Sunday 29 July 2012

CS610 Midterm Paper - Computer Network - 2008 Sloved (FQ) with Ref 2


you are free to distribute and use it. In case you wanted to host or re-distribute it. Please don’t remove the links of group and website.
 Marks = M


________ has a jitter zero
       None of the given
       Virtual Private Network
       Isochronous Network
       Asynchronous Network

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______.
Connectionless service paradigm

Connection oriented service paradigm
Both Connectionless and Connection-oriented service paradigm
None of the given

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
21-bit
22-bit
23-bit
24-bit
The VC is identified by a 24-bit value formed from the VPI or Virtual Path Indicator (8-
bit),

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________
Hierarchal address
Default route Shortest path
None of the given

The next hop to which a packet is sent depends only on
Packet’s destination

Packet’s original source

Path the packet has taken
Non of the given

An interface for twisted pair Ethernet must have a ____________ connector, and must generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T
(zh,vuzs,nov10)

When an application___________ data, it makes a copy of the data available to all other computers on the network.
Broadcasting
Multicasting
Unicasting
None of the given
When an application broadcasts data, it makes a copy of the data availableto all other computers on the network. Broadcast has many uses. For example, suppose a computer needs to find one of the printers on the network

A ____________ provide a mechanism that a customer can use to set a physical address.
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme
None of the given
One of the advantages of a configurable addressing scheme becomes apparent when network interface hardware fails and must be replaced: unlike hardware that uses a static assignment, a configurable interface can be replaced


FDDI can transmits data at a rate of ___________________
100 million bits per second
100 million bits per second
100 million bits per second
None of the given
FDDI: Fiber distributed data interconnect (FDDI) is another ring technology. Its most
important features are:
It uses fiber optics between stations and transmits data at 100Mbps.
It uses pair of fibers to form two concentric rings.

Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given

________________ has advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given
The chief advantages arise from the size and ease of computation. Most networks that employ a checksum technique use a 76-bit or J2-bit checksum, and compute a single checksum for an entire packet.

The term ___________ is used to denote the definition of a packet used with a specific type of network.
Packet
Frame
Data
None of the given
To help distinguish between the general idea of packet transmission and the specific definition of packets for a given hardware technology, we use the term frame to denote the definition of a packet used with a specific type of network

______________ has no way to determine the cause of the problem.
 Ping
Trace route
ICMP
Non of the given
Ping has no way to determine the cause of the problem. Another reason why ping may fail to generate a response is less subtle: some companies configure their site to reject ping packets.

_____________ Program sends a message to a remote computer and reports whether the computer responds.
Ping
Trace route
ICMP
Non of the given


In ____________, network occupies the smaller area like a room a floor or a building.
LAN
WAN
MAN
None of the given  

Question No: 16    ( M - 1 )  
No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

 
Question No: 17    ( M - 2 )    Format is not clear even I try to do with cntl+A and then change format with 12/Times new roman or ariel. But fail

 
Question No: 18    ( M - 2 )
 
Question No: 19    ( M - 3 )
 
Question No: 20    ( M - 5 )
Which type of information is obtained from network sniffer and in which mode Network sniffer operates?

Solution:
A network analyzer also called network monitor or a network sniffer is used to examine the performance of or debug a network. It can report statistics such as capacity utilization, distribution of frame size, collision rate or token circulation time
Most installations still use DIX Ethernet encoding in which there is no LLC/SNAP header in the frame. A network analyzer can tell from the values in the type field (small values are lengths, which mean an LLC/SNAP header is located in the first octets of the data area; large values are types, which mean no LLC/SNAP header is included).

The operation of network analyzer is a computer with a network interface that receives all frames, which is called promiscuous mode. So many desktop computers have interface that can be configured for promiscuous mode. When combined with software computer can examine any frame on LAN. In this way the communication across LAN is guaranteed to be private. Computer receives and displays frames on the LAN.
Network analyzer can be configured to filter and process frames. It can count frames of specific type of size. It displays only frames from or to specific computers.

 
Question No: 21    ( M - 10 )
Thick Ethernet, Thin Ethernet and Twisted pair Ethernet.

Solution:-

Thick Ethernet:
Thick Ethernet, officially known as 10 Base-5, is the oldest form of Ethernet.
One form of cabling supported by Ethernet is low-loss 50 Ohm coaxial cable as shown in the figure below. This type of cable is 0.5" diameter (usually supplied with a yellow outer PVC coating) and rather inflexible. It has become known in the communications industry as "Thick Ethernet". The official name for this cable is 10 Baseband5 (10B5), indicating that it is specified for baseband communications at 10 Mbps over distances up to 500m.

Thin Ethernet:

Thin Ethernet, officially called 10 Base-2, is a less expensive version of 10 Base-5 (Thick Ethernet) technologies. It uses a lighter and thinner coaxial cable and dispenses with the external transceivers used with 10 Base-5.

10 Base-2 uses an RG-58A/U coaxial cable and is wired in a bus topology. Each device on the network is connected to the bus through a BNC "T" adapter, and each end of the bus must have a 50 Ohm terminator attached. Each node on the bus must be a minimum of 0.5 meters (1.5 feet) apart, and the overall length of the bus must be less than 185 meters (606 feet).


Twisted Pair Ethernet:

Twisted Pair Ethernet (10baseT), sometime also called "UTP" from "Unshielded Twisted Pair", is based on using a cable similar to phone-wiring. The cable is connected via RJ-45 connectors to the network card installed in the PC.



No comments:

Post a Comment