s: 1 )

ICMP message transport is acted upon by getting ICMP encrypted in IP.

► True

► False
ICMP message transport is acted upon by getting ICMP encapsulated in IP (P# 117)

Question No: 28 ( M a r k s: 1 ) 
Protocol addresses are abstractions provided by ___________.

► hardware

► software

► operating system

► internet
Protocol addresses are abstractions provided by software

Question No: 29 ( M a r k s: 1 )

These packets serve same purpose on ________ as frames on ______

► Intranet, LAN

► Internet, WAN

► Intranet, WAN

► Internet, LAN
VIRTUAL PACKETS:
These packets serve same purpose in Internet as frames on LAN


Question No: 30 ( M a r k s: 1 ) 


Address mask defines how many bits of address are in suffix?

► True

► False
Address mask defines how many bits of address are in prefix. Prefix defines how much of address used to identify network.

Question No: 31 ( M a r k s: 1 ) 

A single networking technology is best for all needs.

► True

► False
There is no single networking technology that is best for all needs

Question No: 32 ( M a r k s: 1 ) 


A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?


► True

► False
The chief problems with multiple networks are as follows:
• A computer attached to a given network can only communicate with other
computers attached to the same network.

Question No: 33 ( M a r k s: 1 )

The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.

► itself

► prefix

► suffix

► mask
Classful IP addresses are self-identifying because the class of the address can be computed from the address itself

Question No: 34 ( M a r k s: 1 ) - Please choose one

Find the class of the address.
10100111 11011011 10001011 01101111

► A

► B

► E

► C
Reference table handouts P # 87
Question No: 35 ( M a r k s: 1 ) 
Find the class of the address:
11110011 10011011 11111011 00001111

► A

► C

► E

► B

Reference table handouts P # 87

Question No: 36 ( M a r k s: 1 ) 

In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► T

► D

► C

► T, C
 
Reference table handouts P # 97


Question No: 37 ( M a r k s: 1 )


Which method of Address Resolution Protocol requires hardware broadcast?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► D

► T

► C

► T, D

Reference table handouts P # 97


Question No: 38 ( M a r k s: 1 )


Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► T, D

► c

► T

► T, C

Reference table handouts P # 97
Question No: 39 ( M a r k s: 1 )

In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► T, C

► T

► C

► D

Reference table handouts P # 97
Question No: 40 ( M a r k s: 1 )

On of the design goals for unicast route propagation is __________.

► Consistency

► inconsistency

► stability

► dynamic addressing

On of the design goals for unicast route propagation is stability—continual changes in route are undesirable because they lead to higher jitter and datagram arriving out of order. Thus, once a unicast routing protocol finds a shortest path, it usually retains the route until a failure makes the path unusable. (Reference from E-book)


Question No: 41 ( M a r k s: 1 


Propagation multicast routing information differs dramatically from unicast route propagation?

► True

► False
Propagating multicast routing information differs dramatically from unicast route propagation. The difference arises because internet multicast allows dynamic group membership and autonomous senders
Question No: 42 ( M a r k s: 1 )

The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.

► One or more

► only one

► no

► many

Question No: 43 ( M a r k s: 1 )


To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.

► True

► False

To save traffic, an EGP summerize routing information from the autonomous system before passing it to another autonomous system. More important an EGP implements policy constraints that allow a system manager to determine exactly what information is released outside the organization. (Reference from E-book)


Question No: 44 ( M a r k s: 1 ) 


In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.

► Anycast

► Unicast

► Multicast

► Non of the given
Following are special types of addresses, IPv6 uses:
Unicast: It is used for single destination computer.
Multicast: It is used for multiple destinations; possibly not at same site.
Cluster: This type of address is used for collection of computers with same prefix,
datagram is delivered to one out of cluster.

Question No: 45 ( M a r k s: 1 ) 


Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.


► Unicast

► Anycast

► Multicast

► Non of the given
Following are special types of addresses, IPv6 uses:
Unicast: It is used for single destination computer.
Multicast: It is used for multiple destinations; possibly not at same site.
Cluster: This type of address is used for collection of computers with same prefix,
datagram is delivered to one out of cluster.

Question No: 46 ( M a r k s: 1 )


UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.

► True

► False
UDP offers application programs a Message-Oriented Interface. It does not divide messages into packets for transmission and does not combine messages for delivery.
ADVANTAGES:
• Applications can depend on protocol to preserve data boundaries.

Question No: 47 ( M a r k s: 1 ) 

Reliability is the responsibility of the _________ layer

► Network

► Datalink

► Transport

► Application
Reliability is the responsibility of the Transport layer
Question No: 48 ( M a r k s: 1 ) 


TCP uses _______ mechanism to control the flow of data.

► door

► window

► acknowledgment

► retransmission
TCP uses window mechanism to control the flow of data.

Question No: 49 ( M a r k s: 


The time for acknowledgement to arrival of packet depends on.


► Distance to destination and Current traffic conditions

► Current traffic conditions

► Distance to destination

► non of these
The time for acknowledgement to arrive depends on:
• Distance to destination
• Current traffic conditions

Question No: 50 ( M a r k s: 1 

FDDI can transmits data at a rate of ----------


► 100 million bits per second

► 10 million bits per second

► 1000 million bits per second

► None of the given
FDDI: Fiber distributed data interconnect (FDDI) is another ring technology. Its most
important features are:
It uses fiber optics between stations and transmits data at 100Mbps.

Question No: 51 ( M a r k s: 2 )


How can we prove that we have 2,147,483,648 addresses in class A?


Question No: 52 ( M a r k s: 2 )


Why is internet multicast routing difficult?


Question No: 53 ( M a r k s: 2 )


Define what is the Extension Headers in IPv6.


Question No: 54 ( M a r k s: 3 )


How does IP software reassemble fragments that arrive out of order?


Question No: 55 ( M a r k s: 3 )



What is the first address in the block if one of the addresses is 167.199.170.82/27?


Question No: 56 ( M a r k s: 3 )


In internet routing how does a host join or leave a group?


Question No: 57 ( M a r k s: 5 )


What is the role of area in open shortest path first (OSPF)?



Question No: 58 ( M a r k s: 5 )


Write a note on Address Resolution.


Question No: 59 ( M a r k s: 10 )


What is the concept of classes for IP Addresses? Briefly describe each class.

No comments:

Post a Comment