Sunday 29 July 2012

CS610 Midterm 2010 Paper of Computer Networks - (Pr)


CS610 Midterm 2010 Paper of Computer Network

MIDTERM EXAMINATION

spring 2010



1. No error detection scheme is perfect because transmission errors can affect the additional information as well as the data. 1
True
False
2. In -------------, network occupies the smaller area like a room a floor or a building 1
LAN
WAN
MAN
None of the given
3. ------------- was especially concerned about the lack of high powered computers. 1
IEEE
APRA
EIA
None
4. Missing eot indicates sending computer crashed in frame format. 1
5. The -------------term refers to the general concept of a small block of data. 1
Packets
Data
Fram
None of given
6. CRC can detect more errors than a simple shecksum. 1
True
False
7. The network that uses a ------------- , usually consist of a single long cable to which computer attach. 1
Star topology
Bus topology
Ring topology
None of the given
8. Local Talk is a LAN technology that employs ------------- 1
Star topology
Bus topology
Ring topology
None of the given
9. LAN that use ATM tecnology have a ------------- 1
Star topology
Bus topology
Ring topology
None of the given
10. When an application--------------- data, it makes a copy of the data available to all other computers on the network. 1
Broadcasting
Multicasting
Unicasting
None of the given
11. Formally named --------------- informally known as thin wire ethernet or thin net. 1
10 Base 2
10 Base 5
10 Base T
None of the given
12. A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame. 1
Source address, destination adress.
Destination adress, destination address.
Destination adress, source address.
source adress, source address.
13. A Bridge can ---------------. 1
Filter a frame.
Forward a frame.
Extend LAN.
All of the given.
14. Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________ 1
Hierarchal address
Default route
Shortest route
None of the given
15. __________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved. 1
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given  www.vuzs.net 
16. ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy. 1
21-bit
22-bit
23-bit
24-bit
17. --------------- has a jitter zero 1
Virtual Private Network
Isochronous Network
Asynchronous Network
None of the given
18. The network with Throughput T and Delay D has a total --------------- bits in transit at a time. 1
D + T
D – T
D X T
D / T
19. One repeater ---------------, two repeaters --------------- the maximum cable length limitation. 1
Double, triple
Double, 4 time
half, triple
Double, half
20. The length of time required to send a veriable length packet a veriable and does not require a complicated interrupt scheme to detect complication transmission. 1
True
False
21. What is the disadvantages of repeater? 2
Answer:-
Repeaters do not recognize frame formats, they just amplify and retransmit the electrical
signal. If a collision or error occurs in one segment, repeaters amplify and retransmit also the
error onto the other segments. vuzs
22. Why the Conection Oriented Services use the conections identifier instead of full
address? 2

23. What is the logical and physical topology of 10 Base T and token ring network? 3
Answer:-

LOGICAL TOPOLOGY:
It is defined by the specific network technology.
 vuzs.net
PHYSICL TOPOLOGY:
It depends on the wiring scheme.
24. How can switched virtual networks be established? 3
25. Write advantages and disadvantages of public and private Networks. 5

26. A network consist of three pocket switches, what will the next hop forwarding information found in switch 2? 5

No comments:

Post a Comment