Sunday 29 July 2012


FINALTERM  EXAMINATION
Spring 2010
CS610- Computer Network
Time: 90 min
M a r k s: 60






Question No: 1      ( M a r k s: 1 ) http://vuzs.net
 

A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.



       ► Static addressing scheme

       ► Configurable addressing scheme


       ► Dynamic addressing scheme

       ► None of the given


Question No: 2      ( M a r k s: 1 ) 
 

An interface for thin  Ethernet must have an ____________  connector , and must generate signals according to the_____________ specification.

       ► RJ-45, 10 Base T

       ► RJ-45, 10 Base 5


       ► BNC, 10 Base 2


       ► BNC, 10 Base T


Question No: 3      ( M a r k s: 1 ) h
 

A system with redundant bridges might have a problem with_______ in the system.


       ► Loop

       ► Filters

       ► Spanning Trees

       ► All given choices


Question No: 4      ( M a r k s: 1 )
 

A Bridge can ________


       ► Filter a frame

       ► Forward a frame

       ► Extend a LAN

       ► Do all the above


Question No: 5      ( M a r k s: 1 ) 
 

________ is used for typical data applications (where the data rate may be unknown and bursty) and allows use of whatever bandwidth is available at a given time.

       ► Constant Bit Rate (CBR) service

       ► Variable Bit Rate (VBR) service

       ► Available Bit Rate (ABR) service

       ► None of the given


Question No: 6      ( M a r k s: 1  

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.

       ► 21-bit

       ► 22-bit

       ► 23-bit

       ► 24-bit


Question No: 7      ( M a r k s: 1 ) \
 

________ of TCP/IP layering model, corresponds to basic network hardware.


       ► Physical Layer

       ► Network Interface Layer

       ► Internet Layer

       ► Transport Layer



Question No: 8      ( M a r k s: 1 ) \ 

___________ places the boundary between the second and third octets

       ► Class A

       ► Class B

       ► Class C

       ► Class D


Question No: 9      ( M a r k s: 1 )  

UDP and TCP are both_________ layer protocols


       ► Physical

       ► Data link

       ► Network


       ► Transport


Question No: 10      ( M a r k s: 1 ) 
 

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________

       ► IP

       ► None of the given

       ► TCP

       ► UDP


Question No: 11      ( M a r k s: 1 ) 
 

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

       ► Physical Layer

       ► Network Interface Layer

       ► Internet Layer

       ► Transport Layer



Question No: 12      ( M a r k s: 1 )
 

________identifies which application program on receiving computer should receive the data

       ► Logical address
Source port
Logical address
None of the given


       ► Source port

       ► Destination Port

       ► None of the given


Question No: 13      ( M a r k s: 1 ) \ 

________ identifies the application program that sent the data.

       ►  Destination Port


       ► Source port

       ► Logical address

       ► None of the given


Question No: 14      ( M a r k s: 1 ) h 

Which of the following are interior routing protocols?


       ► RIP

       ► OSPF

       ► BGP

       ► RIP and OSPF



Question No: 15      ( M a r k s: 1 ) tThe Border Gateway Protocol (BGP) uses_________ for all communication


       ► UDP

       ► TCP

       ► Both UDP and TCP


       ► None of the given


Question No: 16      ( M a r k s: 1 ) 
 

__________measures distance in network hops, where each network between the source and destination counts as single hop.

       ► BGP

       ► OSPF

       ► RIP

       ► None of the given



Question No: 17      ( M a r k s: 1 
 

OSPF is based on--------


       ► Distance vector routing

       ► Link state routing

       ► Path vector routing

       ► Distance vector routing and Link state routing



Question No: 18      ( M a r k s: 1 ) 
 

_________ performs local multicast and uses IP-in-IP encapsulation to send multicast datagrams from one site on the Internet to another.

       ► Distance Vector Multicast Routing Protocol (DVMRP)

       ► Core Based Trees (CBT)


       ► Protocol Independent Multicast_ Sparse Mode (PIM-SM)

       ► Protocol Independent Multicast _ Dense Mode (PIM-DM)



Question No: 19      ( M a r k s: 1 )  

The length of time required to send a variable length packet is variable and does not require a complicated interrupt scheme to detect completion of transmission.

       ► True

       ► False


Question No: 20      ( M a r k s: 1 ) 
 

NEXT HEADER field in the base header defines type of header and it appears at end of fixed-size base header.

       ► True

       ► False


Question No: 21      ( M a r k s: 1 ) \
 

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

       ► True

       ► False


Question No: 22      ( M a r k s: 1 ) 
 

Address mask defines how many bits of address are in suffix?

       ► True

       ► False


Question No: 23      ( M a r k s: 1 )  

A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?


       ► True

       ► False


Question No: 24      ( M a r k s: 1 ) h\\\
 

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.


       ► False

       ► True

\
Question No: 25      ( M a r k s: 1 ) h\
 

The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.  

       ► itself

       ► prefix

       ► suffix

       ► mask


Question No: 26      ( M a r k s: 1 )\ 

In which method of Address Resolution Protocol the protocol address independent of hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

       ► T, C

       ► D

       ► C

       ► T, D


Question No: 27      ( M a r k s: 1 ) 

In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

       ► T

       ► D

       ► C

       ► T, C


Question No: 28      ( M a r k s: 1 ) h
 

Reconstruction of original datagram is called reassembly.

       ► True

       ► False


Question No: 29      ( M a r k s: 1 )
 

A computer needs a complete stack of protocols to run either a client or a server.

       ► True

       ► False


Question No: 30      ( M a r k s: 1 ) 
 

TCP uses _______ mechanism to control the flow of data.

       ► door

       ► window

       ► acknowledgment

       ► retransmission


Question No: 31      ( M a r k s: 2 )
 

To solve the problem the routers and networks in the Internet are divided into groups. How large do you think are these groups?



Question No: 32      ( M a r k s: 2 )
 

Traceroute continues to increment the Time To Live until the value is large enough for the datagram to reach its final destination. What happens when the TTL is sufficiently large for the datagram to reach its destination?




Question No: 33      ( M a r k s: 2 )
 

How can TCP monitor internet delays?


Question No: 34      ( M a r k s: 2 )
 

Which wireless standard is used in WIFI technology?



Question No: 35      ( M a r k s: 3 )
 

How does IP software reassemble fragments that arrive out of order?



Question No: 36      ( M a r k s: 3 )
 

What kind of information is in a routing table?



Question No: 37      ( M a r k s: 3 )
 

Define frames without type field?



Question No: 38      ( M a r k s: 3 )
 

What is the meaning of Facilities For Transit Routing as a characteristic of the Border Gateway Protocol?


Question No: 39      ( M a r k s: 5 )
 

What are the charachteristics of the Border Gateway Protocol?


Question No: 40      ( M a r k s: 5 )
 

Describe how NAT can be usefull for residence with cable modem or DSL?

No comments:

Post a Comment