0% found this document useful (0 votes)
136 views739 pages

CS610 Exam

Hardware that calculates a CRC uses two simple components: 1. A shift register is used to shift bits in and out for the calculation. 2. An XOR gate is used to perform the cyclic redundancy check calculation by combining the shift register values with polynomial values.

Uploaded by

sabiha kamran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views739 pages

CS610 Exam

Hardware that calculates a CRC uses two simple components: 1. A shift register is used to shift bits in and out for the calculation. 2. An XOR gate is used to perform the cyclic redundancy check calculation by combining the shift register values with polynomial values.

Uploaded by

sabiha kamran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 739

Hardware that calculates a CRC uses two simple components.

.  Shift register and XOR

CS610- Computer Network Solved MCQS From Midterm Papers

Question No: 1 ( M a r k s: 1 )
No error detection scheme is perfect because transmission errors can affect the additional
information as well as the data.

► True (Computer Networks and Internets, page82)


► False

Question No: 2 ( M a r k s: 1 )
—— Program sends a message to a remote computer and reports whether the computer
responds.

► Ping (Computer Networks and Internets, page9)


► Traceroute

► ICMP

► Non of the given

Question No: 3 ( M a r k s: 1 )
———- was especially concerned about the lack of high powered computers.

► ARPA (Computer Networks and Internets, page5) Advanced Research Project AGENCY (ARPA)


► IEEE (Institute of Electrical and Electronics Engineers)

► EIA (Energy Information Administration)

► Non of the given

Question No: 4 ( M a r k s: 1 )
The term ——– is used to denote the definition of a packet used with a specific type of
network.

► Packet

► Frame (Computer Networks and Internets, page 73)  


(A frame or hardware frame denotes a packet of a specific format on a specific hardware
technology.)

► Data
► None of the given

Question No: 5 ( M a r k s: 1 )
Computer networks are often called ————– because they use packet technology.

► Ethernet

► Switch networks

► Packet networks (Computer Networks and Internets, page 73) (A network packet is a formatted unit
of data carried by a packet-switched network.)
► None of the given

Question No: 6 ( M a r k s: 1 )
————– have advantages arisen from the size and ease of computation.

► CRC (Cyclic Redundancy Check)


► Parity (Page 19) (To detect the error there are different schemes in which parity checking is
also commonly used. In parity checking, parity refers to the number of bits set to 1 in the data)
Advertisements
REPORT THIS AD

► Checksums ► None of given

Question No: 7 ( M a r k s: 1 )


Most LANs (Local area network) that employ ring topology use an access mechanism known as
——-

► CSMA/CD

► CSMA/CA

► TOKEN PASSING (Computer Networks and Internets, page95)


► None of the given

Question No: 8 ( M a r k s: 1 )
IEEE (logical link control) LLC/SNAP (Sub Network Attachment Point) header is ——–, which
is used to specify the type of data.

► 8 octets (Computer Networks and Internets, page112)


► 8 bytes

► 8 bits
► None of the given

Question No: 9 ( M a r k s: 1 )
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2

► 10 Base 5

► 10 Base T (Page 43)


► None of the given

Question No: 10 ( M a r k s: 1 )
An interface for (TP) twisted pair Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.

► RJ-45, 10 Base T (Computer Networks and Internets, page 126)


► RJ-45, 10 Base 5
► BNC, 10 Base 2

► BNC, 10 Base T

Question No: 11 ( M a r k s: 1 )
A bridges function in the _________ layers(s).

► Physical (MAC) (Media access control)


► Data link

► Network

► Physical (MAC) and Data link

Question No: 12 ( M a r k s: 1 )
A Bridge can ________. (Definition: A bridge device filters data traffic at a network boundary.
Bridges reduce the amount of traffic on a local area network (LAN) by dividing it into two
segments.)
► Filter a frame

► Forward a frame

► Extend a LAN

► Do all the above (‫)سب سے بڑھ کر ہے‬


Question No: 13 ( M a r k s: 1 )
A Bridge forwards or filters a frame by comparing the information in its address table to the
frame’s_____
► Layer 2 source address

► Source node’s physical address

► Layer 2 destination address


► Layer 3 destination address

Question No: 14 ( M a r k s: 1 )
________ computes shortest paths in a graph by using weights on edges as a measure of
distance.

► Greedy algorithm

► Distance vector algorithm

► Dijksta’s algorithm (Computer Networks and Internets, page112)


► Non of the given

Question No: 15 ( M a r k s: 1 )
___________ is used for audio and video, since these have predefined maximum data rates

► Constant Bit Rate (CBR) service (Page 71)


► Variable Bit Rate (VBR) service

► Available Bit Rate (ABR) service

► None of the given

Question No: 16 ( M a r k s: 1 )
Unlike Frame Relay and ATM(Asynchronous Transferred Mode), SMDS (Switched multi-
megabit Data service) offers_______ .

► Connectionless service paradigm (Computer Networks and Internets, page112)


► Connection oriented service paradigm

► Both Connection-less and Connection-oriented service paradigm

► None of the given

Question No: 17 ( M a r k s: 1 )
A network with throughput T and delay (Page # 79) D has a total of ________ bit in transit at any
time.
►T/D

► T x D (Computer Networks and Internets, page203)


►T+D

► None of the given

Question No: 18 ( M a r k s: 1 )
ATM (Asynchronous Transferred Mode) is designed to work on___________.

► Twisted Pair

►Coaxial

► Radio Frequency

► Fiber (Computer Networks and Internets, page 72)


Question No: 19 ( M a r k s: 1 )
Computers attached to an Ethernet use —— in which a computer waits for the ether to be idle
before transmitting a frame.

► CSMA/CD (Computer Networks and Internets, page 93)


(Carrier Sense Multiple Access CSMA / CD Collision Detection)

(Carrier Sense Multiple Access With Collision Detection (CSMA/CD))

► CSMA/CA

► TOKEN PASSING

► None of the given

Question No: 20 ( M a r k s: 1 )
FDDI (Fiber distributed data interconnect) can transmits data at a rate of ———-

► 100 million( 1 million ‫ )دس لکھ‬bits per second (Page 314)


(100 million = 10^8 or 1000,00,000)

(one million = 10^6 or 10,00,000)

► 10 million bits per second


► 1000 million bits per second

► None of the given

Question No: 21 ( M a r k s: 1 )
In Point-to-Point topology there are two topologies.
► Star and Tree
► Tree and Ring

► Star and Ring

► Star and Tree (Page 5)


► None of the given

Question No: 22 ( M a r k s: 1 )
—— Program sends a message to a remote computer and reports whether the computer
responds.

► Ping (Computer Networks and Internets, page9)


► Traceroute

► ICMP

► Non of the given

Question No: 23 ( M a r k s: 1 )
—— has no way to determine the cause of the problem.

► ICMP (Internet Control Message Protocol)

► Ping (Computer Networks and Internets, page 11)


► Trace route

► Non of the given

Question No: 24 ( M a r k s: 1 )
The term—– ——- refers to the general concept of a small block of data.

► Packet (Page 16) (Data Is sent out in small chunks called “Packets”)


► Frame

► Data

► None of the given

Question No: 25 ( M a r k s: 1 )
———- scheme, which is designed to help detect transmissions errors, send one extra bit of
information with each character

► Parity (Computer Networks and Internets, page 77)


► Checksums
► CRC (Cyclic Redundancy Check)
►None of given

Question No: 26 ( M a r k s: 1 )
Local Talk is a LAN technology that employs ————-

► Bus topology (Page 30)


► Ring topology

► Star topology

► None of the given

Question No: 27 ( M a r k s: 1 )

Most LANs that employ ring topology use an access mechanism known as——-

► CSMA/CD

► CSMA/CA

► TOKEN PASSING (Computer Networks and Internets, page95) rep


► None of the given

Question No: 28 ( M a r k s: 1 )
Ethernet uses a —— bit static addressing scheme in which each device is assigned a unique
address by the manufacturer.

► 64

► 48 (Computer Networks and Internets, page 109)


► 32

►8

Question No: 29 ( M a r k s: 1 )
Formally named __________ informally known as the thick wire Ethernet or Thick net.

► 10 Base 2
► 10 Base 5 Computer Networks and Internets, page 120)
(10 BASE 5 (also known as thick ethernet or thicknet))

► 10 Base T

► None of the given

Question No: 30 ( M a r k s: 1 )
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

► 10 Base 2

► 10 Base 5

► 10 Base T (Page 43) rep


► None of the given

Question No: 31 ( M a r k s: 1 )
The maximum size of an Ethernet segment is___________

► 250 meters

► 500 meters (Page 27)


► 700 meters

► None of the given

Question No: 32 ( M a r k s: 1 )
A Bridge can ________

► Filter a frame

► Forward a frame

► Extend a LAN

► Do all the above rep


Question No: 33 ( M a r k s: 1 )
_______ computes shortest paths in a graph by using weights on edges as a measure of
distance.

► Greedy algorithm

► Distance vector algorithm


► Dijksta’s algorithm (Computer Networks and Internets, page112) rep
► Non of the given

Question No: 34 ( M a r k s: 1 )
__________is used for compressed audio and video where the data rate depends on the level
of compression that can be achieved.

► Constant Bit Rate (CBR) service

► Variable Bit Rate (VBR) service (Page 71)


► Available Bit Rate (ABR) service

► None of the given

Question No: 35 ( M a r k s: 1 )
Basic LAN technologies such as Ethernet, Token Ring, and FDDI (Fiber distributed data
interconnect) use a _____.

► Connectionless service paradigm (Computer Networks and Internets, page112)


► Connection-oriented service paradigm

► Both Connectionless and Connection-oriented service paradigm

► None of the given

Question No: 36 ( M a r k s: 1 )
The product of delay and throughput measures the _____ of data that can be present on the
network.
► Area

► Volume (Page 80)


► Length

► None of the given

DELAY:
It is an important quantitative property of networks. Delay is a measure how long
it takes for a bit of data to travel across the network from one compute to the other. It is measured in
seconds or fractions of seconds.
THROUGHPUT:
Throughput is a measure of the rate at which data can be sent through the
network. The throughput capability of the underlying hardware is called bandwidth. Because each frame
contains headers, the effective throughput is less than the hardware bandwidth. Networking professional
often use the term speed as a synonym for throughput.
Question No: 37 ( M a r k s: 1 )
A network with throughput T and delay D has a total of ________ bit in transit at any time.
►T/D

► T x D (Computer Networks and Internets, page203) rep


►T+D

► None of the given

Question No: 38 ( M a r k s: 1 )
One repeater _______, two repeaters ________ the maximum cable length limitation.

► doubles, triple (Page 49)


► square roots, cude roots

► and, triple

► doubles, cancel

Question No: 39 ( M a r k s: 1 )
A network uses a —— if all computers attach to a central point

► Star Topology (Page 25)

► Ring Topology

► Bus Topology

►None of the given

Question No: 40 ( M a r k s: 1 )
Computers attached to an Ethernet use —— in which a computer waits for the other to be idle
before transmitting a frame.

► CSMA/CD (Computer Networks and Internets, page 93) rep


(Carrier Sense Multiple Access CSMA / CD Collision Detection)

(Carrier Sense Multiple Access With Collision Detection (CSMA/CD))

► CSMA/CA
► TOKEN PASSING

► None of the given

Question No: 41 ( Marks: 1 ) –


Please choose one A typical port on an (Asynchronous Transferred Mode) ATM switch
operates at __________ or higher.

► OC-2 speed (155Mbps)

► OC-3 speed (100Mbps)

► OC-3 speed (155Mbps) (Page 72)


► OC-3 speed (155Gbps)

Question No: 42 ( Marks: 1 ) –


Please choose one The product of delay and throughput measures the _____ of data that can
be present on the network.

► Area

► Volume (Page 80) rep
► Length

► None of the given

Question No: 43 ( Marks: 1 )


Please choose one __________is used for compressed audio and video where the data rate
depends on the level of compression that can be achieved.

►Constant Bit Rate (CBR) service

►Variable Bit Rate (VBR) service (Page 71) rep


►Available Bit Rate (ABR) service

►None of the given

Question No: 44 ( Marks: 1 )


Please choose one Which of the following is a connecting device?

►Bridge

►Repeater

►Hub
►All the given

Question No: 45 ( Marks: 1 )


Please choose one A bridges function in the _________ layers(s).

►Physical (MAC)  (Media access control) rep 


►Data link

►Network

►Physical (MAC) and Data link

Question No: 46 ( Marks: 1 )


Please choose one IEEE LLC/SNAP header is ——–, which is used to specify the type of data.

(Institute of Electrical and Electronics Engineers (IEEE))


(logical link control) LLC/SNAP (Sub Network Attachment Point)
►8 octets (Computer Networks and Internets, page112) rep
►8 bytes

►8 bits

►None of the given

Question No: 47 ( Marks: 1 )


Please choose one The third field of the header consists of —— bit Ethernet frame type.

►48

►32

►16 (Computer Networks and Internets, page110)


►8

Question No: 48 ( Marks: 1 )


Please choose one An ————method, the network hardware designers specify how type
information is included in the frame and the value use to identify various frame types.

►Explicit frame type (Page 35)


►Ideal frame type

►Implicit frame type

►None of the given


Question No: 49 ( Marks: 1 )
Please choose one Local Talk is a LAN technology that employs ————-

►Star topology

►Bus topology (Page 30) rep

►Ring topology

►None of the given

Question No: 50 ( Marks: 1 )


Please choose one The Fast Ethernet hardware operates at a rate of ——–

►10 Mbps

►100 Mbps (Page 27)


►1000 Mbps

►None of the given

Question No: 51 ( Marks: 1 )


Please choose one ———- scheme, which is designed to help detect transmissions errors,
send one extra bit of information with each character

►Parity (Computer Networks and Internets, page 77) rep


►Checksums

►CRC
►None of given

Question No: 52 ( Marks: 1 )


Please choose one Computer networks are often called ————– because they use packet
technology.

►Ethernet

►Switch networks

►Packet networks (Computer Networks and Internets, page 73) rep


►None of the given

Question No: 53 ( Marks: 1 )


Please choose one —— Program sends a message to a remote computer and reports whether
the computer responds.

►Ping (Computer Networks and Internets, page 9) rep


►Traceroute

►ICMP

►Non of the given

Question No: 54 ( Marks: 1 )


Please choose one In ———, network occupies larger areas like cities & countries.

►LAN

►WAN (Page 4)
►MAN

►None of the given

Question No: 55 ( Marks: 1 )


Please choose one In ————-, network occupies the smaller area like a room a floor or a
building

►LAN (Page 4)
►WAN

►MAN

►None of the given


Question No: 56 ( Marks: 1 )
Please choose one In Point-to-Point topology there are two topologies.

►Tree and Ring

►Star and Ring

►Star and Tree (Page 5)


►None of the given

Question No: 57 ( Marks: 1 )


Please choose one ________ has a jitter zero

► None of the given

► Virtual Private Network

► Isochronous Network

► Asynchronous Network (Page 66)


Question No: 58 ( Marks: 1 )
Please choose one Unlike Frame Relay and ATM (Asynchronous Transferred Mode), SMDS
(Switched multi-megabit Data service) offers_______ .

 ►Connectionless service paradigm (Computer Networks and Internets, page112)


►Connection oriented service paradigm

►Both Connectionless and Connection-oriented service paradigm

►None of the given

Question No: 59 ( Marks: 1 )


Please choose one ATM (Asynchronous Transferred Mode) assigns each VC (virtual channels
(VC) or virtual circuits) a _____________ identifier that is divided two parts to produce a
hierarchy.

 ►21-bit

►22-bit

►23-bit

►24-bit (Page 67)
Question No: 60 ( Marks: 1 )
Please choose one Most WAN (Wide area network) systems include a mechanism that can be
used to eliminate the common case of duplication routing is called___________
 ►Hierarchal address

►Default route (Computer Networks and Internets, page172)


►Shortest path

►None of the given

Question No: 61 ( Marks: 1 )


Please choose one The next hop to which a packet is sent depends only on

 ►Packet’s destination (Computer Networks and Internets, page169)


►Packet’s original source

►Path the packet has taken

►Non of the given

Question No: 62 ( Marks: 1 )


Please choose one An interface for twisted pair (TP) Ethernet must have an ____________
connector , and must generate signals according to the_____________ specification.

 ►RJ-45, 10 Base T (Computer Networks and Internets, page 126) rep


►RJ-45, 10 Base 5

►BNC, 10 Base 2

►BNC, 10 Base T

Question No: 63 ( Marks: 1 )


Please choose one When an application————— data, it makes a copy of the data available
to all other computers on the network.

►Broadcasting
►Multicasting

►Unicasting

►None of the given

Question No: 64 ( Marks: 1 )


Please choose one A ———- provide a mechanism that a customer can use to set a physical
address.
 ►Static addressing scheme

►Configurable addressing scheme (Page 34)


►Dynamic addressing scheme

►None of the given

Question No: 65 ( Marks: 1 )


Please choose one FDDI (Fiber distributed data interconnect) can transmits data at a rate of
—-

► 100 million( 1 million ‫ )دس لکھ‬bits per second (Page 314) rep


(100 million = 10^8 or 1000,00,000)

(one million = 10^6 or 10,00,000)

►100 million bits per second

►100 million bits per second

►None of the given

Question No: 66 ( Marks: 1 )


Please choose one Computers attached to an ether use —— in which a computer waits for
the ether to be idle before transmitting a frame.

 ►CSMA/CD (Computer Networks and Internets, page 93) rep


(Carrier Sense Multiple Access CSMA / CD Collision Detection)

(Carrier Sense Multiple Access With Collision Detection (CSMA/CD))

►CSMA/CA

►TOKEN PASSING

►None of the given

Question No: 67 ( Marks: 1 )


Please choose one ————– have advantages arisen from the size and ease of computation.

 ►CRC (Cyclic Redundancy Check)


►Parity (Page 19) rep
►Checksums
►None of given

Question No: 68 ( Marks: 1 )


Please choose one The term ——– is used to denote the definition of a packet used with a
specific type of network.

 ►Packet

►Frame (Computer Networks and Internets, page 73)


►Data

►None of the given

Question No: 69 ( Marks: 1 )


Please choose one —— has no way to determine the cause of the problem.

► Ping (Computer Networks and Internets, page 11) rep


►Trace route

►ICMP

►Non of the given

Question No: 70 ( Marks: 1 )


Please choose one —— Program sends a message to a remote computer and reports
whether the computer responds.

 ►Ping (Computer Networks and Internets, page9) rep


►Traceroute

►ICMP

►Non of the given

Question No: 71 ( Marks: 1 )


Please choose one In ————-, network occupies the smaller area like a room a floor or a
building

 ►LAN (Local Area Networks) (Page 4) rep


►WAN (Wide Area Networks)

►MAN (Metropolitan Area Networks)


►None of the given
Question No: 72 ( Marks: 1 )
Please choose one No error detection scheme is perfect because transmission errors can
affect the additional information as well as the data.

► True (Computer Networks and Internets, page82)


► False

Question No: 73 ( Start time: 10:29:56 PM ) Total Marks: 1


A network that uses __________ usually consists of a single long cable to which computer
attach. Select correct option:

►Star Topology

►Ring Topology Bus Topology (Page 26)


►Bus and

►Ring Topology

Question No: 74 ( Start time: 10:30:16 PM ) Total Marks: 1


Ethernet uses a —— bit static addressing scheme in which each device is assigned a unique
address by the manufacturer. Select correct option:

►64

►48 rep
►32

►8

Question No: 75 ( Start time: 10:30:36 PM ) Total Marks: 1


No error detection scheme is perfect because transmission errors can affect _________.
Select correct option:

►Data

►Additional Information
►Additional information & data         (Computer Networks and Internets, page82)
►Transmission medium

Question No: 76 ( Start time: 10:30:58 PM ) Total Marks: 1


►Star topolgy is the kind of Select correct option:

►Tree topology

►Point-to-point topology (Page 5)
►Broadcast topolgy

►Ring topology

Question No: 77 ( Start time: 10:31:12 PM ) Total Marks: 1


The Gigabit Ethernet hardware operates at a rate of ——– Select correct option:

►10 Mbps

►100 Mbps

►1000 Mbps
►1000 Gbps

Question No: 78 ( Start time: 10:31:34 PM ) Total Marks: 1


Fixed network is a type of networks which is classified with respect to the………..factor Select
correct option:

►Size

►Connectivity

►Medium

►Mobility (Page 6)
Question No: 79 ( Start time: 10:31:44 PM ) Total Marks: 1
A network uses _______ to arrange computers to be connected in a single closed loop. Select
correct option:

►Star Topology
►Dual Ring Topology

►Ring Topology (Page 25)


►Bus Topology

Question No: 80 ( Start time: 10:32:02 PM ) Total Marks: 1


Hardware that calculates a CRC (Cyclic Redundancy Check) uses two simple components.
Select correct option:
►AND unit and XOR unit

►Shift register and XOR unit (Page 20)


►Shift register & AND unit

►Shift register and shift XOR unit

Question No: 81 ( Start time: 10:32:53 PM ) Total Marks: 1


When an application ———— data, it makes a copy of the data available to all other
computers on the network. Select correct option:

►Broadcasting rep
►Multicasting

►Unicasting

►None of the given

Question No: 82 ( Start time: 09:55:01 PM ) Total Marks: 1


Fixed network is a type of networks which is classified with respect to the………..factor Select
correct option:

►Size

►Connectivity

►Medium

►Mobility rep
Question No: 83 ( Start time: 09:55:38 PM ) Total Marks: 1
——– is also called self healing network Select correct option:

►ATM (Asynchronous Transferred Mode)


►FDDI (Fiber distributed data interconnect) 
►Token Ring

►None of the given

Question No: 84 ( Start time: 09:56:01 PM ) Total Marks: 1


Local Talk is a LAN technology that employs ————- Select correct option:

►Star topology

►Bus topology rep

►Ring topology

►Ethernet

Question No: 85 ( Start time: 09:56:26 PM ) Total Marks: 1


Some applications have large data transfer. In this way they hold the network for
long time.this problem can be eliminated by Select correct option:
►Divide the application into small block or chunks called ‘Packets’.

►Divide the application into small block or chunks called ‘Segments’.

►Divide the data into small block or chunks called ‘Segments’.

►Divide the data into small block or chunks called ‘Packets’. (Page 14)
Question No: 86 ( Start time: 09:56:54 PM ) Total Marks: 1
For how much time would other computers be in wait while one computer was transferring
56MB file with packet size of 1000 bytes and transmission speed of 56Kbps Select correct
option:

►0.143 sec (Page 15)

►0.243 0.343
►0.343 0.343

►0.443 0.343

Question No:  87 ( Start time: 09:57:20 PM ) Total Marks: 1


The Gigabit Ethernet hardware operates at a rate of ——– Select correct option:

►10 Mbps

►100 Mbps

►1000 Mbps rep


►1000 Gbps

Question No: 88 ( Start time: 09:57:37 PM ) Total Marks: 1


The Fast Ethernet hardware operates at a rate of ——– Select correct option:

►1000 bps

►100 Mbps
►10 Mbps

►1000 Mbps

Question No: 89 ( Start time: 09:57:52 PM ) Total Marks: 1


——– which is designed to help detect transmissions errors, send one extra bit of information
with each character. Select correct option:

►Checksum

►CRC (Cyclic Redundancy Check)


►Parity rep
►VRC (Vertical Redundancy Check)

Question No: 90 ( Start time: 09:58:30 PM ) Total Marks: 1


LAN that use ATM technology have a ———— Select correct option:

►Bus topology
►Star topology (Page 31)

►Ring topology

►Mesh Topology

Question No: 91 ( Start time: 09:58:58 PM ) Total Marks: 1


FDDI (Fiber distributed data interconnect) can transmits data at a rate of ———- Select correct
option:

►3 million bits per second

►1000 million bits per second

►10 million bits per second

►► 100 million( 1 million ‫ )دس لکھ‬bits per second (Page 314) rep


(100 million = 10^8 or 1000,00,000)

(one million = 10^6 or 10,00,000)

Question No: 92 ( Start time: 11:14:05 PM ) Total Marks: 1


———- is also called self healing network Select correct option:

►ATM (Asynchronous Transferred Mode)

►FDDI (Fiber distributed data interconnect) rep


►Token Ring

►None of the given

Question No: 93 ( Start time: 11:15:34 PM ) Total Marks: 1


Most LANs that employ ring topology use an access mechanism known as——- Select correct

option:

►CSMA/CD

►CSMA/CA

►CSMA

►TOKEN PASSING rep


Question No: 94 ( Start time: 11:16:55 PM ) Total Marks: 1
An ————method, the network hardware designers specify how type information is included
in the frame and the value use to identify various frame types. Select correct option:

►Explicit frame type rep


►Ideal frame type

►Implicit frame type

►None of the given

Question No: 95 ( Start time: 11:17:47 PM ) Total Marks: 1


Hardware that calculates a CRC uses two simple components. Select correct option:

►AND unit and XOR unit

►Shift register and XOR unit rep


►Shift register & AND unit

►Shift register and shift XOR unit

Question No: 96 ( Start time: 11:18:59 PM ) Total Marks: 1


The Ethernet standard specifies that frames are sent using the ——– Select correct option:

►Differential Manchester

►Not Return to Zero (NRZ)

►Manchester Encoding (Page 27)


►Return to Zero (RZ)
Question No: 97 ( Start time: 11:20:08 PM ) Total Marks: 1
When an application ———— data, it makes a copy of the data available to all other
computers on the network. Select correct option:

►Broadcasting rep
►Multicasting

►Unicasting

►None of the given

Question No: 98 ( Start time: 11:21:26 PM ) Total Marks: 1


LAN interface may use ———- to copy frame data directly from main memory. Select correct
option:

►DMA (Direct Memory Access) (Page 32)


►FDDI (Fiber distributed data interconnect)

►CSMA/CD

(Carrier Sense Multiple Access CSMA / CD Collision Detection)

(Carrier Sense Multiple Access With Collision Detection (CSMA/CD))

►None of the given

Question No: 99 ( Start time: 11:22:19 PM ) Total Marks: 1


LAN and WAN are classified according to their……… Select correct option:

►Size (Page 4)
►Connectivity

►Medium

►Mobility

Question No: 100 ( Start time: 11:23:43 PM ) Total Marks: 1


For how much time would other computers be in wait while one computer was transferring
56MB file with transmission speed of 56Kbps Select correct option:
►10 Sec (Change Values)

►11 Sec

►12 Sec

►13 Sec

Question No: 101 ( Start time: 11:25:05 PM ) Total Marks: 1


A network uses _______ to arrange computers to be connected in a single closed loop.

Select correct option:

►Star Topology

►Dual Ring Topology

►Ring Topology rep


►Bus Topology

Question No: 102 ( Start time: 10:52:55 PM ) Total Marks: 1


________network topology is a bus but wiring topology is a star Select correct option:

►10 Base-T (Page 44)


►Ring 10

►Base-W

►Star
Question No: 103 ( Start time: 10:53:05 PM ) Total Marks: 1
ATM is also called—————- Select correct option:

►Label rewriting Label switching system

►Label rewriting and label switching system (Page 68)


►All of above

Question No: 104 ( Start time: 10:53:26 PM ) Total Marks: 1


The most important task a bridge performs is _______ Select correct option:

►Packet switching

►Line controlling

►Noise controlling

►Frame filtering (Page 50)


Question No: 105 ( Start time: 10:53:41 PM ) Total Marks: 1
ABR stands for……………. Select correct option:

►Asynchronous Bit Rate

►Asynchronous Byte Recovery

►Asynchronous Bit Redundancy

►Available Bit Rate (Page 71)


Question No: 106 ( Start time: 10:53:57 PM ) Total Marks: 1
What will be the bandwidth(CS601 P# 66) rate for short distance 10-Base-T? Select correct
option:

►16 MHz

►20 MHz (Computer Networks and Internets, page 128)


►100 MHz

►150 MHz

Question No: 107 ( Start time: 10:54:14 PM ) Total Marks: 1


The maximum cable length of a LAN is _____ Select correct option:

►Fixed (Page 48)
►Unlimited
►Fixed and Unlimited in different conditions

►None of these

Question No: 108 ( Start time: 10:54:32 PM ) Total Marks: 1


SMDS (Switched multi-megabit Data service) is………… Select correct option:

►Connectionless service (Page 65)


►Connection oriented service

►Used for delivering blocks of data

►None of the above

Question No: 109 ( Start time: 10:54:46 PM ) Total Marks: 1


All destinations on same switch have same Select correct option:

►Router

►Information

►Next hop (Page 58)


►None of the above

Question No: 110 ( Start time: 10:55:04 PM ) Total Marks: 1


If a link or a packet switch fails then which one of the following would possibly be happened?
Select correct option:

►Link would be reestablished

►Request to change failed hardware would appear

►The packet switch will modify the tables (Page 63)


►None of the above

Question No: 111 ( Start time: 10:55:34 PM ) Total Marks: 1


…….. is effectively a very short Ethernet with very long AUI (Attachment Unit Interface) cables. It
can be connected into larger Ethernet Select correct option:

►RJ-45 HUBS (Page 43)


►10Base-T
►None of thease

HomeGrand Quiz

CS610 Grand Quiz Spring2021


byAdmin—7:57 AM1


BTemplates.com

Dear Students in this post we are providing you CS610 Solved Grand Quiz Spring 2021. We have
provided all Past CS610 Grand Quiz with 100% correct Solution. You can also visit our
website vuctn.com for the solution of CS610 Mid Term past paper and Final Term Past paper.

In Cyclic Redundancy Checking, CRC is __________.


 Divisor
 Quotient
 Remainder  page 20
 Dividend

The satellite or radio topology in which all computers are connected to each other via satellite or
radio wave is a kind of
 Broadcast network   page 5
 Point-to-Point network

Which of the following two operations are performed by Ethernet CD?


I. It monitors outgoing signals.
II. Grabbled signal is interpreted as a collision.
III. Signals are sent back to the sender.
 I and III
 II and IV
 II and III
 I and II       page 28
The process of forwarding a packet is called ____________.
 Routing      page 58
 Processing
 Hierarchical Addressing
 Source Addressing

Which statement is correct about Network Interface Card (NIC)?


I. NIC contains sufficient hardware to process data independent of system CPU
II. NIC looks like any other I/O device to system CPU
III. NIC also receives interrupt on incoming data.
 I and II
 II and III
 I and III
 All of the given options     page 40
While transmitting data from source A to destination B, 4 bits are changed during the
transmission then the error is a _________.
 Burst error page 22
 Single error
 Double error
 Logic error

The switch that has no attached computers is called __________.


 Packet Switch
 Exterior Switch
 Interior Switch      page 59
 External Switch
________ is the most popular wiring scheme because of lowest cost.
 5 Base T
 10 Base T           page 43
 100 base T
 1000 base T

In _________ technique, all members of the network can send data only on the specific time slot?
 CDMA
 FDMA
 CSMA       page 43
 TDMA
 If a sender with a 100 Megabit NIC and receiver with 10 Megabit NIC wants to communicate
with each other at which speed they can communicate?
 110 Megabit
 1000 Megabit
 10 Megabit
 100 Megabit                  page 40
 Missing ______ in a frame format indicates receiving computer missed
beginning of the message.
 eot
 sot
 eoh
 soh                   page 16
The _______ of errors is easier than the ________ of errors.
 correction; detection
 correction; creation
 detection; manipulation
 detection; correction       cs601 handouts
The _______ of errors is difficult than the ________ of errors.
 detection; correction
 correction; creation
 detection; manipulation
 correction; detection                  google
Source Independence phenomenon allows fast and efficient ____________.
 Source Addressing
 Routing
 Packet Switching                  page 58
  Store and forward

In distributed route computation process each packet switch computes its routing table locally and
sends messages to the __________.
 Router
 Graph
 Neighbors       page 63
 WAN
The ___ layer of the OSI model takes the data from the physical layer and perform error checking.

 Transport
 Data link              google
 Application
 Presentation

CBR stands for _________.

 Constant Byte Rate


 Constant Bit Rate
 Connection break Recovery
 Constant Borrow Rate
A network that uses _______ usually consist of a single long cable to which computer attach.

 Star Topology
 Ring Topology
 Bus Topology             page 26
 Bus and Ring Topology

If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called
_______.

 packet loss
 collision       page 28
 delayed transmission
 coordination
In __________ all computers are attached to a central hub

 Ring topology
 Star topology            page 31
 Hub topology
 Bus topology

For adding a new computer in a point to point network ______new connection will be required

 N
 N-1         page 23
 N-2
 2N

The fastest Ethernet hardware operates at a rate of _____

 1000 bps
 100 Mbps    page 27
 10 Mbps
 1000 Mbps
Which of the following the benefit to point to point communication?

 Quick to configure.
 Security implementation             page 23
 Cost
 Less availability

ATM offers _____speed and ________delay

 High, High
 High, low             page 72
 Low, low
 Low, high
Thick Ethernet is known as ___________

 10 Base 2  
 10 Base 5   google
 10 Base T
 10 Base 10

Both interior and exterior switches _______packet and they also need routing tables.

 Create
 Delay
 Forward               page 59
 Start
______is the rate at which data can be sent through the network

 Throughput page 79
 Propagation delay
 Access delay
 Switching delay

In a ping command, small –sized information packets of _____are sent.

 TCP
 UDP
 ICMP     page 11
 IGMP
Many WANs use ______addressing of efficiency

 Sequence
 Forward
 Hierarchical       page 56
 Sequential

Which of the following is not a function of ping commends?

 Local computer network issue


 Congestion in the network
 Relay nodes      page 11
 Remote host availability
Packet switched can be linked together to form a ________

 LAN
 WAN     page 56
 Bridge
 None of the given option

Fixed network is a type of network which is classified with repect to the factor

 Size
 Connectivity
 Medium
 Mobility              page 6
Parity bit can detect _________________error(s)

 4
 3
 2              page 19 (even or odd)
 1             
When we will try to connect to the internet which of the following protocol will be used?

 Telnet
 TCP/IP page 84
 ICMP
 IPx

How many computers are mandatory to form a network?

2      google
4

________ is standard wireless LAN that uses radio signals at 2.4GHz.

 IEEE 803.16
 IEEE 802.15
 IEEE 802.3
 IEEE 802.11 page 29
LAN interface hardware obeys ______ access rule.

 CSMA/CD    page 34
 Round robin
 First come first served
 High priority
The most important task a bridge performs is _________.

 Packet switching
 Line controlling
 Noise controlling
 Frame filtering         page 50
ATM uses small, fixed-sized packets called cells and each cell has _____ octets.

 47
 52
 53   page 66
 55  

___________ can’t be guaranteed with variable length packets as easily as it can with fixed length cells.

 Errors
 Noise
 Quality of Service
 None of the given page 72
Which multiplexing technique transmits digital signals?

 WDM
 FDM
 TDM              page 15
 GSM
Connections in Asynchronous transfer mode are called ________.

 Virtual channels       page 67


 Virtual Path Identifier
 Cells
 Cell tax

A _______ is a device that combines multiple signals and forwards into a single line.

Modem
Multiplexer page 41
Repeater

Layer 3 Switch

___________ is inflexible.

 Routing
 Searching
 Processing
 Static routing             page 62
If a hub is used to connect many computers in a LAN, then only _______ computers can communicate at
a given time.

 Three
 Two       page 54
 Four
 One

_________ is the term used for variance in transmission delays.

Friction

Segment

Checksum

Jitter             page 66
 ________ is also called self healing network.

ATM

FDDI

Token Ring

Frame relay page 46


_______ and _______ are the two frame types.

 Internal and external


 Single and dual
 Implicit and explicit
 Multicast and broadcast       page 35
Bluetooth uses shared medium and _______ instead of coaxial cable.

 Radio waves              page 29


 Infrared waves
 Micro waves
 Low frequency waves

Which of the following is not a guided medium?

 Twisted pair cable


 Fiber-optic cable
 Atmosphere              google
 Coaxial cable
As a result of ARPA research, the first network was established which was named as ________.

 INTERNETWORKING
 ARPNET
 ARPANET     page 9
 PACKET NETWORK

Asynchronous transfer mode (ATM) can dynamically establish a __________.

 Switched virtual circuit         page 70


 Virtual connection identifier
 Virtual path indicator
 None of the given options
A typical port on an ATM switch operates at ________ or _______ higher.

OC-2 speed (155Gbps)


OC-2 speed (1000Mbps)
OC-3 speed (155Mbps)          page 72
OC-3 speed (100Gbps)
10Base-T Ethernet is often called a __________.

 ring shaped star


 ring shaped bus
 star shaped bus        page 46
 star shaped ring

___________ allows automatic updates.

 Dynamic routing      page 62


 Static routing
 Routing
 Default routing
Handling variable length packets leads to memory __________.

 Fragmentation          page 72
 Management
 Location
 Allocation

In order to forward a copy of frame, the bridge uses ________ address.

 Network
 Destination page 51
 IP
 Source
We may use _______ to extend local area network.

 Bridge, Router
 Bridge, Hub, Router
 Bridge, Hub, Repeater           page 149
 Bridge, Hub, Repeater, Router

All of the given options are the types of delay except __________.
 Propagation
 Access
 Throughput page 79
 Queuing
While computing shortest path in a graph, next hop information is inserted into _________.

 Routing table            page 62


 Trailer
 Header
 Register
LAN interface uses _________ to copy frame data directly from main memory

 DMA              page 34
 FDDI
 Hard disk
 Flash
The Gigabit Ethernet hardware operates at a rate of ___________.

 10 Mbps
 100 Mbps
 1000               Mbps    reference book page 263
 1000               Gbps    

In the early resource sharing era, which resources were shared among users?

 Computation             page 9
 Floppy Drives
 Hard Disk
 Printers
If two buildings are located far from each other then bridge, and ________ can be used to connect two
LAN.

 Optical fiber              page 51


 Ethernet modem
 Switch
 NIC

Which type of network consists of wireless connection of laptops in a university classroom?

 WAN
 MAN
 Fog
 LAN                google
A typical bridge has _______________.

 One NIC, a CPU a memory and a ROM.


 Two NICs, a CPU a memory and a ROM.        page 50
 RAM, ROM and CPU.
 A cache memory, ROM and CPU.
__________ is used for compressed audio and video, where the data rate depends on the level of
compression that can be achieved.

 Constant Bit Rate


 Stable Bit Rate
 Variable Bit Rate      page 71
 Available Bit Rate    

There are ________ types of data stuffing.  

 1
 2      page 17
 0
 5                     
Dijkstra’s algorithm can accommodate weights on _______ in graph.

 Nodes    page62
 Edges
 Path
 Connections

________ masks your IP address.


 Firewall
 Antivirus
 VPN
 Incognito mode
Static routing computes routing table information at __________ time.

 Load
 Boot              page 62
 Execute
 One
 ___________ was the first automated tool required to see whether the given computer is online or not.

 Probing program
 PING program
 status program
 None of the above page 11
In which type of error detection, the arithmetic sum is calculated before and after the transmission of
data at both communication ends?

 CRC
 Party
 Checksum   page 19
 Hash Function
Computer sends a connection request to the ________ to which it is attached while establishing a
switched virtual circuit

 Bridge
 Switch           page 70
 VPI
 Virtual circuit

The bridges communicate with each other on the network and use ________ algorithm to decide which
bridge will not forward frames if a cycle occurs.

 Djikstra
 Shortest path first
 Vector distance
 Distributed Spanning Tree   page 53
Ethernet uses a ______ bit static addressing scheme in which each device is assigned a unique address
by the manufacturer.

 64
 48
 32
 16

Weights on graph edges reflect cost of ____________.

 Nodes
 Traversing edge               page 63
 Trending edge
 Path
A ________ relies on the hardware manufacturer to assign a unique physical address to each network
interface.

 Static addressing scheme     page 34


 Configurable addressing scheme
 Dynamic addressing scheme
 None of the given

In _______ topology, if the switch goes down all the computers will be disconnected.

 Star
 Ring
 Bus
 Mesh
Which type of network consists of wired computers in a university classroom?

 MAN
 PAN
 WAN
 LAN
81. If you as a network administrator want to know the traffic flow of your data while communicating
with a remote computer which of the following will be used to know about intermediate routers?

 Ipconfig
 Ping               page 11
 Traceroute
 Arp

Hardware address is also called _____________.

 Physical address
 Logical address
 IP address
 Port address
Thick Ethernet also requires _________ to avoid signal reflectance.

 Transceivers
 AUI cable
 Drop cable
 Terminators               page 41
Which of the following network is using the TCP/IP model globally?

 PAN
 SAN
 LAN
 The Internet
VPNs connections are sometimes called ________.

 Tunnels        page 75
 Open networking
 Routing
 Public network

To reduce _______ computers can be connected and distributed to a number of hubs, then the hubs can
be connected to a switch.
 Costs             page 54
 Quality
 Efficiency
 Noise
If a __________ is used the communication between two computers will not affect the other pair of
computers and they can communicate at the same time

 Hub
 Switch          page 54
 Repeater
 Amplifier

The length of hardware address is ______________.

 One to ten bytes


 One to five bytes
 One to six bytes       page 34
 One to seven bytes
A network analyzer is also called _________.

 Network manager
 Network administrator
 Network monitor page 37
 Network 

90. No any error detection scheme is perfect because transmission errors can affect _________.

 Data
o Additional Information
o Additional information & data   google
o Transmission medium

The token ring network topology is a ring but wiring topology is a _________.

 Star        page 44
 bus
 tree
 mesh

_______ addresses are used in an ethernet frame.

 IP page 99
 Port
 Logical
 МАС
AUI cable connects from NIC to ___________.

 BNC Connector
o RJ-45 Connector              
o Transceiver        page 41
o Terminator        

Public networks are _______________.

 More secure than LAN  


 Flexible page 74
 Limited in boundary      
 Intranet              
The maximum cable length of a LAN is fixed because _________________.

 Additional hardware are not suitable for the LAN extension.


 The electrical signal level gets weaker as it travels. Page 48
 Additional software are not suitable for the LAN extension
 The electrical signal level gets stronger as it travels.

In _______.network topology is separated from route computation.

 Local area
 Link-state routing            page 64
 Static routing
 Dynamic routing
Which layer of the OSI Model directly communicates and controls the transmission medium:

 Transmission
 Physical
 Application
 Network

In ________ technique data is treated as a sequence of integers and their arithmetic sum is computed and
the carry bits are added to the final sum.

 CRC
 Bit stuffing
 Checksum   page 19
 2D Parity
A network with _______ jitter takes more time to deliver some packets than others.

 Zero
 High              page 80
 Low
 Moderate

A network uses _______ to arrange computers in a single closed loop.

 Star Topology
 Mesh Topology
 Ring Topology           page 25
 Bus Topology
Which of the following tasks is not done by the second layer of the OSI model?

Flow control

Framing

Channel coding         google

Error control

ATM is a single technology designed to meet the goals of both ________and __________.

LAN & PAN


LAN & WAN               page 66
LAN & MAN

MAN & WAN

LAN and WAN are classified according to their _______.

 Size                page 4


 Connectivity
 Medium
 Mobility

The identifier that is used for data transfer in the virtual circuit network is called _________.

 Virtual circuit identifier


 Global address
 Network identifier
 IP identifier
In Direct point to point communication adding the Nth computer requires______ new connections

 N^2
 N-1
 (N^2 -N)/2  page 23
 N (N-1)

Which of the following is the correct function of bridge?

 MTU path discovery


 Byte stuffing
 Routing information
 Filtering and forwarding a frame      page 50, 51
Point to point topology is

 Size based
 Mobility based
 Connectivity based page 5
 Medium based

IEEE LLC / SNAP header is ________which is used to specify the type of date.

 8 octets        google
 16 octets
 32 octets
 64octets
IEEE LLC / SNAP header is ________which is used to specify the type of date.

 CRC
 Bit stuffing
 Checksum
 2D Parity

What is the largest network in existence?

 The internet              google


 A PAN
 A Fog
 Edge Network
The frame format of any LAN technology must consists of ____ and___-

Payload and CRC

Frame header and CRC

Payload and Frame type

Frame header and payload page 36


___________ can occur a LANs when a packet is delayed because the network is busy

 Jitter              page 66
 Loop
 Deadlock
 variance
Which of the following cannot be used to extend a LAN?

 Repeaters
 Switches
 Routers
 Fiber modems
Links-state algorithm is used in ___________

 RIP
 IGRP
 RIPv2
 OSPF             page 64
According to size, there are ___classifications of networks

 2      page 2
 3
 4
 5

In which topology terminators are used at the end of the cable?

 Star
 Bus
 Ring
 Mesh
Switch simulates a _________LAN connecting segments

 Single
 Single shared
 Bridged        page 54
 Complex

PVS stands for _____________

a. Permanent virtual circuit page 69


b.    Private virtual circuit
c.     Public virtual circuit

d.    Plastic virtual circuit

Hardware that calculates a CRC used two simple components _____

 AND unit and XOR Unit


 Shift register and XOR unit  page 20
 Shift register & AND unit
 Shift register and Shift XCR unit

Thin ethernet is known as ________

a. 10 base 2                google


b.    10 base 5

c.     10 base T

d.    All of the above

If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants to communicate with each
other than at which speed they can communicate

 11 Megabit
 100 Megabit
 1 Gigabit
 Gigabit
____________ is used as an alternative of packet for a specific computer network technology

 Datum
 Token
 Ether
 Frame           page 14
The sharing of a medium and its link by two or more devices is called ____

 Modulation
 Encoding
 Multiplexing
 Line discipline

The topology each computer is connected to a central hub is called

 Ring topology
 Star topology            page 5
 Tree topology
 Mesh topology
Asynchronous transfer mode (ATM) is designed to work on fiber but can be used with _____________

 Wireless
 Twisted pair               page 72
 Wifi
 Bluetooth

The basic responsibility of NIC is ________

 To access medium network


 To resource allocation
 To access memory
 All of the given option
Frame relay is ____

a. Connection oriented service         page 64


b.    Connectionless service

c.     Typically ranges for 5 Mbps to 1000Mbps

d.    Call based

The length of time required to send a variable length packet is ____

 5 second
  Variable              page 72
 Constant
 Fix
ABR stands for ______

 Asynchronous bit rate


 Asynchronous byte recovery
 Asynchronous bit redundancy
 Available bit rate     page 71
In Token Ring, if all computers are ready to transmit it enforces ________Access

 First come first served


 Round Robin              page 30
 Shorter delay
 Last come first served

The Ethernet standard specifies that frames are sent using the _________ scheme.

Differential Manchester

Not Return to Zero (NR2)

Manchester Encoding            page 27


Return to Zero (RZ)

ATM uses the concept of ___________.

a. Connection-oriented        page 66
b.    Connection-less

c.     variable packet size

d.    Fixed and variable packet size

133.                Which of the following is a benefit of point to point communication?

 Quick to configure
 Security implementation
 Cost
 Less availability

_________ is not used to extend LAN.

 Hub
 Fiber modem
 Repeater
 Bridge
Which types of VPNs are used for corporate connectivity across companies residing in different
geographical locations?

 Remote access VPNs


 Peer-to-peer VPNs
 Country-to-country VPNs
 Site-to-site VPNs     google
Star topology is the kind of

a. Tree topology

b. Point-to-point topology  page 05


c.     Broadcast topology

d.    Ring topology

In a __________ state, a bridge allows simultaneous use of each segment.

 Ready
 Steady
 Final
 Startup

The network occupies larger areas like cities & countries is called

 LAN
 WAN
 MAN
 All of the above
In link state routing __________ send link-state information about local connections.

 Bridge
 Switches
 Routers
 Hubs

Transmission media are usually categorized as _______.

 Guided or unguided
 Fixed or unfixed
 Determinate or indeterminate
 Metallic or nonmetallic
Even parity can be used to check for ________ bit/ bits of errors.

a. 1 page 18
b.    2

c.     3

d.    0

Routing table entries can be ________ with a default route.

 Collapsed
 Redirected
 Emerged
 Guaranteed

The system administrator must coordinate to avoid the conflict in_________ hardware addressing
scheme.

 Static
 Dynamic
 Configurable
 Fixed

____________ network does not depend on CSMA/CD.

 Ethernet
 Fast Ethernet
 Gigabit Ethernet
 Wireless
Which of the following technologies can extend the diameter of LAN medium?

 Fiber optic
 Repeater
 Diameter of LAN medium is not extendable
 Both. Fiber optic and Repeaters
Connections are formed in Asynchronous transfer mode by starting values in________ in ATM
switches, as opposed to making actual electrical connections.

 Heap
 Stack
 Virtual Circuit
 Memory locations   page 67
The _______ scheme must be reliable to prevent conflicts.

 a. Static

b. Dynamic page 34
c.     Configurable

d.    Fixed

Metropolitan area network is used for ____________.

a. City page 55
b.    Building

c.     Country
d.    Continent

Which addressing can be only used in the local area networks?

a. IP google
b.    Physical

c.     Port

d.    Protocol

The sharing of a _______ among the workers in an office is a goal of resource sharing.

 Mouse
 Printer  page 9
 Keyboard
 Motherboard
ATM uses fixed size, small cells, 48 octet’s data and __________.

a. Octets header

b. 5 Octets header  page 65


c.     6 Octets header

d.    7 Octets header

Which of the followings is not an advantage of framing?

 Missing eot indicates sending computer crashed.


 Missing soh indicates receiving computer missed beginning of message.
 Delimiters do not contain any user data        page 16
 Bad frame is discarded.

The _________ field of Ethernet frame has the purpose of receiver synchronization.

a. Preamble               page 36
b.    Frame Type
c.     Data

d.    CRC

___________ was the first internet available for the first time.

 ARPANAT
 The ARPNET
 The NET
 ARPANET     page 9
We need packets rather than bits because ________

 To compress the data


 Packets move faster
 Sender and receiver need to coordinate to detect transmission errors. Page 14
 Packets can only move between two terminals

When an application ________ any data, it makes a copy of the data available to all other computers on
the network.

a. Multicast page 143


b.    Broadcast

c.     Anycast

d.    Unicast

VBR stands for _________

 Virtual Bit Rate


 Virtual Byte Rate
 Variable Byte Redundancy
 Variable Bit Rate      page 71
Objective Questions

1. The sharing of a ________ among the workers in an office


is a goal of resource sharing.

1. Mouse

2. Printer

3. Keyboard

4. Motherboard

2. How many methods exist for computing routing table?

1. 5

2. 4

3. 3

4. 2

3. ________ are more frequently being designed to allow


specification of the quality of service required by users.

1. Switch

2. VPI

3. VCI

4. Networks

4. Which of the following statement is true regarding ATM?

1. It is a single technology for voice, video and data.

2. It has low jitter and high capacity.

3. It uses fixed size, small cells, 48 octet’s data.

4. All of the above


5. The ________ of errors is easier than the ________ of
errors.

1. correction, detection

2. detection, correction

3. correction, creation

4. detection, manipulation

6. If a small set of bits changes near a specific location due


to lighting or electric motor starting nearby, this type of
errors are called ________.

1. Burst error

2. Vertical error

3. Parity Error

4. Single bit error

7. ________ and ________ are the two types of frame type.

1. Internal and external

2. Single and dual

3. Implicit and explicit

4. Multicast and broadcast

8. The length of time required to send a variable length


packet is ________.

1. 5 seconds

2. Variable

3. Constant

4. Fix
9. Hashing is the transformation of a string of characters into
a usually shorter fixed-length value or a key that
represents the original string.

1. true

2. false

10. The third field of the header consists of ___________


bit Ethernet frame type.

1. 48

2. 32

3. 16

4. 8

11. If a sender with a 1 Gigabit NIC and receiver with 100


Megabit NIC wants to communicate with each other at
which speed they can communicate?

1. 11 Megabit

2. 100 Megabit

3. 1 Gigabit

4. 1.1 Gigabit

12. Which of the following is not a benefit of Source


Independence?

1. It allows fast and efficient routing.

2. Packet switch need not hove complete information about all


destinations.

3. network functions even if topology changes.

4. None of the given


13. If simultaneous transmission occurs, the frames
interfere with each other and this phenomenon is called
________.

1. collision

2. delayed transmission

3. packet loss

4. coordination

14. ________ sends ICMP echo messages with increasing


TTL.

1. Ping

2. Trace route

3. Tracert

4. none of the given

15. NAT device stores state information in translation


table.

1. true

2. false

16. SMDS is ________.

1. Connectionless service

2. Connection oriented service

3. Used for delivering blocks of data

4. None of the given

17. Which layer of the OSI Model directly communicates


and controls the transmission medium:

1. Transmission
2. Physical

3. Application

4. Network

18. Which of the following remains same in the header of


the packet in a datagram during the entire journey of the
packet?

1. Source Address

2. Destination Address

3. Next Node Address

4. Checksum

19. The frame format of any LAN technology must


consists of ________ and ________.

1. Payload and CRC

2. Payload and Frame type

3. Frame header and pay load

4. Frame header and CRC

20. According to a bridge performance, if both the source


and destination are on the same segment.

1. It forwards the frame to the other segment

2. It does not forward the frame to the other segment

3. It does not forward the frame to the same segment

4. It forwards the frame to every other segment

21. Frames include additional information to


detect/correct errors are insert by ________.

1. Sender
2. Receiver

3. Network Devices

4. Sender and Receiver

22. ________ places the boundary between the second


and third octets

1. Class A

2. Class B

3. Class C

4. Class D

23. LAN interface uses ________ to copy frame data


directly from main memory.

1. DMA

2. FDDI

3. Hard disk

4. Flash

24. SMDS is ________.

1. Connectionless service

2. Connection oriented service

3. Used for delivering blocks of data

4. None of the given

25. The network occupies larger areas like cities &


countries is called

1. LAN

2. WAN
3. MAN

4. All of the above

26. ________ Source is responsible for fragmentation.

1. IPV4

2. IPV6

27. An interior switch is one with wich ________.

1. Computers are attached.

2. No computer is attached.

3. Computers are attached internally.

4. None of the above.

28. To span long distances or many computers, networks


must replace shared medium with _________.

1. segment transformation

2. fiber optices

3. packet switches

4. None of the above

29. Which multiplexing technique shifts each signal to a


different carrier frequency?

1. TDM

2. FDM

3. Both a and b

4. None of the above


30. The protocol address of the next hop must be
_____________ to an equivalent hardware address before
a packet can be sent.

1. Encrypted

2. Decrypted

3. Translated

4. Non of these

31. In a ping command result, time denotes the


________.

1. TLT

2. BRT

3. TTL

4. RTT

32. ________ protocol uses three way handshake to


begin a connection.

1. UDP

2. TCP

3. IP

4. none of the given

33. In ________ all computers are attached to a central


hub.

1. Star Topology

2. Bus Topology

3. Hub Topology

4. Ring Topology
34. The recent executed instruction ________ in
temporal aspect of the locality of reference.

1. won't be executed soon

2. is temporarily not referenced

3. will be wxwcuted soon again

4. will be showing the final results

35. In 3-way handshake TCP requires to generate a


random ________ sequence number.

1. 30 bit

2. 32 bit

3. 34 bit

4. none of the given

36. According to size, there are ________ classifications


of networks.

1. 2

2. 3

3. 4

4. 5

37. What will be the bandwidth rate for older, low-speed


network, and analog telephones?

1. 16 MHz

2. 20 MHz

3. 24 MHz

4. 30 MHz
38. Which multiplexing technique transmits analog
signals?

1. FDM

2. TDM

3. WDM

4. Both (a) and (c)

39. VBR stands for __________.

1. Virtual Bit Rate

2. Virtual Byte Rate

3. Variable Byte Redundancy

4. Variable Bit Rate

40. NIC connection in a physical network is known as


__________.

1. LAN wiring scheme

2. WAN wiring scheme

3. Color wiring scheme

4. None of above

41. The topology each computer is connected to a central


hub is called

1. Ring topology

2. Star topology

3. Tree topology

4. Mesh topology
42. Thick Ethernet also requires ________ to avoid signal
reflectance.

1. Terminators

2. Drop cable

3. Transceivers

4. AUI cable

43. ATM header is about ________ of the cell.

1. 100 %

2. 10 %

3. 20 %

4. 50 %

44. Twice NAT fails if an application uses the IP


addresses instead of Domain Name.

1. true

2. false

45. The information about ________ is kept in routing


tables.

1. Entries

2. Destinations

3. Source

4. Packets

46. Physical Addressing is a WAN is similar to LAN as


each packet has format with ________.

1. Header
2. Title

3. Frame

4. Address

47. ________ is a tool that sends a message to a remote


computer and reports whether the computer responds.

1. Ping

2. Flag

3. Fragment offset

4. TCP

48. Missing ________ in a frame format indicates


receiving computer missed beginning of the message.

1. soh

2. eoh

3. eot

4. sot

49. In Direct point to point communication adding the


Nth computer requires ________ new connections.

1. (N^2 - N)/2

2. N^2

3. N(N - 1)

4. N - 1

50. Two computers with a connection through an ATM


network will likely have same VPI/VCI values for each end
of the connection.

1. true
2. false

51. ________ is a measure of the rate at which data can


be sent through the network.

1. Throughput

2. Propagation delay

3. Access delay

4. Switching delay

52. The ________ field of Ethernet frame has the


purpose of receiver synchronization.

1. Preamble

2. Frame Type

3. Data

4. CRC

53. ATM offers high speed and ________ delay.

1. High

2. Low

3. Moderate

4. All of the above

54. The Ethernet standard specifies that frames are sent


using the ________ scheme.

1. Differential Manchester

2. Not Return to Zero (NRZ)

3. Return to Zero (RZ)

4. Manchester Encodind
55. ________ is standard wireless LAN that uses radio
signals at 2.4HHz.

1. IEEE 803.16

2. IEEE 802.3

3. IEEE 802.15

4. IEEE 802.11

56. Frame relay is ________.

1. Connection oriented service

2. Connectionless service

3. It is typically ranges from 5Mbps to 1000Mbps

4. None of the given

57. Fragmentation when using ICMP for path MTU should


be avoided.

1. true

2. false

58. The bridges communicate with each other on the


network and use ________ algorithm to decide which
bridge will not forward frames if a cycle occurs.

1. Djikstra

2. Shortest path first

3. Vector distance

4. Distributed Spanning Tree

59. Due to revolutionalization of IP-V6 the speed has


increased from ________.

1. 56kbps to 512kbps
2. 512kbps to 1gbps

3. 56kbps to 1gbps

4. none of the given

60. ________ is inflexible.

1. Routing

2. Searching

3. Processing

4. Static routing

61. The Fast Ethernet hardware operates at a rate of


________.

1. 10 Mbps

2. 1000 Mbps

3. 1000 bps

4. 100 Mbps

62. As a result of ARPA research, the first network was


established which was named as ________.

1. ARPANET

2. PACKET NETWORK

3. ARPNET

4. INTERNETWORKING

63. Which of the following cannot be used to extend a


LAN?

1. Repeaters

2. Switches
3. Routers

4. Fiber Modems

64. Header contains all information needed to deliver


datagram to the destination computer. But which one of
the following is not included:

1. Destination address

2. Source address

3. Rectifier

4. Other delivery information

65. ________ is the most popular wiring scheme because


of lowest cost.

1. 5 Base T

2. 10 Base T

3. 100 Base T

4. 1000 Base T

66. EGPs stand for ________.

1. Exterior Gateway Protocols

2. External Gateway Protocols

3. Extra Gateway Protocols

4. None of the given

67. Point-to-point topology is

1. Size Based

2. Mobility Based

3. Connectivity Based
4. Medium Based

68. The mechanism extending the optical fiber across


several kilometers is very successful because delays on
optical fiber are very _______ and bandwidth is very
_______.

1. Low, High

2. High, Low

3. High, High

4. Low, Low

69. Bluetooth uses shared medium and ________ instead


of coaxial cable.

1. Radio waves

2. Low frequency waves

3. Micro waves

4. Infrared waves

70. In CSMA, if simultaneous transmission occurs, the


________ interfere with each other and this phenomenon
is called collision.

1. Computers

2. Network

3. Frames

4. Cable wires

71. Even parity can be used to check for ________


bit/bits of errors.

1. 1

2. 2
3. 3

4. 0

72. A ________ is a special-purpose computer dedicated


to the task of interconnecting networks.

1. Router

2. Bridge

3. Switch

4. None of the given

73. The maximum cable length of a LAN is ________.

1. Fixed

2. Unlimited

3. Fixed and Unlimited in different conditions

4. None of these

74. ________ cannot be extended arbitrarily far or to


handle arbitrarily many computers.

1. WAN

2. LAN

3. MAN

4. LED

75. Each computer in LAN is identified by a physical


address, usually imprinted on the ________.

1. Router

2. Switch

3. Network Interface Card


4. Modem

76. The switch that has computers attached with it is


called ________ switch.

1. Exterior

2. Interior

3. Packet

4. Front

77. When an application _________ data, it makes a


copy of the data available to all other computers on the
network.

1. Broadcasting

2. Multicasting

3. Unicasting

4. None of the given

78. The physical addressing in a WAN is similar as in LAN


in the way __________.

1. The data is transmitted in packets equivalent to frames.

2. Each packet has a format with header.

3. The packet header includes destination and source


addresses.

4. All of the above

79. The first automated tool required to see whether the


given computer is online or not was

1. Probing program

2. PING program
3. status program

4. None of the above

80. Which type of network consists of wired computers in


a university classroom?

1. WAN

2. LAN

3. MAN

4. PAN

81. Which of the following is not a guided medium?

1. Twisted-pair cable

2. Fiber-optic cable

3. Atmosphere

4. Coaxial cable

82. IPV6 128 bits address includes network prefix and


________

1. Host Suffix

2. Host prefix

3. Source Prefix

4. none of the given

83. The number of connections needed for 8 computers in


direct point to point communication is equal to ________.

1. 28

2. 8

3. 7
4. 26

84. Which of the following technologies can extend the


diameter of LAN medium?

1. Fiber optic

2. Repeaters

3. Diameter of LAN medium is not extendable

4. Both Fiber Optic and Repeaters

85. We need packets rather than bits because ________.

1. To compress the data

2. Packets move faster

3. Sender and receiver need to coordinate to detect


transmission errors.

4. Packets can only move between two terminals

86. Hardware that calculates a CRC uses two simple


components ________.

1. Shift register and XOR unit

2. ANd unit and XOR unit

3. Shift register and shift XOR unit

4. Shift register & AND unit

87. ________ encapsulates IP datagram as data area in


hardware frame.

1. Network Interface Layer

2. Datalink Layer

3. Network Layer
4. None of the given

88. Dotted decimal notation is a syntactic form the IP


software uses to express ________ binary values when
interacting with humans.

1. 8-bit

2. 16-bit

3. 32-bit

4. 64-bit

89. Which of the following is called virtual channel?

1. Connection in VCI

2. Connection in ATM

3. Connection in virtual circuit

4. None of the above

90. In FDDI, in case of a station failure, remaining


stations loop back and ________.

1. Re-route data through spare ring

2. Data frames are discarded

3. Re-transmit data through the same ring

4. Collision will occur

91. ________ is less complex and easy to understand.

1. TCP

2. UDP

3. IP

4. None of the given


92. In ________ topology, if the switch goes down all the
computers will be disconnected.

1. Bus

2. Ring

3. Mesh

4. Star

93. Which of the following is a benefit of source


independence?

1. It allows fast and efficient routing.

2. Packet switch do not need to have complete information


about all destinations

3. Network functions even if topology changes

4. All of the above

94. Solution is provided by vuZs Solution Team.You are free to distribute and use it. In
case you wanted to host or re-distribute it. Please don’t remove the links of group
and website
95. Question No: 1 ( M - 1 ) .

In Direct point to point communication adding the Nth computer requires------------


new connections.

► None of the given

► N2

► N-1

► (N2 –N)/2

disadvantage  In Direct point to point communication is that adding a new computer


to the network requires N-1 new connections .(P# 23)

Question No: 2 ( M - 1 ) .

In Point-to-Point topology there are two topologies.

► Tree and Ring


► Star and Ring

► Star and Tree

► None of the given

POINT-TO-POINT:
96.  
97. www.vuzs.info/
http://groups.google.com/group/vuZs
98.  
99.  
100. In Point-to-Point topology there are two topologies.
101. 1) STAR topology
102. 2) TREE topology

Question No: 3 ( M - 1 ) .

In -------------, network occupies the smaller area like a room a floor or a building

► LAN

► WAN

► MAN

► None of the given

In LAN network occupies the smaller area like a room a floor or a building.(P# 4)
103. www.vuzs.info/

104. http://groups.google.com/group/vuZs
105.
Question No: 4 ( M - 1 ) .

Hardware that calculates a CRC uses two simple components.

► AND unit and XOR unit

► Shift register and XOR unit

► Shift register and AND unit

► None of the given

CRC uses just two hardware components:


106. • Shift register
107. • Exclusive OR ( XOR unit ) .(P# 20)

Question No: 5 ( M - 1 ) .

CRC can detect more errors than a simple checksum.


► true

► false

Question No: 6 ( M - 1 ) .

The Gigabit Ethernet hardware operates at a rate of --------

► 10 Mbps

► 100 Mbps

► 1000 Mbps

► None of the given

Gigabit Ethernet that operates at 1 Gbps (1000 Mbps) over fiber optics and twisted
pair Ethernet cables.

Question No: 7 ( M - 1 ) .

Formally named __________ informally known as the twisted pair Ethernet or TP


Ethernet.

► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given

10BASE-T:
108. This is another standard of wiring scheme. It is commonly called 10Base-T,
Twisted Pair or TP Ethernet. (P# 43)

Question No: 8 ( M - 1 ) .

An interface for thin Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.

► RJ-45, 10 Base T

► RJ-45, 10 Base 5

► BNC, 10 Base 2

► BNC, 10 Base T

Question No: 9 ( M - 1 ) .


A system with redundant bridges might have a problem with_______ in the system.

► Loop

► Filters

► Spanning Trees

► All given choices

Question No: 10 ( M - 1 ) .

________ computes shortest paths in a graph by using weights on edges as a


measure of distance.

► Greedy algorithm

► Distance vector algorithm

► Dijksta’s algorithm

► Non of the given

Djikstra’s algorithm can accommodate weights on edges in graph. The shortest


109. path is then the path with lowest total weight (sum of the weight with all
edges). It should
110. be noted that the shortest path is not necessarily with fewest edges (or
hops).

Question No: 11 ( M - 1 ) .

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.

► Connectionless service paradigm

► Connection-oriented service paradigm

► Both Connectionless and Connection-oriented service paradigm

► None of the given

Question No: 12 ( M - 1 ) .

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer

► Network Interface Layer


► Internet Layer

► Transport Layer

LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer.
111. www.vuzs.info/

112. http://groups.google.com/group/vuZs
113.
Question No: 13 ( M - 1 ) .

An Internet Address (IP address) is a unique __________ binary number assigned


to a host and used for all communication with host

► 48-bit

► 32-bit

► 24-bit

► None of the given

An Internet address (IP address) is a unique 32-bit binary number assigned to a


114. host and used for all communication with the host

Question No: 14 ( M - 1 ) .

The address __________ identifies the physical network to which the computer is
attached, while the _______ identifies an individual computer on that network.

► prefix , suffix

► suffix , prefix

► suffix , suffix

► None of the given

PREFIX:
115. It identifies the physical network to which the computers are attached.
116. SUFFIX:
117. It identifies an individual computer on the network.

Question No: 15 ( M - 1 ) .

___________ places the boundary between the first and second octets
► Class A

► Class B

► Class C

► Class D

Class A places the boundary between the first and second octets. Class B places the
boundary between the second and third octets, and class C places the boundary
between the third and fourth octets.
118.

Question No: 16 ( M - 1 ) .

___________ places the boundary between the third and fourth octets.

► Class A

► Class B

► Class C

► Class D

Class A places the boundary between the first and second octets. Class B places the
boundary between the second and third octets, and class C places the boundary
between the third and fourth octets.
119.

Question No: 17 ( M - 1 ) .

________ field of header indicates whether a datagram is a fragment or a complete


datagram.

► FLAGS

► FLAGMENT OFFSET

► IDENTIFICATION

► None of the given

FRAGMENTATION:
IP uses fragmentation i.e. datagrams can be split into pieces to fit in network with
small MTU. Each fragment is an independent datagram. It includes all header fields.
Bit in header indicates that the datagram is a fragment
120. Question No: 18 ( M - 1 ) .

______ provides connectionless service.


► TCP

► UDP

► IP

► None of the given


121.
UDP has the following characteristics.
122. • It is an end-to-end protocol. It provides application-to-application
communication.
123. • It provides connectionless service.
124. • It is a Message-Oriented protocol.
125. • It uses best-effort delivery service.
126. • It follows arbitrary interaction.
127. • It is operating system independent

Question No: 19 ( M - 1 ) .

UDP and TCP are both_________ layer protocols

► Physical

► Data link

► Network

► Transport

Question No: 20 ( M - 1 ) .

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex


communication, Stream interface, Reliable connection startup and Graceful
connection shutdown are the services provided by__________

► IP

► None of the given

► TCP

► UDP
SERVICE PROVIDED BY TCP:
128. Following are the services provided by TCP:
129. • Connection-oriented service
130. • Point-to-point
131. • Complete reliability
132. • Full-duplex communication
133. • Stream interface
134. • Reliable connection startup
135. • Graceful connection shutdown

Question No: 21 ( M - 1 ) .

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer

LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer
136.  
137. www.vuzs.info/

138.  
139. http://groups.google.com/group/vuZs
140.
Question No: 22 ( M - 1 ) .

________identifies which application program on receiving computer should receive


the data

► Logical address

► Source port

► Destination Port

► None of the given

FieldDestinationPort  identifies which application program on receiving computer


should receive the data. While field source port identifies the application programs
that sent the data. (reference from E-books)

Question No: 23 ( M - 1 ) .

________ identifies the application program that sent the data.

► DestinationPort

► Source port

► Logical address

► None of the given


FieldDestinationPort  identifies which application program on receiving computer
should receive the data. While field source port identifies the application programs
that sent the data. (reference from E-books)

Question No: 24 ( M - 1 ) .

The Border Gateway Protocol (BGP) uses_________ for all communication

► UDP

► TCP

► Both UDP and TCP

► None of the given


141.  
142. BORDER GATEWAY PROTOCOL:
143. It is most popular Exterior Gateway Protocol in Internet. It has following
characteristics:
144. "It provides routing among autonomous systems (EGP).
145. "It provides policies to control routes advertised.
146. "It uses reliable transport (TCP).

Question No: 25 ( M - 1 ) .

Which of the following protocols allows the sender and receiver to enforce polices.

► RIP

► OSPF

► BGP

► RIP and OSPF

Question No: 26 ( M - 1 ) .

____________ uses distance vector approach to define routing

► BGP

► OSPF

► RIP

► None of the given


ROUTING INFORMATION PROTOCOL (RIP):
147. It has the following characteristics:
148. "It is used for routing within an autonomous system (IGP).
149. "Hop Count Metric: RIP measures distance in network hops, where each
network
150. between the source and destination counts as a single hop.
151. "It uses UDP for all message transmissions.
152. "RIP is used over LAN. Version 1 of RIP uses hardware broadcast and version
2 allows
153. delivery via multicast.
154. "It can be used to advertise default route propagation. An organization can
use RIP to
155. install a default route in each router.
156. "It uses distance vector algorithm.

Question No: 27 ( M - 1 ) .

ICMP message transport is acted upon by getting ICMP encrypted in IP.

► True

► False

ICMP message transport is acted upon by getting ICMP encapsulated in IP (P# 117)

Question No: 28 ( M - 1 ) .

Protocol addresses are abstractions provided by ___________.

► hardware

► software

► operating system

► internet

Protocol addresses are abstractions provided by software

Question No: 29 ( M - 1 ) .

These packets serve same purpose on ________ as frames on ______

► Intranet, LAN

► Internet, WAN

► Intranet, WAN

► Internet, LAN

VIRTUAL PACKETS:
157. These packets serve same purpose in Internet as frames on LAN
158. www.vuzs.info/

159. http://groups.google.com/group/vuZs
160.
Question No: 30 ( M - 1 ) .

Address mask defines how many bits of address are in suffix?

► True

► False

Address mask defines how many bits of address are in prefix. Prefix defines how
much of address used to identify network.

Question No: 31 ( M - 1 ) .

A single networking technology is best for all needs.

► True

► False

There is no single networking technology that is best for all needs

Question No: 32 ( M - 1 ) .

A computer attached to a given network can only communicate with other


computers attached to the same network. Is this a problem with multiple networks?

► True

► False

The chief problems with multiple networks are as follows:


161. • A computer attached to a given network can only communicate with other
162. computers attached to the same network.

Question No: 33 ( M - 1 ) .

The term self-identifying is used for Classful IP addresses because the class of the
address can be computed from the address__________.

► itself

► prefix

► suffix
► mask
163. Classful IP addresses are self-identifying because the class of the address
can be computed from the address itself

Question No: 34 ( M - 1 ) - Please choose one

Find the class of the address.


10100111 11011011 10001011 01101111

►A

►B

►E

►C
Reference table handouts P # 87
164. Question No: 35 ( M - 1 ) .

Find the class of the address:


11110011 10011011 11111011 00001111

►A

►C

►E

►B

Reference table handouts P # 87

Question No: 36 ( M - 1 ) .

In which method of Address Resolution Protocol the protocol address is determined


by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?

►T

►D

►C

► T, C
165.  
166. Reference table handouts P # 97

Question No: 37 ( M - 1 ) .


Which method of Address Resolution Protocol requires hardware broadcast?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?

►D

►T

►C

► T, D

Reference table handouts P # 97


167. www.vuzs.info/

168. http://groups.google.com/group/vuZs
169.
Question No: 38 ( M - 1 ) .

Which method of Address Resolution Protocol resolution with minimum delay?


Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?

► T, D

►c

►T

► T, C

Reference table handouts P # 97


Question No: 39 ( M - 1 ) .

In which method of Address Resolution Protocol the implimentation is more difficult?


Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?

► T, C

►T

►C

►D

Reference table handouts P # 97


Question No: 40 ( M - 1 ) .

On of the design goals for unicast route propagation is __________.

► Consistency
► inconsistency

► stability

► dynamic addressing

On of the design goals for unicast route propagation is stability—continual changes


in route are undesirable because they lead to higher jitter and datagram arriving
out of order. Thus, once a unicast routing protocol finds a shortest path, it usually
retains the route until a failure makes the path unusable. (Reference from E-book)
170.

Question No: 41 ( M - 1 ) .

Propagation multicast routing information differs dramatically from unicast route


propagation?

► True

► False

Propagating multicast routing information differs dramatically from unicast route


propagation.  The difference arises because internet multicast allows dynamic group
membership and autonomous senders
Question No: 42 ( M - 1 ) .

The IP multicast abstraction allows an application running on an arbitrary computer


to leave a multicast group at any time. While _____________ application on a
computer remain a member of a group.

► One or more

► only one

► no

► many
171.
Question No: 43 ( M - 1 ) .

To save traffic, an EGP does not summerize routing information from the
autonomous system before passing it to another autonomous system.

► True

► False

To save traffic, an EGP summerize routing information from the autonomous


system before passing it to another autonomous system. More important an EGP
implements policy constraints that allow a system manager to determine exactly
what information is released outside the organization. (Reference from E-book)
Question No: 44 ( M - 1 ) .

In IPv6 the type of address used for collection of computers with same prefix. Are
known as_________.

► Anycast

► Unicast

► Multicast

► Non of the given

Following are special types of addresses, IPv6 uses:


172. Unicast: It is used for single destination computer.
173. Multicast: It is used for multiple destinations; possibly not at same site.
174. Cluster:  This type of address is used for collection of computers with same
prefix,
175. datagram is delivered to one out of cluster.

Question No: 45 ( M - 1 ) .

Special types of addresses in IPv6 used for multiple destinations; possibly not at
same site. Are known as_________.

► Unicast

► Anycast

► Multicast

► Non of the given

Following are special types of addresses, IPv6 uses:


176. Unicast: It is used for single destination computer.
177. Multicast: It is used for multiple destinations; possibly not at same site.
178. Cluster: This type of address is used for collection of computers with same
prefix,
179. datagram is delivered to one out of cluster.

Question No: 46 ( M - 1 ) .

UDP offers application programs a Message-Oriented Interface, applications can


depend on protocol to preserve data boundaries.

► True

► False

UDP offers application programs a Message-Oriented Interface. It does not divide


messages into packets for transmission and does not combine messages for
delivery.
180. ADVANTAGES:
181. • Applications can depend on protocol to preserve data boundaries.

Question No: 47 ( M - 1 ) .

Reliability is the responsibility of the _________ layer

► Network

► Datalink

► Transport

► Application

Reliability is the responsibility of the Transport layer


182. Question No: 48 ( M - 1 ) .

TCP uses _______ mechanism to control the flow of data.

► door

► window

► acknowledgment

► retransmission

TCP uses window mechanism to control the flow of data.

Question No: 49 ( M - 1 ) .

The time for acknowledgement to arrival of packet depends on.

► Distance to destination and Current traffic conditions

► Current traffic conditions

► Distance to destination

► non of these

The time for acknowledgement to arrive depends on:


183. • Distance to destination
184. • Current traffic conditions

Question No: 50 ( M - 1 ) .


FDDI can transmits data at a rate of ----------

► 100 million bits per second

► 10 million bits per second

► 1000 million bits per second

► None of the given

CS610 – Computer Network

Quiz No.1 Nov 16, 2012

------ Program sends a message to a remote computer and reports whether the computer
responds.
Ping
Ping
Traceroute
ICMP
Non of the given

---------- was especially concerned about the lack of high powered computers.
ARPA
IEEE
EIA
Non of the given

The term -------- is used to denote the definition of a packet used with a specific type of
network.
Packet
Frame
Data
None of the given

Computer networks are often called -------------- because they use packet technology.
Ethernet
Switch networks
Packet networks
None of the given

-------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given

Most LANs that employ ring topology use an access mechanism known as-------
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given

IEEE LLC/SNAP header is --------, which is used to specify the type of data.
8 octets
8 bytes
8 bits
None of the given

Formally named __________ informally known as the twisted pair Ethernet or TP


Ethernet.
10 Base 2
10 Base 5
10 Base T
None of the given

An interface for twisted pair Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T

A bridges function in the _________ layers(s).


Physical (MAC)
Data link
Network
Physical (MAC) and Data link

A Bridge can ________


Filter a frame
Forward a frame
Extend a LAN
Do all the above

A Bridge forwards or filters a frame by comparing the information in its address table to
the frame’s__________
Layer 2 source address
Source node’s physical address
Layer 2 destination address
Layer 3 destination address

________ computes shortest paths in a graph by using weights on edges as a measure of


distance.[/b]
Greedy algorithm
Distance vector algorithm
Dijksta’s algorithm
Non of the given

___________ is used for audio and video, since these have predefined maximum data
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given

---------- is also called self healing network   ATM 


FDDI
Token Ring 
None of the given 
 
Most LANs that employ ring topology use an access mechanism known as-------  
Select correct option:  
 CSMA/CD 
 CSMA/CA 
 CSMA 
 TOKEN PASSING
 
An ------------method, the network hardware designers specify how type information is included in
the frame and the value use to identify various frame types.  
Explicit frame type
Ideal frame type 
Implicit frame type 
None of the given 
 
Hardware that calculates a CRC uses two simple components.   
AND unit and XOR unit 
Shift register and XOR unit
Shift register & AND unit 
Shift register and shift XOR unit 
 
The Ethernet standard specifies that frames are sent using the --------  
Differential Manchester  
Not Return to Zero (NRZ) 
Manchester Encoding
Return to Zero (RZ) 
 
When an application ------------ data, it makes a copy of the data available to all other computers on
the network.  
Select correct option:  
 Broadcasting
 Multicasting 
 Unicasting 
 None of the given 

LAN interface may use ---------- to copy frame data directly from main memory.    
DMA
FDDI 
CSMA/CD 
None of the given 
 

LAN and WAN are classified according to their.........  


Select correct option:  
Size
Connectivity 
Medium 
Mobility 
For how much time would other computers be in wait while one computer was transferring 56MB
file with transmission speed of 56Kbps  
Select correct option:  
10 Sec
11 Sec 
12 Sec 
13 Sec 

A network uses _______ to arrange computers to be connected in a single closed loop.  


Select correct option:  
Star Topology 
Dual Ring Topology 
Ring Topology
Bus Topology

CBR stands for…………….

Constant Byte Rate

Constant Bit Rate

Connection break Recovery


None of the above

The routing table in interior and exterior switches has which one of the following?

It should have next hop for each possible destination

The next hop in table must be on shortest path to destination

Both (a) and (b)

None of the above

Which one of the following is a method for computing routing table information?

Manual entry

Static routing

Boot time routing

None of the above

Which one of the following is the responsibility of Djikstra’ algorithm?

To compute the shortest path between two nodes

To extract next hop information from path information

To insert next hop information into routing table

All of the above

Routing table is used to keep the information about…………….

Destination

Medium of transmission

Routers used in network

All of the above

Frame relay is………………….

Connection oriented service

Connectionless service
It is typically ranges from 5Mbps to 1000Mbps.

None of the above

Which of the following is not a guided medium?

Twisted-pair

cable Fiber-optic

cable Atmosphere

Coaxial cable

Which of the following statement is wrong regarding PVC?

PVC last as long as the customer pay the periodic fee for its use.

Forwarding tables are automatically restored after pow er of equipment failure.

Forwarding table entries for PVC’s are dynamically configured.

All of the above are wrong

Which of the following statement is true regarding ATM?

ATM is a single technology that is designed to meet the goals of both LANs and WANs.

ATM uses the concept of connection-oriented networking.

Both (a) and (b)

None of the above

Djikstra’s algorithm is used to compute the……………….

shortest path between two nodes

number of nodes used in the network

distance between different nodes

none of the above

_________ is used to attach two autonomous systems.


Select correct option:

BGP
IGP
EGP
none of the given
Due to revolutionalization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given

Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Select correct option:
True
False

TTL stands for __________


Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given

IGPs stand for _________


Select correct option:

Internal Gateway Protocols


Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given

_____________identifies which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given

__________________encapsulates IP datagram as data area in hardware frame.


Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given

Class A mask is 255.0.0.0 which is used for ________________


Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
class A mask is 255.0.0.0 which is used for subnetting.
 
NAT is not useful at a residence with Cable Modem or DSL connectivity.
Select correct option:
True
False
 
Autonomous System chooses a routing protocol to exchange routing information which is passed before
being summarized to another group.
Select correct option:
True
False

______ layer Provides reliable delivery of datagram.


Select correct option:
Network
Transport
Datalink
none of the given

The process of using a routing table to select a next hop for a given datagram is called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given

The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was
being exhausted because all networks had to choose one of ________ possible sizes.
Select correct option:
three
two
four
five

End to End delivery Service of IP datagram is _____


Select correct option:
Connection oriented
Connectionless
both a and b
none of the given

EGP stands for _________


Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that
represents the original string.
Select correct option:
True
False

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware
addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit

Reliability is not the responsibility of the Transport layer.


Select correct option:
True
False

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:
True
False

TCP uses the term segment to refer to a ________.


Select correct option:

packet
message
both (a) and (b)
None of the given
both a and b?

The Universal Datagram Protocol is a message-oriented protocol.


Select correct option:
True
False

______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given

IP datagram can contains ________ octets.


Select correct option:
0-65,535
1-65,535
1-65,536
none of the given

The amount of buffer space available at any time is called the window.
Select correct option:
True
False 

_______ Source is responsible for fragmentation.


Select correct option:
IPV4
IPV6

Routers use _______ to forward datagrams along prearranged path.


Select correct option:
Traffic class
Flow label
Destination address
none of the given

_______ protocol uses three way handshake to begin a connection.


Select correct option:

UDP
TCP
IP
none of the given

Typical internet routing uses uses a combination of two metrics__________________.


Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count 

Question # 14 of 20 
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given 

The routers within an autonomous system use a _____________ to exchange routing information.
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of
Internet Routing Protocol.
Select correct option:
True
False 

The Network Layer Protocol ICMP stands for____________


Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given 
The Current version of IP-Version 4 is _____ old
Select correct option:
18 years
20 years
22 years
none of given

TCP is a connectionless and reliable transport protocol.


Select correct option:
True
False

In Direct point to point communication adding the Nth computer


requires___________ new connections.
N2
N-1
N2 –N)/2
None of the given

Most LANs that employ ring topology use an access mechanism known
as_______
ring topology use token passing for
synchronized access to the ring

Computers attached to an ether use ------ in which a computer waits for the
ether to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given

FDDI can transmits data at a rate of ___________________


100 million bits per second
100 million bits per second
100 million bits per second
None of the given
________________ has advantages arisen from the size and ease of
computation.
CRC
Parity
Checksums
None of given
AUI cable connects from NIC to---------------
Select correct option:
BNC Connector
RJ-45 Connector
Transceiver
None of the above

As a result of ARPA research the first network was established which was named as Select correct
option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWORK

A ---------- provides mechanism that automatically assignes a physical address to a station when the
station first boots. Select correct option:
Static ad Configurable
addressing scheme

polygons are basically concave polygons that may have self-intersecting edges.
Complex
Hybrid
Convex
Convex and Hybrid
Dynamic addressing scheme

An ___________method, the network hardware designers specify how type


information is included in the frame and the value use to identify various frame Local Talk is a LAN
technology that employs
Explicit frame type
Ideal frame type 
Implicit frame type 
None of the given 

In Point-to-Point topology there are two topologies.


Tree and Ring
Star and Ring
Star and Tree
None of the given

The topology each computer is connected to a central hub is called


Select correct option:
Ring topology
Star topology
Tree topology
Mesh topology

The basic responsibility of NIC is ---------------- Select correct option:


To access medium
Network To resource allocation
To access memory
All of above

Currently the original Ethernet hardware operates at a rate of --------


Select correct option:
10 Mbps
100 Mbps
1000 Mbps
3 Mbps

The Gigabit Ethernet hardware operates at a rate of_________


10 Mbps
100 Mbps
1000 Mbps

The number of connections needed for N computer in direct point to point


communication is equal to:
(N2-N)/2
N (N-1)
N2
None of the given

The length of the format of hardware address is


Select correct option:
One to ten bytes
One to five bytes
One to six bytes
None of the given

Star topolgy is the kind of


Tree topology
Point-to-point topolgy
Broadcast topolgy
Ring topology

Local Talk is a LAN technology that employs________


Bus topology
Ring topology
Star topology
None of the given
The network occupies larger areas like cities & countries is called
Select correct option:
LAN
WAN
MAN
All of the above

Computer networks are classified by.......factors


2
3
4
5

Computers attached to an ethernet use ________in which a computer waits for


the other to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
none of the given

Point-to-point topology is
Size Based
Mobility Based
Connectivity Based
Medium Based

NIC connection in a physical network is known as--------------------


Select correct option:
LAN wiring scheme
WAN wiring scheme
Color wiring
None of above

A_______ relies on the hardware manufacturer to assign a unique physical


address to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given

The main functions of NIC are ---------------------


CRC Error
correction Address
recognition
All of above

FDDI can transmits data at a rate of ___________________


100 million bits per second
100 million bits per second
100 million bits per second
None of the given

Wireless LAN use the -------- as a media access method


Select correct option:
CSMA/CD
CSMA/CA
TOKEN PASSING
CSMA

A_______ relies on the hardware manufacturer to assign a unique physical


address to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given
Wireless LAN use the -------- as a media access method
Select correct option:
CSMA/CD
CSMA/CA
TOKEN PASSING
CSMA

According to their size there are............classifications of networks.


Select correct option:
2
3
4
5

As a result of ARPA research the first network was established which was named as Select correct
option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWOR

---------- performs the matching between destination address and MAC address of machine.
Select correct option:
Hardware address
LAN interface
DMA
None of above

An ___________method, the network hardware designers specify how type


information is included in the frame and the value use to identify various frame
types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given

The demand of sharing is very high because many computers need to use the shared networks.
Select correct option:
WAN networks
Shared networks
Unshared networks
LAN networks

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the
CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given

The satellite or radio topology in which all computers are connected to each other via satellite or
radio wave is a kind of Select correct option:
broadcast network

Thick Ethernet is known as------------------ Select correct option:


10 base 5
10 base T
10 base 100
10 base 1

The first automated tool required to see whether the given computer is online or not was
Select correct option:
Probing program
PING program
status program
None of the above

The basic responsibility of NIC is ----------------


Select correct option:
To access medium/network
To resource allocation
To access memory
All of above
No error detection scheme is perfect because transmission errors can affect _________.
Select correct option:
Data
Additional Information
Additional information & data
Transmission medium

-------------- has advantages arisen from the size and ease of computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing

The third field of the header consists of ------ bit Ethernet frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology

Hardware that calculates a CRC uses two simple components.


Select correct option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the
CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given
Fixed network is a type of networks which is classified with respect to the...........factor
Select correct option:
Size
Connectivity
Medium
Mobility

Network interface card acts like a (an) -----------


Select correct option:
Input/output device
Input device
Output device
All of above

IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above

Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING

The Gigabit Ethernet hardware operates at a rate of ________


10 Mbps
100 Mbps
1000 Mbps
None of the given

A network uses ------------ if all computers attach to a central point


Select correct option:
Ring Topology
Star Topology
Hub Topology
Bus Topology

---------- is also called self healing network


Select correct option:
ATM
FDDI
Token Ring
None of the given

---------- which is designed to help detect transmissions errors, send one extra bit of information
with each character.
Select correct option:
Checksum
CRC
Parity
VRC

Hardware addresses must be ---------- on a LAN.


Select correct option:
Common
Unique
A ---------- relies on the hardware manufacturer to assign a unique physical address to each
network interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme
None of the given

The satellite or radio topology in which all computers are connected to each other via satellite or
radio wave is a kind of
Select correct option:
Broadcast network
Point-to-Point network

The demand of sharing is very high because many computers need to use the
shared networks.
Select correct option:
 WAN networks
 Shared networks
 Unshared networks
 LAN networks

Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given

The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
broadcast network
Thick Ethernet is known as------------------ Select correct option:
10 base 5
10 base T
10 base 100
10 base 1

The first automated tool required to see whether the given computer is online or not
was
Select correct option:
Probing program
PING program
status program
None of the above

The basic responsibility of NIC is ----------------


Select correct option:
To access medium/network
To resource allocation
To access memory
All of above

No error detection scheme is perfect because transmission errors can affect


_________.
Select correct option:
Data
Additional Information
Additional information & data
Transmission medium

-------------- has advantages arisen from the size and ease of computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing

The third field of the header consists of ------ bit Ethernet frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology

Hardware that calculates a CRC uses two simple components.


Select correct option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given

Fixed network is a type of networks which is classified with respect to


the...........factor
Select correct option:
Size
Connectivity
Medium
Mobility

Network interface card acts like a (an) -----------


Select correct option:
Input/output device
Input device
Output device
All of above

IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING

The Gigabit Ethernet hardware operates at a rate of ________


10 Mbps
100 Mbps
1000 Mbps
None of the given

A network uses ------------ if all computers attach to a central point


Select correct option:
Ring Topology
Star Topology
Hub Topology
Bus Topology

---------- is also called self healing network


Select correct option:
ATM
FDDI
Token Ring
None of the given

---------- which is designed to help detect transmissions errors, send one extra bit of
information with each character.
Select correct option:
Checksum
CRC
Parity
VRC

Hardware addresses must be ---------- on a LAN.


Select correct option:
Common
Unique
A ---------- relies on the hardware manufacturer to assign a unique physical address
to each network interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme
None of the given
The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of
Select correct option:
Broadcast network
Point-to-Point network

CS610 – Computer Network


Quiz No.1 Nov 16, 2012

------ Program sends a message to a remote computer and reports whether the


computer
responds.
Ping
Ping
Traceroute
ICMP
Non of the given

---------- was especially concerned about the lack of high powered computers.
ARPA
IEEE
EIA
Non of the given

The term -------- is used to denote the definition of a packet used with a specific type
of
network.
Packet
Frame
Data
None of the given

Computer networks are often called -------------- because they use packet
technology.
Ethernet
Switch networks
Packet networks
None of the given

-------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given

Most LANs that employ ring topology use an access mechanism known as-------
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given

IEEE LLC/SNAP header is --------, which is used to specify the type of data.
8 octets
8 bytes
8 bits
None of the given

Formally named __________ informally known as the twisted pair Ethernet or TP


Ethernet.
10 Base 2
10 Base 5
10 Base T
None of the given

An interface for twisted pair Ethernet must have an ____________ connector , and
must
generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T

A bridges function in the _________ layers(s).


Physical (MAC)
Data link
Network
Physical (MAC) and Data link

A Bridge can ________


Filter a frame
Forward a frame
Extend a LAN
Do all the above
A Bridge forwards or filters a frame by comparing the information in its address
table to
the frame’s__________
Layer 2 source address
Source node’s physical address
Layer 2 destination address
Layer 3 destination address

________ computes shortest paths in a graph by using weights on edges as a


measure of
distance.[/b]
Greedy algorithm
Distance vector algorithm
Dijksta’s algorithm
Non of the given

___________ is used for audio and video, since these have predefined maximum
data
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given

---------- is also called self healing network   ATM


FDDI
Token Ring
None of the given

Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
 CSMA/CD
 CSMA/CA
 CSMA
 TOKEN PASSING

An ------------method, the network hardware designers specify how


type information is included in the frame and the value use to identify various frame
types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given

Hardware that calculates a CRC uses two simple components.


AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

The Ethernet standard specifies that frames are sent using the --------


Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)

When an application ------------ data, it makes a copy of the data available to all


other computers on the network.
Select correct option:
 Broadcasting
 Multicasting
 Unicasting
 None of the given

LAN interface may use ---------- to copy frame data directly from main memory.    
DMA
FDDI
CSMA/CD
None of the given

LAN and WAN are classified according to their.........


Select correct option:
Size
Connectivity
Medium
Mobility 
For how much time would other computers be in wait while one computer was
transferring 56MB file with transmission speed of 56Kbps
Select correct option:
10 Sec
11 Sec
12 Sec
13 Sec

A network uses _______ to arrange computers to be connected in a single closed


loop.
Select correct option:
Star Topology
Dual Ring Topology
Ring Topology
Bus Topology

CBR stands for…………….


Constant Byte Rate
Constant Bit Rate
Connection break Recovery
None of the above

The routing table in interior and exterior switches has which one of the following?
It should have next hop for each possible destination
The next hop in table must be on shortest path to destination
Both (a) and (b)
None of the above

Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Boot time routing
None of the above

Which one of the following is the responsibility of Djikstra’ algorithm?


To compute the shortest path between two nodes
To extract next hop information from path information
To insert next hop information into routing table
All of the above

Routing table is used to keep the information about…………….


Destination
Medium of transmission
Routers used in network
All of the above

Frame relay is………………….


Connection oriented service
Connectionless service
It is typically ranges from 5Mbps to 1000Mbps.
None of the above

Which of the following is not a guided medium?


Twisted-pair
cable Fiber-optic
cable Atmosphere
Coaxial cable
Which of the following statement is wrong regarding PVC?
PVC last as long as the customer pay the periodic fee for its use.
Forwarding tables are automatically restored after pow er of equipment failure.
Forwarding table entries for PVC’s are dynamically configured.
All of the above are wrong

Which of the following statement is true regarding ATM?


ATM is a single technology that is designed to meet the goals of both LANs and
WANs.
ATM uses the concept of connection-oriented networking.
Both (a) and (b)
None of the above

Djikstra’s algorithm is used to compute the……………….


shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above

_________ is used to attach two autonomous systems.


Select correct option:

BGP
IGP
EGP
none of the given

Due to revolutionalization of IP-V6 the speed has increased from _______


Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given

Whenever it handles a packet, IP software needs to separate the destination


address into a prefix.
Select correct option:
True
False

TTL stands for __________


Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given

IGPs stand for _________


Select correct option:

Internal Gateway Protocols


Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given

_____________identifies which application program on receiving computer should


receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given

__________________encapsulates IP datagram as data area in hardware frame.


Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given

Class A mask is 255.0.0.0 which is used for ________________


Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
class A mask is 255.0.0.0 which is used for subnetting.

NAT is not useful at a residence with Cable Modem or DSL connectivity.


Select correct option:
True
False
Autonomous System chooses a routing protocol to exchange routing information
which is passed before being summarized to another group.
Select correct option:
True
False

______ layer Provides reliable delivery of datagram.


Select correct option:
Network
Transport
Datalink
none of the given

The process of using a routing table to select a next hop for a given datagram is
called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given

The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False

As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of ________ possible sizes.
Select correct option:
three
two
four
five

End to End delivery Service of IP datagram is _____


Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
EGP stands for _________
Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given

Hashing is the transformation of a string of characters into a usually shorter fixed-


length value or a key that represents the original string.
Select correct option:
True
False

Although the ARP message format is sufficiently general to allow arbitrary protocol
and hardware addresses. ARP is almost always used to bind a 32-bit IP address to
a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit

Reliability is not the responsibility of the Transport layer.


Select correct option:
True
False

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
NAT software does not allow a PC to connect with the Internet and act as a NAT
device at the same time.
Select correct option:
True
False

TCP uses the term segment to refer to a ________.


Select correct option:

packet
message
both (a) and (b)
None of the given
both a and b?

The Universal Datagram Protocol is a message-oriented protocol.


Select correct option:
True
False

______________field tells the receiver how to order fragments within a given


datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given

IP datagram can contains ________ octets.


Select correct option:
0-65,535
1-65,535
1-65,536
none of the given

The amount of buffer space available at any time is called the window.
Select correct option:
True
False 

_______ Source is responsible for fragmentation.


Select correct option:
IPV4
IPV6

Routers use _______ to forward datagrams along prearranged path.


Select correct option:
Traffic class
Flow label
Destination address
none of the given

_______ protocol uses three way handshake to begin a connection.


Select correct option:

UDP
TCP
IP
none of the given
Typical internet routing uses uses a combination of two
metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count 

Question # 14 of 20
Network Address and Port Translation (NAPT) is by far the most popular form of
_______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given 

The routers within an autonomous system use a _____________ to exchange


routing information.
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two
broad classes of Internet Routing Protocol.
Select correct option:
True
False 

The Network Layer Protocol ICMP stands for____________


Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given 

The Current version of IP-Version 4 is _____ old


Select correct option:
18 years
20 years
22 years
none of given

TCP is a connectionless and reliable transport protocol.


Select correct option:
True
False

In Direct point to point communication adding the Nth computer


requires___________ new connections.
N2
N-1
N2 –N)/2
None of the given

Most LANs that employ ring topology use an access mechanism known
as_______
ring topology use token passing for
synchronized access to the ring

Computers attached to an ether use ------ in which a computer waits for the
ether to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given

FDDI can transmits data at a rate of ___________________


100 million bits per second
100 million bits per second
100 million bits per second
None of the given
________________ has advantages arisen from the size and ease of
computation.
CRC
Parity
Checksums
None of given

AUI cable connects from NIC to---------------


Select correct option:
BNC Connector
RJ-45 Connector
Transceiver
None of the above
As a result of ARPA research the first network was established which was named
as Select correct option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWORK

A ---------- provides mechanism that automatically assignes a physical address to a


station when the station first boots. Select correct option:
Static ad Configurable
addressing scheme

polygons are basically concave polygons that may have self-intersecting edges.
Complex
Hybrid
Convex
Convex and Hybrid
Dynamic addressing scheme

An ___________method, the network hardware designers specify how type


information is included in the frame and the value use to identify various frame
Local Talk is a LAN technology that employs
Explicit frame type
Ideal frame type
Implicit frame type
None of the given

In Point-to-Point topology there are two topologies.


Tree and Ring
Star and Ring
Star and Tree
None of the given

The topology each computer is connected to a central hub is called


Select correct option:
Ring topology
Star topology
Tree topology
Mesh topology

The basic responsibility of NIC is ---------------- Select correct option:


To access medium
Network To resource allocation
To access memory
All of above

Currently the original Ethernet hardware operates at a rate of --------


Select correct option:
10 Mbps
100 Mbps
1000 Mbps
3 Mbps

The Gigabit Ethernet hardware operates at a rate of_________


10 Mbps
100 Mbps
1000 Mbps

The number of connections needed for N computer in direct point to point


communication is equal to:
(N2-N)/2
N (N-1)
N2
None of the given

The length of the format of hardware address is


Select correct option:
One to ten bytes
One to five bytes
One to six bytes
None of the given

Star topolgy is the kind of


Tree topology
Point-to-point topolgy
Broadcast topolgy
Ring topology

Local Talk is a LAN technology that employs________


Bus topology
Ring topology
Star topology
None of the given
The network occupies larger areas like cities & countries is called
Select correct option:
LAN
WAN
MAN
All of the above

Computer networks are classified by.......factors


2
3
4
 5

Computers attached to an ethernet use ________in which a computer waits for


the other to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
none of the given

Point-to-point topology is
Size Based
Mobility Based
Connectivity Based
Medium Based

NIC connection in a physical network is known as--------------------


Select correct option:
LAN wiring scheme
WAN wiring scheme
Color wiring
None of above

A_______ relies on the hardware manufacturer to assign a unique physical


address to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given

The main functions of NIC are ---------------------


CRC Error
correction Address
recognition
All of above

FDDI can transmits data at a rate of ___________________


100 million bits per second
100 million bits per second
100 million bits per second
None of the given
Wireless LAN use the -------- as a media access method
Select correct option:
CSMA/CD
CSMA/CA
TOKEN PASSING
CSMA

A_______ relies on the hardware manufacturer to assign a unique physical


address to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given
Wireless LAN use the -------- as a media access method
Select correct option:
CSMA/CD
CSMA/CA
TOKEN PASSING
CSMA

According to their size there are............classifications of networks.


 Select correct option:
2
3
 4
 5

As a result of ARPA research the first network was established which was named
as Select correct option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWOR

---------- performs the matching between destination address and MAC address of
machine.
Select correct option:
Hardware address
LAN interface
DMA
None of above

An ___________method, the network hardware designers specify how type


information is included in the frame and the value use to identify various frame
types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given

The demand of sharing is very high because many computers need to use the
shared networks.
Select correct option:
 WAN networks
 Shared networks
 Unshared networks
 LAN networks

Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given

The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
broadcast network

Thick Ethernet is known as------------------ Select correct option:


10 base 5
10 base T
10 base 100
10 base 1

The first automated tool required to see whether the given computer is online or not
was
Select correct option:
Probing program
PING program
status program
None of the above

The basic responsibility of NIC is ----------------


Select correct option:
To access medium/network
To resource allocation
To access memory
All of above
No error detection scheme is perfect because transmission errors can affect
_________.
Select correct option:
Data
Additional Information
Additional information & data
Transmission medium

-------------- has advantages arisen from the size and ease of computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing

The third field of the header consists of ------ bit Ethernet frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology

Hardware that calculates a CRC uses two simple components.


Select correct option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given

Fixed network is a type of networks which is classified with respect to


the...........factor
Select correct option:
Size
Connectivity
Medium
Mobility

Network interface card acts like a (an) -----------


Select correct option:
Input/output device
Input device
Output device
All of above

IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above

Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING

The Gigabit Ethernet hardware operates at a rate of ________


10 Mbps
100 Mbps
1000 Mbps
None of the given

A network uses ------------ if all computers attach to a central point


Select correct option:
Ring Topology
Star Topology
Hub Topology
Bus Topology

---------- is also called self healing network


Select correct option:
ATM
FDDI
Token Ring
None of the given

---------- which is designed to help detect transmissions errors, send one extra bit of
information with each character.
Select correct option:
Checksum
CRC
Parity
VRC

Hardware addresses must be ---------- on a LAN.


Select correct option:
Common
Unique
A ---------- relies on the hardware manufacturer to assign a unique physical address
to each network interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme
None of the given

The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of
Select correct option:
Broadcast network
Point-to-Point network

1_Which of the following statement is true regarding Link-state routing? 

Network topology is separated from route computation.

Each switch builds its own routing tables.

Link-state routing uses Djikstra’s algorithm.

All of the above = Answer

  
2_Which one of the following is a property of dynamic routing?

Select correct option:

It is inflexible

It has low network overload


It can work around network failure

All of the above

  
3_All destinations on same switch have same

Router

Information

Next hop

None of the above

4_A _____________ address-binding table is used for each physical network.

Select correct option:

 new

 similar

 separate

 old

5_Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of
----------- octets.

55

53

52

51

6_Mapping between a protocol address and a hardware address is called Address


Resolution.

true
false

7_The Internet service providers coordinate with the Internet assigned number
authority to obtain their network numbers.

Select correct option:

True

False

8_Dotted decimal represents each octet in ________ and uses a dot to separate
octets.

binary

decimal   lec25

hexadecimal

Octal 
         

4TH SEMEmaan..! . January 28, 2014 at 11:10am


Mostly Quizz were from here..

Routing table is used to keep the information about…………….

Destination

Medium of transmission

Routers used in network

All of the above


Which of the following statement is true regarding Jitter?

Jitter is used for variance in transmission delays.

Jitter can occur when a packet is delayed.

Jitter is significance for voice, video and data.

All of the above

The maximum cable length of a LAN is _____

Fixed

Unlimited

Fixed and Unlimited in different conditions

None of these

Jitter is significance for ------------------

Voice

Video

Data

All of above

The routing table contains information about the ………………immediately around


it.

topology of the network

destination

both of the above

none of the above

Which of the following is called virtual channel?

Connection in VCI
Connection in ATM

Connection in virtual circuit

None of the above

If a bridge builds up address list for each segment that consists of physical
addresses of the computer attached to that segment. So, when the bridge boots,
the size of list will be__ for each segment.

Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of
----------- octets.

55

53

52

51

Which of the following statement is true regarding ATM?

ATM is a single technology that is designed to meet the goals of both LANs and
WANs.

ATM uses the concept of connection-oriented networking.

Both (a) and (b)

None of the above

Frame forwarding of a bridge is based on _________.


Select correct option:

Layer 3 source address

Layer 3 destination address

Layer 2 destination address

Layer 2 Source address

The process of forwarding the packets of information is called…………….

Routing

Switching

Communication

None of the above

Which one of the following is a property of static routing?

It is inflexible

It is done at boot time

It has low network overload

All of the above

According to a bridges

Performance, if both the sauces and destination are on the same segment

It forward the frame to the other segment

It does not forward the frame to the other segment

It does not forward the frame to the same segment

It forwards the frame to every other segment

What will be the bandwidth rate for future (possibly 10 Gigabyte) Ethernet?

500 MHz
550 MHz

600 MHz

650 MHz

Asynchronous Transfer Mode uses the concept of …………..

Connection-less network

Connection-oriented network

The fiber-modem converts data into _________ then transmits cover the optional
fiber

Pulses of light

Electrons

Electromagnetic signals

None of these

 How many methods exist for computing routing table?

To span long distance or many computers, networks must replace shared medium
with ………..

Segment transformation

Fiber optics

Packet switches

None of the above


Which of the following statement is true regarding Distance-vector routing?

It is very simple to implement.

Packet switch updates own routing table first

It is used in RIP

All of the above

What will be the bandwidth rate for 1000Base-T Gigabyte or ATM?

100 MHz

150 MHz

200 MHz

250 MHz

CBR stands for…………….

Constant Byte Rate

Constant Bit Rate

Connection break Recovery

None of the above

The routing table in interior and exterior switches has which one of the following?

It should have next hop for each possible destination

The next hop in table must be on shortest path to destination

Both (a) and (b)

None of the above

Which one of the following is a method for computing routing table information?

Manual entry
Static routing

Boot time routing

None of the above

Which one of the following is the responsibility of Djikstra’ algorithm?

To compute the shortest path between two nodes

To extract next hop information from path information

To insert next hop information into routing table

All of the above

Routing table is used to keep the information about…………….

Destination

Medium of transmission

Routers used in network

All of the above

Frame relay is………………….

Connection oriented service

Connectionless service

It is typically ranges from 5Mbps to 1000Mbps.

None of the above

Which of the following is not a guided medium?

Twisted-pair

cable Fiber-optic cable

Atmosphere
Coaxial cable

Which of the following statement is wrong regarding PVC?

PVC last as long as the customer pay the periodic fee for its use.

Forwarding tables are automatically restored after power of equipment failure.

Forwarding table entries for PVC’s are dynamically configured.

All of the above are wrong

Which of the following statement is true regarding ATM?

ATM is a single technology that is designed to meet the goals of both LANs and
WANs.

ATM uses the concept of connection-oriented networking.

Both (a) and (b)

None of the above

Djikstra’s algorithm is used to compute the……………….

shortest path between two nodes

number of nodes used in the network

distance between different nodes

none of the above

If a link or a packet switch fails then which one of the following would possibly be
happened?

Link would be reestablished

Request to change failed hardware would appear

The packet switch will modify the tables

None of the above


The routing contains information about immediately around it

Topology of the network

Destination

Both of the above

None of the above

SMDS is ……………………

Connectionless service

Connection oriented service

Used for delivering blocks of data

None of the above

The process of forwarding the packets of information is called

Routing

Switching

Communication

None of the above

The sharing of a medium and its link by two or more devices is called

modulation

encoding

line discipline

multiplexing
Which multiplexing technique transmits analog signals?

FDM

TDM

WDM

(a) and (c)

Which multiplexing technique transmits digital signals?

FDM

TDM

WDM

None of above

Which multiplexing technique shifts each signal to a different carrier frequency?

FDM

TDM

Both (a) and (b)

None of above

In synchronous TDM, for n signal sources of the same data rate, each frame
contains _______ slots.

n+1

N-1

O to n

Which multiplexing technique involves signals composed of light beams?

FDM
TDM

WDM

None of above

_________ Utilization is the use of available bandwidth to achieve specific goals.

Frequency

Bandwidth

Amplitude

None of the above

________ can be achieved by using multiplexing; ______ can be achieved by using


spreading.

Efficiency; privacy and antijamming

Privacy and antijamming; efficiency

Privacy and efficiency; antijamming

Efficiency and antijamming; privacy

________ is the set of techniques that allows the simultaneous transmission of


multiple signals across a single data link.

1; n

1:1

n;1

n;n

The word ______ refers to the portion of a _______ that carries a transmission.

channel; link
link; channel

line; channel

line; link

 ______ can be applied when the bandwidth of a link (in hertz) is greater than the
combined bandwidths of the signals to be transmitted.

TDM

FDM

Both (a) or (b)

Neither (a) or (b)

FSM is an _________technique.

Analog

Digital

Either (a) or b)

None of the above

____ is designed to use the high bandwidth capability of fiber-optic cable.

FDM

TDM

WDM

None of the above

_____ is a digital multiplexing technique for combining several low-rate channels


into one high-rate one.

FDM

TDM
WDM

None of the above

____ is designed to use the high bandwidth capability of fiber-optic cable.

FDM

TDM

WDM

None of the above

______ is an analog multiplexing technique to combine optical signals.

FDM

TDM

WDM

None of the above

_____ is a digital process that allows several connections to share the high
bandwidth of a link.

FDM

TDM

WDM

None of the above

_____ is a digital multiplexing technique for combining several low-rate channels


into one high-rate one.

FDM

TDM

WDM
None of the above

Djikstra’s algorithm is used to compute the……………….


shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above

The routing table in interior and exterior switches has which one of the following?
None of the above

Which one of the following is the responsibility of Djikstra’ algorithm

To compute the shortest path between two nodes

To extract next hop information from path information

To extract next hop information from path information

None of above

What will be the bandwidth rate for short distance 10Base-T

16mhz

20mhz

100mhz

150mhz

What will be the bandwidth rate for older, low-speed network, and analog
telephones

16

20

24
30

How many methods exist for building routing table?

Which of the following statement is wrong regarding ATM?

It is a single technology for voice, video and data

it has low jitter and high capacity.

it uses fixed size, small cells, 48 octet’s data

None of the above

In Asynchronous Transfer Mode VPI/VCI fields indentify the cells

Source

Destination

port@

none

The physical addressing in a WAN is similar as in LAN in the way................

The data is transmitted in packets equivalent to frames.

Each packet has a format with header.

The packet header includes destination and source addresses.

All of the above


In Asynchronous Transfer Mode VPI/VCI fields indentify the cells--------------

Which one of the following is a method for computing routing table information?

Manual entry

Boot time routing

 Static routing

None of the above

All destinations on same switch have same

Router

Information

Next hop

None of the above

Which of the following statement is wrong regarding ATM?

It is a single technology for voice, video and data

It has low jitter and high capacity.

It uses fixed size, small cells, 48 octet’s data

None of the above

Which one of the following is the responsibility of Djikstra’ algorithm?

To compute the shortest path between two nodes

To extract next hop information from path information

To insert next hop information into routing table

All of the above


Which of the following statement is true regarding Link-state routing?

Network topology is separated from route computation.

Each switch builds its own routing tables.

Link-state routing uses Djikstra’s algorithm.

All of the above

Jitter is significance for ------------------

Voice

Video

Data

All of above

The routing table contains information about the ………………immediately around


it.

topology of the network

destination

both of the above

none of the above

Which one of the following is a property of dynamic routing?

Select correct option:

It is inflexible

It has low network overload

It can work around network failure


All of the above

An exterior switch is one with which ………………….

Select correct option:

Computers are attached

No computer is attached

hubs are attached externally

None of the above


         
some ware from here..

CS610 - Computer Network


Quiz #3 JAN 14, 2013

NAT device stores state information in translation table.

Select correct option:

True

 False

A _____________ address-binding table is used for each physical network.

Select correct option:

 new

 similar

 separate

 old

Fragmentation when using ICMP for path MTU should be avoided.

Select correct option:

 True

 False
Static routing

_______ can be used to propagate information about remote networks.

Select correct option:

 Dynamic routing

 Static routing

 Address resolution

 None of the given

TCP stands for _______

Select correct option:

Transport control protocol

Transmission control protocol

The Universal Datagram Protocol is not an end-to-end protocol.

Select correct option:

True

False

For _____________, information about forwarding is stored in a routing table, which


is initialized at system initialization and must be updated as network topology
changes.

Select correct option:

Efficiency

Security

Accuracy

Anomalies
IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.

Select correct option:

 96

 100

 120

 none of the given

_____ Protocol provides error reporting mechanism.

Select correct option:

IGMP

SNMP

ICMP

none of the given

The Universal Datagram Protocol is a message-oriented protocol.  


Select correct option:  

True 
False

destination address into a prefix and suffix  


Select correct option:  
True 
False

which is not the type of error messages defined by ICMP.  


Select correct option:  
Source quench 
Time exceeded 
Destination unreachable 
none of the given
Which protocol is used to test different tools.  
Select correct option:  
ICMP 
IGMP 
TCP/IP 
none of the given

HEADER LEN field gives size of extention header.  


Select correct option:  
False 
True

is a ____ protocol.  
Select correct option:  
Point-to-Point 
Multi-Point 
Both (a) and (b) 
None of the given

CP

NAT device stores state information in translation table.  


Select correct option:  
True 
False

Postfix defines how much of address used to identify network.  


Select correct option:  
True 
False

As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of______ possible sizes.  

Select correct option:  


three 
two 
four 
five
Every hardware technology specification includes the definition of the maximum
size of the frame data area, which is called the __________Transmission Unit.  
Select correct option: 

Least 
Maximum 
Fragment 
Frame

Twice NAT allows a site to run servers.  


Select correct option:  
True 
False

The maximum segment size of TCP flow control is_________  


Select correct option:  

3000 octets 
2000 octets 
1000 octets 
none of the given

In IP routing, forwarding refers to ____ transfer.  


Select correct option:  
packet 
datagram 
message 
None of the given

There are _____ possibilities to detect the destination using Trace-route  


Select correct option:  



None of the given

dynamic routing, the routing table is initialized when system boots.  


Select correct option:  
True 
False

Hashing is the transformation of a string of characters into a usually shorter fixed-


length value or a key that represents the original string.  
Select correct option:  
True 
False

Dotted decimal represents each octet in ______ and uses a dot to separate octets.

Select correct option:  

binary 
decimal 
hexadecimal 
Octal

The amount of buffer space available at any time is called the window.  
Select correct option:  
True 
False

In IPV6 the 128 bit addresses unwidely in dotted decimal;requires ___numbers.  


Select correct option:  
12 
14 
16 
none of the given
______ field is used to identify a specific path through the network  
Select correct option:  
FLOW LABEL 
TRAFFIC CLASS 
Both a and b 
none of the given

IPV6 address consists of ______  


Select correct option:  
32 Bits 
64 Bits 
128 Bits 
none of the given

The IP class scheme does not divide the______ address space into equal size
class and the classes do not contain the same number of networks.  
Select correct option:  
16-bit  
32-bit  
48-bit  
64-bit

A datagram cannot be larger than ______ of a network over which it is sent.  


Select correct option:  
MTU 
Size 
IP header
None of the given

An Internet Address (IP address) is a unique ________ binary number assigned to


a host and used for all communication with host  
Select correct option:  
48-bit 
32-bit 
24-bit 
None of the given

IP datagram can contains ______ octets.  


Select correct option:  
0-65,535 
1-65,535 
1-65,536 
none of the given

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two
broad classes of Internet Routing Protocol.  
Select correct option:  
True 
False

Due to revolutionalization of IP-V6 the speed has increased from_____  


Select correct option:  
56kbps to 512kbps 
512kbps to 1gbps 
56kbps to 1gbps 
none of the given

 _______uses window mechanism to control the flow of data.  


Select correct option:  
IP 
UDP 
TCP 
none of the given

window mechanism

Mapping between a protocol address and a hardware address is called Address


Resolution.  
Select correct option:  
True 
False

UPD is operating system independent.  


Select correct option:  
True 
False
A________ is a special-purpose computer dedicated to the task of interconnecting
networks.  
Select correct option:  
Router 
Bridge 
Switch 
None of the given

Network having short intervals has a large timeout and the network having large
interval has short timeout.  
Select correct option:  
True 
False

_________ places the boundary between the first and second octets  


Select correct option:  
Class A 
Class B 
Class C 
Class D

Whenever it handles a packet, IP software needs to separate the destination


address into a prefix and suffix  
Select correct option:  

True 
False

There are three standard implementations to improve computational efficiency:


Hashing, Direct Indexing and InDirect Indexing  
True 
False

IPV6 128 bits address includes network prefix and ______  


Select correct option:  
Host Suffix 
Host prefix 
Source Prefix 
none of the given
ICMP message transport is acted upon by getting ICMP_______ in IP.  
Select correct option:  
De-encapsulated 
Encapsulated 
Segmented 
none of the given

As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of three possible sizes.

Select correct option:

True

False 

Twice NAT allows a site to run servers.

Select correct option:

True

False
         
Preliminary version of IP was called _________.

Select correct option:

IP - New Generation (IPng)

IP - Next Generation (IPng)

IP - Net Generation (IPng)

None of the given 

As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of two possible sizes.

Select correct option:

True
False 

_________ uses window mechanism to control the flow of data.

Select correct option:

IP

UDP

TCP

none of the given 

The Internet service providers coordinate with the Internet assigned number
authority to obtain their network numbers.

Select correct option:

True

False

Which protocol is used to test different tools.

Select correct option:

ICMP

IGMP

TCP/IP

none of the given

________ identifies the application program that sent the data.

Select correct option:


Destination Port

Source port

Logical address

None of the given

The Source can configure outgoing datagram's to avoid _________

Select correct option:

Segmentation

Defragmentation

Fragmentation

None of the given

The time for acknowledgement to arrive depends on __________

Select correct option:

Distance to destination

Current traffic conditions

Both a and b

none of the given

which is not the type of error messages defined by ICMP.

Select correct option:

Source quench

Time exceeded

Destination unreachable

none of the given 

Preliminary version of IP was called _________.


Select correct option:

IP - New Generation (IPng)

IP - Next Generation (IPng)

IP - Net Generation (IPng)

None of the given

HEADER LEN field gives size of extention header.

Select correct option:

False

True

_______ shows senders preference for low latency, high Reliability.

Select correct option:

TYPE

SERVICE TYPE

SERVICE PRIORITY

None of the given

As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of two possible sizes.

Select correct option:

True

False

________ field of header indicates whether a datagram is a fragment or a complete


datagram.

Select correct option:


FLAGS

FRAGMENT OFFSET

IDENTIFICATIONNo.3

None of the given (not sure) Page 105

In ______________, the protocol address assigned to a computer is chosen


carefully so that computer's hardware address can be computed from the protocol
address using basic Boolean and arithmetic operations.

Select correct option:

Address Resolution

Table Lookup

Message Exchange

Closed-form Computation Page 94

Postfix defines how much of address used to identify network.

Select correct option:

True

False

______________field tells the receiver how to order fragments within a given


datagram.

Select correct option:

FLAGSNo.4

FRAGMENT OFFSET

IDENTIFICATION

None of the given (not sure) Page 105


H.LEN shows the header length in units of ____ Bits

Select correct option:

34

32 Page 105

30

None of the given

In Closed-form computation, the protocol address assigned to a computer is chosen


carefully so

that computer's hardware address can be computed from the protocol address
using basic Boolean and _________ operations.

Select correct option:

arithmetic

XOR

Shift

XNORNo.5

For _____________, information about forwarding is stored in a routing table, which


is initialized atsystem initialization and must be updated as network topology
changes.

Select correct option:

Efficiency

Security

Accuracy

Anomalies
End to End delivery Service of IP datagram is _____

Select correct option:

Connection oriented

Connectionless Page 120

both a and b

none of the given

______ contains all information needed to deliver datagram to the destination.

Select correct option:

Header

Data AreaPage No.6

Identifier

none of the given

IPV6 addresses are _____ bits.

Select correct option:

32

64

128

256

The Header format of IPv6 is entirely different.


Select correct option:
True
False

____ contains all information needed to deliver datagram to the destination.


Select correct option:
Header
Data Area
Identifier
none of the given

Which one of these is not a main feature of connectionless service:


Select correct option:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with
a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames),
without a header.

H.LEN shows the header length in units of __ Bits


Select correct option:
34
32
30
None of the given

____ layer Provides reliable delivery of datagram.


Select correct option:
Network
Transport
Datalink
none of the given

Routers use _______ to forward datagrams along prearranged path.

Select correct option:


Traffic class
Flow label
Destination address
none of the given

______ field is used to identify a specific path through the network


Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given

_____ is a technique used to Limit datagram size to small MTU of any network
Select correct option:
Segmentation
Fragmentation
Encapsulation
none of the given

The Current version of IP-Version 4 is _____ old

Select correct option:


18 years
20 years
22 years
none of given

The protocol address of the next hop must be ___________ to an equivalent


hardware address before a packet can be sent.
Select correct option:
Encrypted
Decrypted
Translated
Non of these

Inside a computer, each address mask is stored as a __-bit value.


Select correct option:
48
64
16
32

_____ Source is responsible for fragmentation.


Select correct option:
IPV4
IPV6

Every hardware technology specification includes the definition of the maximum


size of the frame data area, which is called the __________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame

IP datagram can contains ______ octets.


Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
MTU Stands for _______
Select correct option:
Mininum transmission unit
Maximun transmission unit
Multicast transmission unit
None of the given

As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of ______ possible sizes.

Select correct option:

three

two

four

five

End to End delivery Service of IP datagram is ___

Select correct option:

Connection oriented

Connectionless

Both a and b

None of the given

______________field tells the receiver how to order fragments within a given


datagram.

Select correct option:

FLAGS

FRAGMENT OFFSET

IDENTIFICATION
None of the given

Postfix defines how much of address used to identify network.

Select correct option:

True

False

Every hardware technology specification includes the definition of the maximum


size of the frame data area, which is called the __________ Transmission Unit.

Select correct option:

Least

Maximum

Fragment

Frame
         
A routing table contains_______

Select correct option:

The destination network ID

The hop count to reach the network

The router ID of the next hop

All of the given

NAT device stores state information in translation table.

Select correct option:

True

False

TCP achieves _________ by retransmission.


Select correct option:

Efficiency

Accuracy

Reliability

none of the given

________ identifies the application program that sent the data.

Select correct option:

Destination Port

Source port

Logical address

None of the given

_____ Protocol provides error reporting mechanism.

Select correct option:

IGMP

SNMP

ICMP

none of the given

Routing refers to the _________ of routing information.

Select correct option:

transmission

propagation

communication

None of the given


______ layer Provides reliable delivery of datagram.

Select correct option:

Network

Transport

Datalink

none of the given

End to End delivery Service of IP datagram is _____

Select correct option:

Connection oriented

Connectionless

both a and b

none of the given

TCP is a connectionless and reliable transport protocol.

Select correct option:

True

False

Question No:1 (Marks:1) Vu-Topper


RM
Uses counter rotating rings in which data flows in opposite directions.
A. FDDI Page 31
B. IBM
Question No:2 (Marks:1) Vu-Topper
RM
The Ethernet speed was originally 3Mbps, and the current standard is
……. the fast Ethernet operates at 100Mbps.
A. 10Mbps Page27
B. 20Mbps

Question No:3 (Marks:1) Vu-Topper


RM
Mapping between a protocol address and a hardware address is called
A. Segmentation
B. Hashing
C. Address Resolution Page
93

Question No:4 (Marks:1) Vu-Topper RM


Protocols of TCP/IP layering model specify how to organize data into
frame and how a computer transmits frames over a network.
A. Session
B. Network interface layer
C. Internet Layer

Question No:5 (Marks:1) Vu-Topper RM


In Closed-form computation, the protocol address assigned to a
computer is chosen carefully so that computer's hardware address can be
computed from the
protocol address using basic Boolean and operations.

A. Arithmetic Page 94
B. XOR
C. Shift

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:6 (Marks:1) Vu-Topper RM
As the Internet grew, the original Classful addressing scheme became a
limitation.The IP address space was being exhausted because all
networks had to choose one
of possible sizes.
A. One
B. Two

C. Three Page 90

Question No:7 (Marks:1) Vu-Topper RM


Dotted decimal notation is a syntactic form the IP software uses to
express binaryvalues when interacting with humans.

A. 32-bit Page 87
B. 16-bit
C. 8-bit

Question No:8 (Marks:1) Vu-Topper RM


Protocols of TCP/IP layering model specify how to ensure reliable
transfer.
A. Physical Layer
B. Network Interface Layer

C. Transport Layer

Question No:9 (Marks:1) Vu-Topper RM


In the IP address---identifies an individual computer on the network.
A. Prefix

B. Suffix
C. Mux
Question No:10 (Marks:1) Vu-Topper
RM
Internet protocol (IP) address version 4 is comprised of --- bits.
A. 48

B. 32
C. 24
Question No:11 (Marks:1) Vu-Topper
RM
A separate table is used for each physical network.bit-binding
A. Checksum

B. Address-binding

Question No:12 (Marks:1) Vu-Topper RM


Inside a computer, each address mask is stored as a --- value.

A.32 Page 91
B. 48
C. 36

Question No:13 (Marks:1) Vu-Topper RM


Dotted decimal represents each octet in -----and uses a dot to separate
octets.

A. Decimal Page 87
B. Octal

Question No:14 (Marks:1) Vu-Topper RM


TCP/IP Protocol Suit specifies the format of packets sent across Internet
aswell as the mechanisms used to
A. Physical Layer
B. Data Link Layer

C. Internet Layer

Question No:15 (Marks:1) Vu-Topper RM


The IP class scheme does not divide the address space into equal
size class and the classes do not contain the same number of networks.
A. 32-bit Page 88
B. 16-bit
C. 8-bit

Question No:16 (Marks:1) Vu-Topper RM


TCP/IP protocol suit defines the basic characteristics of network
hardware.

A. Physical Layer
B. Data Link Layer
C. Internet Layer

Question No:17 (Marks:1) Vu-Topper RM


The protocol address of the next hop must be------to an equivalent
hardware address before a packet can be sent.
A. Encrypted
B. Decrypted
C. Translated Page 93

Question No:18 (Marks:1) Vu-Topper RM


Address Resolution Protocol is mostly used to bind a 32-bit IP address
to an _ Ethernet address.
A. 16-bit

B. 48-bit
C. 64-bit

Question No:19 (Marks:1) Vu-Topper RM


TCP/IP defines the term to refer any computer system that connects to
a network and runs applications for users.
A. Router
B. Host computer Google
C. Bridge

Question No:20 (Marks:1) Vu-Topper RM


There are two standard implementations to improve computational
efficiency:

A. Hashing and Direct


indexing Page 94
B. Segmentation and Fragmentation
C. Queuing and Packetizing

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:21 (Marks:1) Vu-Topper RM
In the IP addressidentifies the physical network to which the computer
is attached.

A. PREFIX Page 85
B. SUFFIX
C. Mux

Question No:22 (Marks:1) Vu-Topper


RM
In Cyclic Redundancy Checking, CRC is .
A. Divisor
B. Quotient
C. Remainder Page 20
D. Dividend

Question No:23 (Marks:1) Vu-Topper RM


The satellite or radio topology in which all computers are connected to
each other via satellite or radio wave is a kind of

A. Broadcast network Page


5
B. Point-to-Point network
C. Many-to-One network
D. Face-to- Face network

Question No:24 (Marks:1) Vu-Topper


RM
Which of the following two operations are performed by Ethernet CD?
I. It monitors outgoing signals.
II. Grabbled signal is interpreted as a collision.
III. Signals are sent back to the sender.
A. I and III
B. II and IV
C. II and III
D. I and II Page 28

Question No:25 (Marks:1) Vu-Topper RM


The process of forwarding a packet is called .

A. Routing Page 58
B. Processing
C. Hierarchical Addressing
D. Source Addressing

Question No:26 (Marks:1) Vu-Topper


RM
Which statement is correct about Network Interface Card (NIC)?
I. NIC contains sufficient hardware to process data independent
of system CPU
II. NIC looks like any other I/O device to system CPU
III. NIC also receives interrupt on incoming data.
A. I and II
B. II and III
C. I and III

D. All Page 40

Question No:27 (Marks:1) Vu-Topper RM


While transmitting data from source A to destination B, 4 bits are
changed during the transmission then the error is a .

A. Burst error Page 22


B. Single error
C. Double error
D. Logic error

Question No:28 (Marks:1) Vu-Topper


RM
The switch that has no attached computers is called .
A. Packet Switch
B. Exterior Switch
C. Interior Switch Page 59
D. External Switch

Question No:29 (Marks:1) Vu-Topper


RM
is the most popular wiring scheme because of lowest cost.
A. 5 Base T
B. 10 Base T Page 43
C. 100 base T
D. 1000 base T

Question No:30 (Marks:1) Vu-Topper RM


In technique, all members of the network can send data
only on the specific time slot?
A. CDMA
B. FDMA

C. CSMA Page 43
D. TDMA

Question No:31 (Marks:1) Vu-Topper RM


If a sender with a 100 Megabit NIC and receiver with 10 Megabit NIC
wants to communicate with each other at which speed they can
communicate?
A. 110 Megabit
B. 1000 Megabit
C. 10 Megabit

D. 100 Megabit Page 40

Question No:32 (Marks:1) Vu-Topper RM


Missing in a frame format indicates receiving computer missed
beginning of the message.
A. eot
B. sot
C. eoh

D. soh Page 16

Question No:33 (Marks:1) Vu-Topper RM


The of errors is easier than the of errors.
A. Correction; detection
B. Correction; creation
C. Detection; manipulation

D. Detection; correction
Google

For More Help Vu Topper RM Contact What’s app 0322-4021365


Question No:34 (Marks:1) Vu-Topper
RM
The of errors is difficult than the of errors.
A. Detection; correction
B. Correction; creation
C. Detection; manipulation

D. Correction; detection
Google

Question No:35 (Marks:1) Vu-Topper RM


Source Independence phenomenon allows fast and efficient _ .
A. Source Addressing
B. Routing

C. Packet Switching Page


58
D. Store and forward

Question No:36 (Marks:1) Vu-Topper RM


In distributed route computation process each packet switch computes
its routing table locally and sends messages to the .
A. Router
B. Graph

C. Neighbors Page 63
D. WAN

Question No:37 (Marks:1) Vu-Topper RM


The layer of the OSI model takes the data from the physical layer
and perform error checking.
A. Transport
B. Data link Google
C. Application
D. Presentation

Question No:38 (Marks:1) Vu-Topper RM


CBR stands for .
A. Constant Byte Rate
B. Constant Bit Rate Page 71
C. Connection break Recovery
D. Constant Borrow Rate

Question No:39 (Marks:1) Vu-Topper


RM
VBR stands for .
A. Variable Byte Rate

B. Variable Bit Rate Page 71


C. Variable break Recovery
D. Variable borrow Rate

Question No:40 (Marks:1) Vu-Topper


RM
ABR stands for .
A. Available Byte Rate

B. Available Bit Rate Page 71


C. Available break Recovery
D. Available Borrow Rate

Question No:41 (Marks:1) Vu-Topper RM


A network that uses usually consist of a single long cable to
which computer attach.
A. Star Topology
B. Ring Topology

C. Bus Topology Page 26


D. Bus and Ring Topology

Question No:42 (Marks:1) Vu-Topper RM


If simultaneous transmission occurs, the frames interfere with each
other and this phenomenon is called .
A. packet loss

B. collision Page 28
C. delayed transmission
D. coordination

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:43 (Marks:1) Vu-Topper RM
In all computers are attached to a central hub
A. Ring topology

B. Star topologyPage 31
C. Hub topology
D. Bus topology

Question No:44 (Marks:1) Vu-Topper RM


For adding a new computer in a point-to-point network new
connection will be required
A. N

B. N-1Page 23
C. N-2
D. 2N

Question No:45 (Marks:1) Vu-Topper


RM
The fastest Ethernet hardware operates at a rate of
A. 1000 bps

B. 100 Mbps Page 27


C. 10 Mbps
D. 1000 Mbps

Question No:46 (Marks:1) Vu-Topper


RM
Which of the following the benefit to point to point communication?
A. Quick to configure
B. Security
implementation Page 23
C. Cost
D. Less availability

Question No:47 (Marks:1) Vu-Topper


RM
ATM offers speed and delay
A. High, High
B. High, low Page 72
C. Low, low
D. Low, high

Question No:48 (Marks:1) Vu-Topper


RM
Thick Ethernet is known as
A. 10 Base 2
B. 10 Base 5 Google
C. 10 Base T
D. 10 Base 10

Question No:49 (Marks:1) Vu-Topper RM


Both interior and exterior switches packet and they also need
routing tables.
A. Create
B. Delay

C. Forward Page 59
D. Start

Question No:50 (Marks:1) Vu-Topper


RM
is the rate at which data can be sent through the network

A. Throughput Page 79
B. Propagation delay
C. Access delay
D. Switching delay

Question No:51 (Marks:1) Vu-Topper


RM
In a ping command, small –sized information packets of are sent.
A. TCP
B. UDP

C. ICMP Page 11
D. IGMP

Question No:52 (Marks:1) Vu-Topper


RM
Many WANs use addressing of efficiency
A. Sequence
B. Forward
C. Hierarchical Page 56
D. Sequential

Question No:53 (Marks:1) Vu-Topper


RM
Which of the following is not a function of ping commends?
A. Local computer network issue
B. Congestion in the network

C. Relay nodes Page 11


D. Remote host availability

Question No:54 (Marks:1) Vu-Topper


RM
Packet switched can be linked together to form a
A. LAN

B. WAN Page 56
C. Bridge
D. None

Question No:55 (Marks:1) Vu-Topper RM


Fixed network is a type of network which is classified with repect to the
factor
A. Size
B. Connectivity
C. Medium

D. Mobility Page 6

Question No:56 (Marks:1) Vu-Topper RM


Parity bit can detect error(s)
A. 4
B. 3

C. 2 Page 19
D. 1

Question No:57 (Marks:1) Vu-Topper RM


When we will try to connect to the internet which of the following
protocol will be used?
A. Telnet

B. TCP/IP Page 84
C. ICMP
D. IPx

Question No:58 (Marks:1) Vu-Topper


RM
How many computers are mandatory to form a network?
A. 1
B. 2 Google
C. 4
D. 8

Question No:59 (Marks:1) Vu-Topper


RM
is standard wireless LAN that uses radio signals at 2.4GHz.
A. IEEE 803.16
B. IEEE 802.15
C. IEEE 802.3

D. IEEE 802.11 Page 29

Question No:60 (Marks:1) Vu-Topper RM


LAN interface hardware obeys access rule.
A. CSMA/CD Page 34
B. Round robin
C. First come first served
D. High priority
Question No:61 (Marks:1) Vu-Topper
RM
The most important task a bridge performs is .
A. Packet switching
B. Line controlling
C. Noise controlling

D. Frame filtering Page 50

For More Help Vu Topper RM Contact What’s app 0322-4021365


Question No:62 (Marks:1) Vu-Topper
RM
ATM uses small, fixed-sized packets called cells and each cell has
octets.
A. 47
B. 52
C. 53 Page 66
D. 55

Question No:63 (Marks:1) Vu-Topper


RM
can’t be guaranteed with variable length packets as easily
as it can with fixed length cells.
A. Errors
B. Noise
C. Quality of Service

D. None of the given Page 72

Question No:64 (Marks:1) Vu-Topper RM


Which multiplexing technique transmits digital signals?
A. WDM
B. FDM

C. TDM Page 15
D. GSM

Question No:65 (Marks:1) Vu-Topper


RM
Connections in Asynchronous transfer mode are called _ .

A. Virtual channels Page 67


B. Virtual Path Identifier
C. Cells
D. Cell tax

Question No:66 (Marks:1) Vu-Topper RM


A is a device that combines multiple signals and forwards into
a single line.
A. Modem

B. Multiplexer Page 41
C. Repeater
D. Layer 3 Switch

Question No:67 (Marks:1) Vu-Topper RM


is inflexible.
A. Routing
B. Searching
C. Processing
D. Static routing Page 62

Question No:68 (Marks:1) Vu-Topper RM


If a hub is used to connect many computers in a LAN, then only
computers can communicate at a given time.
A. Three

B. Two Page 54
C. Four
D. One

Question No:69 (Marks:1) Vu-Topper


RM
is the term used for variance in transmission delays.
A. Friction
B. Segment
C. Checksum

D. Jitter Page 66

Question No:70 (Marks:1) Vu-Topper RM


is also called self healing network.
A. ATM
B. FDDI
C. Token Ring
D. Frame relay Page 46

Question No:71 (Marks:1) Vu-Topper RM


and are the two frame types.
A. Internal and external
B. Single and dual
C. Implicit and explicit
D. Multicast and broadcast Page 35

Question No:72 (Marks:1) Vu-Topper RM


Bluetooth uses shared medium and instead of coaxial cable.

A. Radio waves Page 29


B. Infrared waves
C. Micro waves
D. Low frequency waves

Question No:73 (Marks:1) Vu-Topper


RM
A. Which of the following is not a guided medium?
B. Twisted pair cable
C. Fiber-optic cable
D. Atmosphere Google
E. Coaxial cable

Question No:74 (Marks:1) Vu-Topper RM


As a result of ARPA research, the first network was established which
was named as .
A. INTERNETWORKING
B. ARPNET

C. ARPANET Page 9
D. PACKET NETWORK
Question No:75 (Marks:1) Vu-Topper
RM
Asynchronous transfer mode (ATM) can dynamically establish a .

A. Switched virtual circuit Page 70


B. Virtual connection identifier
C. Virtual path indicator
D. None of the given options

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:76 (Marks:1) Vu-Topper RM
A typical port on an ATM switch operates at or higher.
A. OC-2 speed (155Gbps)
B. OC-2 speed (1000Mbps)
C. OC-3 speed (155Mbps) Page 72
D. OC-3 speed (100Gbps)

Question No:77 (Marks:1) Vu-Topper


RM
10Base-T Ethernet is often called a _ .
A. ring shaped star
B. ring shaped bus

C. star shaped bus Page 46


D. star shaped ring

Question No:78 (Marks:1) Vu-Topper


RM
allows automatic updates.

A. Dynamic routing Page 62


B. Static routing
C. Routing
D. Default routing

Question No:79 (Marks:1) Vu-Topper


RM
Handling variable length packets leads to memory .
A. Fragmentation Page 72
B. Management
C. Location
D. Allocation

Question No:80 (Marks:1) Vu-Topper


RM
In order to forward a copy of frame, the bridge uses address.
A. Network

B. Destination Page 51
C. IP
D. Source
Question No:81 (Marks:1) Vu-Topper
RM
We may use to extend local area network.
A. Bridge, Router
B. Bridge, Hub, Router
C. Bridge, Hub, Repeater Page 149
D. Bridge, Hub, Repeater, Router

Question No:82 (Marks:1) Vu-Topper


RM
All of the given options are the types of delay except .
A. Propagation
B. Access

C. Throughput Page 79
D. Queuing

Question No:83 (Marks:1) Vu-Topper RM


While computing shortest path in a graph, next hop information is
inserted into .

A. Routing tablePage 62
B. Trailer
C. Header
D. Register

Question No:84 (Marks:1) Vu-Topper RM


LAN interface uses to copy frame data directly from main
memory

A. DMA Page 34
B. FDDI
C. Hard disk
D. Flash

Question No:85 (Marks:1) Vu-Topper


RM
The Gigabit Ethernet hardware operates at a rate of .
A. 10 Mbps
B. 100 Mbps
C. 1000 Mbps Page 263
D. 1000 Gbps

Question No:86 (Marks:1) Vu-Topper RM


In the early resource sharing era, which resources were shared among
users?
A. Computation Page 9
B. Floppy Drives
C. Hard Disk
D. Printers

Question No:87 (Marks:1) Vu-Topper RM


If two buildings are located far from each other then bridge, and
can be used to connect two LAN.

A. Optical fiber Page 51


B. Ethernet modem
C. Switch
D. NIC

Question No:88 (Marks:1) Vu-Topper RM


Which type of network consists of wireless connection of laptops in a
university classroom?
A. WAN
B. MAN
C. Fog

D. LAN Google

Question No:89 (Marks:1) Vu-Topper RM


A typical bridge has .
A. One NIC, a CPU a memory and a ROM.
B. Two NICs, a CPU a memory and a ROM.
Page 50
C. RAM, ROM and CPU.
D. A cache memory, ROM and CPU.

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:90 (Marks:1) Vu-Topper RM
is used for compressed audio and video, where the data rate
depends on the level of compression that can be achieved.
A. Constant Bit Rate
B. Stable Bit Rate
C. Variable Bit Rate Page 71
D. Available Bit Rate

Question No:91 (Marks:1) Vu-Topper


RM
There are types of data stuffing.
A. 1
B. 2 Page 17
C. 0
D. 5

Question No:92 (Marks:1) Vu-Topper


RM
Dijkstra’s algorithm can accommodate weights on in graph.

A. Nodes Page 62
B. Edges
C. Path
D. Connections

Question No:93 (Marks:1) Vu-Topper


RM
masks your IP address.
A. Firewall
B. Antivirus

C. VPN Conceptual
D. Incognito mode

Question No:94 (Marks:1) Vu-Topper


RM
Static routing computes routing table information at time.
A. Load

B. Boot Page 62
C. Execute
D. One
Question No:95 (Marks:1) Vu-Topper
RM
was the first automated tool required to see whether
the given computer is online or not.
A. Probing program
B. PING program
C. status program

D. None Page 11

Question No:96 (Marks:1) Vu-Topper RM


In which type of error detection, the arithmetic sum is calculated
before and after the transmission of data at both communication ends?
A. CRC
B. Party

C. Checksum Page 19
D. Hash Function

Question No:97 (Marks:1) Vu-Topper RM


Computer sends a connection request to the to which it is
attached while establishing a switched virtual circuit
A. Bridge

B. Switch Page 70
C. VPI
D. Virtual circuit

Question No:98 (Marks:1) Vu-Topper


RM
The bridges communicate with each other on the network and use
algorithm to decide which bridge will not forward frames if a
cycle occurs.
A. Djikstra
B. Shortest path first
C. Vector distance

D. Distributed Spanning Tree Page 53

For More Help Vu Topper RM Contact What’s app 0322-4021365


Question No:99 (Marks:1) Vu-Topper RM
Ethernet uses a bit static addressing scheme in which each
device is assigned a unique address by the manufacturer.
A. 64

B. 48 Page 109
C. 32
D. 16

Question No:100 (Marks:1) Vu-Topper


RM
Weights on graph edges reflect cost of .
A. Nodes
B. Traversing edge Page 63
C. Trending edge
D. Path

Question No:101 (Marks:1) Vu-Topper RM


A relies on the hardware manufacturer to assign a unique
physical address to each network interface.

A. Static addressing scheme Page 34


B. Configurable addressing scheme
C. Dynamic addressing scheme
D. None of the given

Question No:102 (Marks:1) Vu-Topper RM


In topology, if the switch goes down all the computers will be
disconnected.

A. Star Google
B. Ring
C. Bus
D. Mesh

Question No:103 (Marks:1) Vu-Topper RM


Which type of network consists of wired computers in a university
classroom?
A. MAN
B. PAN
C. WAN
D. LAN Google

Question No:104 (Marks:1) Vu-Topper RM


If you as a network administrator want to know the traffic flow of your
data while communicating with a remote computer which of the
following will be used to know about intermediate routers?
A. Ipconfig

B. Ping Page 11
C. Traceroute
D. Arp

Question No:105 (Marks:1) Vu-Topper


RM
Hardware address is also called .
A. Physical address Google
B. Logical address
C. IP address
D. Port address

Question No:106 (Marks:1) Vu-Topper


RM
Thick Ethernet also requires to avoid signal reflectance.
A. Transceivers
B. AUI cable
C. Drop cable

D. Terminators Page 41
Question No:107 (Marks:1) Vu-Topper RM
Which of the following network is using the TCP/IP model globally?
A. PAN
B. SAN
C. LAN

D. The InternetGoogle

For More Help Vu Topper RM Contact What’s app 0322-4021365


Question No:108 (Marks:1) Vu-Topper
RM
VPNs connections are sometimes called .
A. Tunnels Page 75
B. Open networking
C. Routing
D. Public network

Question No:109 (Marks:1) Vu-Topper RM


To reduce computers can be connected and distributed to a
number of hubs, then the hubs can be connected to a switch.

A. Costs Page 54
B. Quality
C. Efficiency
D. Noise

Question No:110 (Marks:1) Vu-Topper RM


If a is used the communication between two computers
will not affect the other pair of computers and they can communicate
at the same time
A. Hub

B. Switch Page 54
C. Repeater
D. Amplifier

Question No:111 (Marks:1) Vu-Topper


RM
The length of hardware address is .
A. One to ten bytes
B. One to five bytes

C. One to six bytes Page 34


D. One to seven bytes

Question No:112 (Marks:1) Vu-Topper


RM
A network analyzer is also called .
A. Network manager
B. Network administrator
C. Network monitor Page 37
D. Network

Question No:113(Marks:1) Vu-Topper RM No any error detection


scheme is perfect because transmission errors can affect .
A. Data
B. Additional Information
C. Additional information & dataGoogle
D. Transmission medium

Question No:114 (Marks:1) Vu-Topper


RM
The token ring network topology is a ring but wiring topology is a .

A. Star Page 44
B. bus
C. tree
D. mesh

Question No:115 (Marks:1) Vu-Topper


RM
addresses are used in an ethernet frame.

A. IP Page 99
B. Port
C. Logical
D. МАС
Question No:116 (Marks:1) Vu-Topper
RM
AUI cable connects from NIC to .
A. BNC Connector
B. RJ-45 Connector

C. Transceiver Page 41
D. Terminator

Question No:117 (Marks:1) Vu-Topper


RM
Public networks are .
A. More secure than LAN
B. Flexible Page 74
C. Limited in boundary
D. Intranet

Question No:118 (Marks:1) Vu-Topper


RM
The maximum cable length of a LAN is fixed because _ .
A. Additional hardware are not suitable for the LAN extension.

B. The electrical signal level gets weaker as it


travels. Page
48
C. Additional software are not suitable for the LAN extension
D. The electrical signal level gets stronger as it travels.

Question No:119 (Marks:1) Vu-Topper


RM
In network topology is separated from route computation.
A. Local area

B. Link-state routing Page 64


C. Static routing
D. Dynamic routing

Question No:120 (Marks:1) Vu-Topper RM


Which layer of the OSI Model directly communicates and controls the
transmission medium:
A. Transmission

B. Physical Google
C. Application
D. Network

Question No:121 (Marks:1) Vu-Topper RM


In technique data is treated as a sequence of integers and
their arithmetic sum is computed and the carry bits are added to the
final sum.
A. CRC
B. Bit stuffing

C. Checksum Page 19
D. 2D Parity

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:122 (Marks:1) Vu-Topper RM
A network with jitter takes more time to deliver some packets
than others.
A. Zero

B. High Page 80
C. Low
D. Moderate

Question No:123 (Marks:1) Vu-Topper


RM
A network uses to arrange computers in a single closed loop.
A. Star Topology
B. Mesh Topology

C. Ring Topology Page 25


D. Bus Topology

Question No:124 (Marks:1) Vu-Topper RM


Which of the following tasks is not done by the second layer of the OSI
model?
A. Flow control
B. Framing

C. Channel coding Google


D. Error control

Question No:125 (Marks:1) Vu-Topper


RM
ATM is a single technology designed to meet the goals of both
and .
A. LAN & PAN
B. LAN & WAN Page 66
C. LAN & MAN
D. MAN & WAN

Question No:126 (Marks:1) Vu-Topper


RM
LAN and WAN are classified according to their .
A. Size Page 4
B. Connectivity
C. Medium
D. Mobility

Question No:127 (Marks:1) Vu-Topper RM


The identifier that is used for data transfer in the virtual circuit network
is called .

A. Virtual circuit identifier Google


B. Global address
C. Network identifier
D. IP identifier

Question No:128 (Marks:1) Vu-Topper RM


In Direct point to point communication adding the Nth computer
requires new connections
A. N^2
B. N-1

C. (N^2 -N)/2 Page 23


D. N (N-1)

Question No:129 (Marks:1) Vu-Topper


RM
Which of the following is the correct function of bridge?
A. MTU path discovery
B. Byte stuffing
C. Routing information
D. Filtering and forwarding a frame Page 50

Question No:130 (Marks:1) Vu-Topper RM


Point to point topology is-------------------
A. Size based
B. Mobility based
C. Connectivity based Page 5
D. Medium based

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:131 (Marks:1) Vu-Topper RM
IEEE LLC / SNAP header is which is used to specify the type of date.
A. 8 octets Google
B. 16 octets
C. 32 octets
D. 64octets

Question No:132 (Marks:1) Vu-Topper RM


IEEE LLC / SNAP header is which is used to specify the type
of date.
A. CRC
B. Bit stuffing

C. Checksum Google
D. 2D Parity

Question No:133 (Marks:1) Vu-Topper


RM
What is the largest network in existence?

A. The internet Google


B. A PAN
C. A Fog
D. Edge Network

Question No:134 (Marks:1) Vu-Topper


RM
The frame format of any LAN technology must consist of and -
A. Payload and CRC
B. Frame header and CRC
C. Payload and Frame type
D. Frame header and payload Page 36

Question No:135 (Marks:1) Vu-Topper RM


can occur a LANs when a packet is delayed because the
network is busy

A. Jitter Page 66
B. Loop
C. Deadlock
D. Variance

Question No:136 (Marks:1) Vu-Topper


RM
Which of the following cannot be used to extend a LAN?
A. Repeaters
B. Switches
C. Routers

D. Fiber modems Google

Question No:137 (Marks:1) Vu-Topper RM


Links-state algorithm is used in
A. RIP
B. IGRP
C. RIPv2

D. OSPF Page 64

Question No:138 (Marks:1) Vu-Topper RM


According to size, there are classifications of networks
A. 2 Page 2
B. 3
C. 4
D. 5

Question No:139 (Marks:1) Vu-Topper


RM
In which topology terminators are used at the end of the cable?
A. Star
B. Bus Google
C. Ring
D. Mesh

Question No:140 (Marks:1) Vu-Topper


RM
Switch simulates a LAN connecting segments
A. Single
B. Single shared

C. Bridged Page 54
D. Complex

Question No:141 (Marks:1) Vu-Topper


RM
PVS stands for

A. Permanent virtual circuit Page 69


B. Private virtual circuit
C. Public virtual circuit
D. Plastic virtual circuit

Question No:142 (Marks:1) Vu-Topper


RM
Hardware that calculates a CRC used two simple components
A. AND unit and XOR Unit

B. Shift register and XOR unit Page 20


C. Shift register & AND unit
D. Shift register and Shift XCR unit

Question No:143 (Marks:1) Vu-Topper


RM
Thin ethernet is known as
A. 10 base 2 Google
B. 10 base 5
C. 10 base T
D. All
Question No:144 (Marks:1) Vu-Topper RM
If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC
wants to communicate with each other than at which speed they can
communicate
A. 11 Megabit

B. 100 Megabit Google


C. 1 Gigabit
D. Gigabit

Question No:145 (Marks:1) Vu-Topper


RM
is used as an alternative of packet for a specific computer
network technology
A. Datum
B. Token
C. Ether

D. Frame Page 14

Question No:146 (Marks:1) Vu-Topper RM


The sharing of a medium and its link by two or more devices is called _
A. Modulation
B. Encoding

C. Multiplexing Google
D. Line discipline

Question No:147 (Marks:1) Vu-Topper


RM
The topology each computer is connected to a central hub is called
A. Ring topology
B. Star topology Page 5
C. Tree topology
D. Mesh topology

Question No:148 (Marks:1) Vu-Topper RM


Asynchronous transfer mode (ATM) is designed to work on fiber but
can be used with
A. Wireless

B. Twisted pair Page 72


C. Wifi
D. Bluetooth
Question No:149 (Marks:1) Vu-Topper
RM
The basic responsibility of NIC is

A. To access medium network Google


B. To resource allocation
C. To access memory
D. All of the given option

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:150 (Marks:1) Vu-Topper RM
Frame relay is
A. Connection oriented service Page 64
B. Connectionless service
C. Typically ranges for 5 Mbps to 1000Mbps
D. Call based

Question No:151 (Marks:1) Vu-Topper


RM
The length of time required to send a variable length packet is
A. 5 second

B. Variable Page 72
C. Constant
D. Fix

Question No:152 (Marks:1) Vu-Topper


RM
In Token Ring, if all computers are ready to transmit it enforces _Access
A. First come first served

B. Round Robin Page 30


C. Shorter delay
D. Last come first served

Question No:153 (Marks:1) Vu-Topper


RM
The Ethernet standard specifies that frames are sent using the scheme.
A. Differential Manchester
B. Not Return to Zero (NR2)

C. Manchester Encoding Page 27


D. Return to Zero (RZ)

Question No:154 (Marks:1) Vu-Topper


RM
ATM uses the concept of .
A. Connection-oriented Page 66
B. Connection-less
C. Variable packet size
D. Fixed and variable packet size
Question No:155 (Marks:1) Vu-Topper
RM
Which of the following is a benefit of point to point communication?
A. Quick to configure

B. Security implementation Google


C. Cost
D. Less availability

Question No:156 (Marks:1) Vu-Topper


RM
is not used to extend LAN.
A. Hub

B. Fiber modem Google


C. Repeater
D. Bridge

Question No:157 (Marks:1) Vu-Topper RM


Which types of VPNs are used for corporate connectivity across
companies residing in different geographical locations?
A. Remote access VPNs
B. Peer-to-peer VPNs
C. Country-to-country VPNs

D. Site-to-site VPNs Google

Question No:158 (Marks:1) Vu-Topper RM


Star topology is the kind of
A. Tree topology
B. Point-to-point topology Page 5
C. Broadcast topology
D. Ring topology

Question No:159(Marks:1) Vu-Topper RM In a state, a bridge


allows simultaneous use of each segment.
A. Ready
B. Steady Page 51
C. Final
D. Startup

Question No:160 (Marks:1) Vu-Topper


RM
The network occupies larger areas like cities & countries is called
A. LAN
B. WAN Google
C. MAN
D. All of the above

Question No:161 (Marks:1) Vu-Topper RM


In link state routing send link-state information about local
connections.
A. Bridge

B. Switches Page 64
C. Routers
D. Hubs

Question No:162 (Marks:1) Vu-Topper


RM
Transmission media are usually categorized as .

A. Guided or unguidedGoogle
B. Fixed or unfixed
C. Determinate or indeterminate
D. Metallic or non-metallic

Question No:163 (Marks:1) Vu-Topper


RM
Even parity can be used to check for bit/ bits of errors.

A. Page 18
B. 2
C. 3
D. 0

Question No:164 (Marks:1) Vu-Topper


RM
Routing table entries can be with a default route.
A. Collapsed Page 60
B. Redirected
C. Emerged
D. Guaranteed

Question No:165 (Marks:1) Vu-Topper


RM
The system administrator must coordinate to avoid the
conflict in hardware addressing scheme.
A. Static
B. Dynamic
C. Configurable Google
D. Fixed

Question No:166 (Marks:1) Vu-Topper


RM
network does not depend on CSMA/CD.

A. Ethernet Google
B. Fast Ethernet
C. Gigabit Ethernet
D. Wireless

Question No:167 (Marks:1) Vu-Topper RM


Which of the following technologies can extend the diameter of LAN
medium?
A. Fiber optic
B. Repeater
C. Diameter of LAN medium is not extendable
D. Both. Fiber optic and Repeaters Google

Question No:168 (Marks:1) Vu-Topper RM


Connections are formed in Asynchronous transfer mode by starting
values in in ATM switches, as opposed to making actual
electrical connections.
A. Heap
B. Stack
C. Virtual Circuit
D. Memory locations Page 67
Question No:169 (Marks:1) Vu-Topper RM
The scheme must be reliable to prevent conflicts.
A. Static

B. Dynamic Page 34
C. Configurable
D. Fixed

Question No:170 (Marks:1) Vu-Topper


RM
Metropolitan area network is used for .

A. City Page 55
B. Building
C. Country
D. Continent

Question No:171 (Marks:1) Vu-Topper


RM
Which addressing can be only used in the local area networks?

A. IP Google
B. Physical
C. Port
D. Protocol

Question No:172 (Marks:1) Vu-Topper RM


The sharing of a _ among the workers in an office is a goal of
resource sharing.
A. Mouse

B. Printer Page 9
C. Keyboard
D. Motherboard

Question No:173 (Marks:1) Vu-Topper


RM
ATM uses fixed size, small cells, 48 octet’s data and .
A. Octets header

B. 5 Octets header Page 65


C. 6 Octets header
D. 7 Octets header
Question No:174 (Marks:1) Vu-Topper
RM
Which of the followings is not an advantage of framing?
A. Missing not indicates sending computer crashed.
B. Missing soh indicates receiving computer missed beginning
of message.

C. Delimiters do not contain any user data


Page 16
D. Bad frame is discarded.

Question No:175 (Marks:1) Vu-Topper RM


The field of Ethernet frame has the purpose of receiver
synchronization.

A. Preamble Page 36
B. Frame Type
C. Data
D. CRC

Question No:176 (Marks:1) Vu-Topper


RM
was the first internet available for the first time.
A. ARPANAT
B. The ARPNET
C. The NET
D. ARPANET Page 9

Question No:177 (Marks:1) Vu-Topper RM


We need packets rather than bits because
A. To compress the data
B. Packets move faster
C. Sender and receiver need to coordinate
to detect transmission errors. Page 14
D. Packets can only move between two terminals

Question No:178 (Marks:1) Vu-Topper RM


When an application any data, it makes a copy of the data
available to all other computers on the network.

A. Multicast Page 143


B. Broadcast
C. Anycast
D. Unicast

Question No:179 (Marks:1) Vu-Topper RM


Each computer in LAN is identified by a physical address, usually
imprinted on the .

A. Network interface card (NIC) Google


B. Modem
C. Router
D. Switch

Question No:180 (Marks:1) Vu-Topper


RM
-------is a hardware device also used to connect two LAN segments to
extend a LAN. Unlike a repeater, a bridge uses two NICs to connect two
segments.

A. A BRIDGES Page 50
B. FRAME FILTERING
C. REPEATERS
D. LAN EXTENSIONS

Question No:181 (Marks:1) Vu-Topper RM


The fiber-modem coverts digital data into then transmits over
the optical fiber.

A. Pulses of light Page 48


B. Kilometers
C. Bandwidth
D. Electrical signal
Question No:182 (Marks:1) Vu-Topper
RM
The switch that has computers attached with it, is called switch.

A. Exterior Page 59
B. Interior
C. Packet
D. Front
Question No:183 (Marks:1) Vu-Topper
RM
standard includes logical link control (LLC) sub
network attachment point (SNAP) header.

A. IEEE 802.2 Page 37


B. IEEE 804.4
C. IEEE 806.2
D. IEEE 808.6

Question No:184 (Marks:1) Vu-Topper RM


Ethernet standard specifies that any two stations cannot be separated
by more than Repeaters.
A. Two

B. Four Page 49
C. Six
D. Eight

Question No:185 (Marks:1) Vu-Topper RM


The basic idea behind the operation of network analyzer is a computer
with a network interface that receives all frames, which is called _ .
A. Land mode

B. Promiscuous mode Page 38


C. Filter specifications
D. Logical code

Question No:186 (Marks:1) Vu-Topper


RM
is a method for computing routing table information.
A. Manual entry

B. Static routing Google


C. Boot time routing
D. None of the above

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:187 (Marks:1) Vu-Topper RM
ATM header is about of the cell.
A. 5%

B. 10% Page 66
C. 15%
D. 20%

Question No:188 (Marks:1) Vu-Topper RM


To model a WAN, we use a graph in which the nodes model switches
and the edges model direct connection between .

A. SwitchesPage 59
B. Interior
C. Packet
D. Front

Question No:189 (Marks:1) Vu-Topper RM


Most LANs that employ ring topology use an access mechanism known
as
A. CSMA/CD
B. CSMA/CA
C. CSMA
D. TOKEN PASSING
Google

Question No:190 (Marks:1) Vu-Topper RM


An ------------method, the network hardware designers specify how type
information is included in the frame and the value use to identify various
frame types.
A. Explicit frame type Google
B. Ideal frame type
C. Implicit frame type
D. None of the given

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:191 (Marks:1) Vu-Topper RM
Hardware that calculates a CRC uses two simple components.
A. AND unit and XOR unit

B. Shift register and XOR unit Google


C. Shift register & AND unit
D. Shift register and shift XOR unit

Question No:192 (Marks:1) Vu-Topper


RM
In FDDI, in case of a station failure, remaining stations loop back and _.

A. Reroute data through Page31

Question No:193 (Marks:1) Vu-Topper RM


is a tool that sends a message to a remote computer and reports
whether the computer responds.

A. Ping Google

Question No:194 (Marks:1) Vu-Topper RM


The Fast Ethernet hardware operates at a rate of .
A. 100MbpsPage27

Question No:195 (Marks:1) Vu-Topper RM


In a ping command result, time denotes the .

A. RTT Google
B. TRL
C. TTL
Question No:196 (Marks:1) Vu-Topper RM
The number of connections needed for 8 computers in direct point to
point communication is equal to .

A. 28 Google
B. 20
C. 14

For More Help Vu Topper RM Contact


What’s app 0322-4021365
Question No:197 (Marks:1) Vu-Topper RM
If a computer on the network shares resources for others to use, it is
called

A. Server Google
B. Client
C. Mainframe

Question No:198 (Marks:1) Vu-Topper


RM
ISO stands for

A. International Standard Organization


Google
B. International Student Organization
C. Integrated Services Organization

Question No:199 (Marks:1) Vu-Topper RM


ISO OSI model is used in
A. Standalone PC
B. Network environment Google

Question No:200 (Marks:1) Vu-Topper


RM
Network cable lies on layer
A. Application
B. Network

C. Physical

Question No:201 (Marks:1) Vu-Topper RM


ISDN is an example of network
A. Circuit switched
B. Packet switched

Question No:202 (Marks:1) Vu-Topper


RM
X.25 is an example of network
A. Circuit switched

B. Packet switched
Question No:203 (Marks:1) Vu-Topper RM
allows LAN users to share computer programs and data.
Communication server
A. Print server

B. File serverGoogle

Question No:204 (Marks:1) Vu-Topper RM


Print server uses which is a buffer that holds data before it is
send to the printer.
A. Queue

B. Spool
C. Node

Question No:205 (Marks:1) Vu-Topper RM


A standalone program that has been modified to work on a LAN by
including concurrency controls such as file and record locking is an
example of

A. LAN intrinsic software


B. LAN aware software
C. Groupware
D. LAN ignorant software

Question No:206 (Marks:1) Vu-Topper RM


The portion of LAN management software restricts access,
records user activities and audit data etc.
A. Configuration management

B. Security management
C. Performance management
Question No:207 (Marks:1) Vu-Topper
RM
What is the max cable length of STP?
A. 100 ft
B. 200 ft
C. 200 m
Question No:208 (Marks:1) Vu-Topper RM
What is the max data capacity of STP?
A. 10 mbps

B. 100 mbps
C. 1000 mbps
D. 10000 mbps

Question No:209 (Marks:1) Vu-Topper RM


What is the central device in star topology?
A. STP server

B. Hub/switch Google
C. PDC
D. Router

Question No:210 (Marks:1) Vu-Topper RM


Point-to-point topology is

A. Connectivity Page5

ORANGE MONKEY Page 1

TEAM
CS610 130+ Mcqs
Quiz 1 Lec 1-9
Spring 2022 #Mid-Term
WITH PROVE ANSWER
ORANGE MONKEY TEAM

Important NOTE:-
Like share and comment too ..ager koi
mistake hogaye ho to sorry and comment
main lazmi mention krdijiye ga takey main
correction krlon file main …. And like
zaroor krein is hamein or bhe apsab keyliye
files makes krny ke himat milti hey

…JAZAKALLAH

ORANGE MONKEY Page 2

TEAM
ORANGE MONKEY Page 3

TEAM
1. When an application any data, it makes a copy of the data available to all other computers
on the network.

Multicast…..confirm

2. There are types of data stuffing

2….confirm

3. Which of the following is a benefit of direct point to point communication?

Security implementation…..confirm

4. If you as a network administrator want to know the traffic flow of your data while
communicating with a remote computer which of the following will be used to know about
intermediate routers?

ORANGE MONKEY Page 4

TEAM
Ping…..confirm

ORANGE MONKEY Page 5

TEAM
5. Which of the following network is using the TCP/IP model globally?

The internet….confirm

6. In which type of error detection the arithmetic sum is calculated before and after the
transmission of data at both communication ends?

Checksum…..confrim

ORANGE MONKEY Page 6

TEAM
7. Hardware address is also called .

Physical address……confirm

ORANGE MONKEY Page 7

TEAM
8. The sharing of a among the workers in an office is a goal of resource sharing

Printer….confirm

9. Thick Ethernet also requires to avoid signal reflectance


Terminators…confirm

10. The Field of Ethernet frame has the purpose of frame payload.

Data….confirm

ORANGE MONKEY Page 8

TEAM
ORANGE MONKEY Page 9

TEAM
11. In each station is allocated time slot during which it can send data. Each station
transmits its data in its assigned time slot.

TDMA…confirm

12. In all computers are attached to a central hub

Star topology…..confirm

13. In which topology terminators are used at the end of the cable?

Bus….confirm

14. A network uses to arrange computers in a single closed loop.

ORANGE MONKEY Page 10

TEAM
Ring topology…confirm

15. LAN interface uses to copy frame data directly from main memory

ORANGE MONKEY Page 11

TEAM
DMA….confirm

16. In direct point to point communication adding the NTH computer requires new
connections

N-1….confirm

17. uses counter rotating rings in which data flows in opposite directions

FDDI….confirm
18. We need pockets rather than bits because .

Sender and receiver need to coordinate to detect transmission errors.

19. The gigabit Ethernet hardware operates at a rate of .

ORANGE MONKEY Page 12

TEAM
1000 Mbps…..confirm
20. Each computer in LAN is identified by a Physical address usually imprinted on the
.

Network interface card…..confirm

ORANGE MONKEY Page 13

TEAM
21. network does not depend on CSMA/CD.

Ethernet….confirm

22. LAN interface hardware obeys access rule.

CSMA/CD….confirm

23. Point-to-point topology is


Connectivity based….confirm

ORANGE MONKEY Page 14

TEAM
24. Parity check is usually used to detect bit error(s).

1….confirm
25. is a tool that sends a message to a remote computer and reports whether the
computer responsibility

Ping…confirm

ORANGE MONKEY Page 15

TEAM
26. LAN and WAN are classified according to their .

Size….confirm

27. In a ping command result, time denotes the .

RTT….confirm

28. How many computers are mandatory to form a network?

ORANGE MONKEY Page 16

TEAM
29. In technique data is treated as a sequence of integers and their arithmetic sum is
computed and the carry bits are added to the final sum

Checksum….confirm

ORANGE MONKEY Page 17

TEAM
30. In taken ring, if all computers are ready to transmit it enforces access.
Round-robin access…..confirm

31. Fixed network is a type of networks which is classified with respect to the factor.
Mobility….confirm

32. are two standard implementations to improve computational efficiency

Hashing and direct indexing…confirm

33. In the IP address identifies an individual computer on the network.

ORANGE MONKEY Page 18

TEAM
Suffix….confirm

34. In the IP address identifies the physical network to which the computers are
attached.

Prefix….confirm

ORANGE MONKEY Page 19

TEAM
35. Serve same purpose in internet as frames on LAN.

Packets…..confirm

36. IP datagram can contains octets.

1-65.535…confirm

37. TCP/IP defines the term to refer any computer system that connects to a network
and runs applications for users.

Host computer….confirm

38. protocols of TCP/IP layering model specify how to organize data into frame and
how a computer transmits frames over a network.

Network interface layer….confirm

ORANGE MONKEY Page 20

TEAM
39. of TCP/IP protocol suit specifies the format of packets sent across internet as well
as the mechanisms used to forward packets.

Internet….confirm

ORANGE MONKEY Page 21

TEAM
40. As the internet grew the original Glassful addressing scheme became a limitation. The IP
address space was being exhausted because all networks had to choose one of _
possible sizes.

Three….confirm

41. Dotted decimal notation is a syntactic form the IP software uses to express _
binary values when interacting with humans.

32-bit….confirm

42. Header contains all information needed to deliver datagram to the destination computer.
But which one of the following is not included.

Rectfer…..confirm

ORANGE MONKEY Page 22

TEAM
43. For information about forwarding is stored in a routing table which is
initialized at system initialization and must be updated as network topology changes.

Efficiency…..confirm

ORANGE MONKEY Page 23

TEAM
44. MTU stands for .

Maximum transmission Unit…..confirm

45. In closed-form computation the protocol address assigned to a computer is chosen carefully
so that computer’s hardware address can be computed from the protocol address using
basic Boolean and operations.

Arithemetic….confirm

46. Internet Protocol (IP) address version 4 is comprised of bits.

32…confirm

47. The current version of IP-Version 4 is old.

20….confirm

48. contains all information needed to deliver datagram to the destination.

ORANGE MONKEY Page 24

TEAM
Header…confirm

49. Address resolution protocol is mostly used to bind a 32-bit IP address to a


Ethernet address.

48….confirm

ORANGE MONKEY Page 25

TEAM
50. The protocol address of the most hop must be to an equivalent hardware before
a packet can be sent.

Translated….confrim

51. HEADER LEN field gives size of extension header.

True….confirm

52. Class A mask is 255.0.0.0 which is used for .

Subnetting….confirm

53. IPV6 address consists of .

128 bits….confirm

54. The header format of IPV6 is entirely different.

True….confirm

ORANGE MONKEY Page 26

TEAM
55. HLEN shows the header length in units of bits.

32 bits…confirm
56. VERS shows the version of .

IP…..confirm

ORANGE MONKEY Page 27

TEAM
57. TOTAL LENGTH shows total octets in .

Datagram…confirm

58. A datagram cannot be larger than of a network over which it is sent.

MTU…confirm

59. Every hardware technology specification includes the definition of the maximum size of
the frame data area which is called the transmission Unit.

Maximum…..confirm

60. The IP class scheme does not divide the address space into equal size class and
the classes do not contain the same number of networks.

32-bit….confirm

ORANGE MONKEY Page 28

TEAM
61. shows senders preference for low latency high reliability.

Service type….confrim

62. NEXT HEADER field in the base header defines type of header if appears at the end of
fixed-size base header.

ORANGE MONKEY Page 29

TEAM
True…..confirm

63. uses counter rotating rings in which data flows in opposite directions.

FDDI….confirm

64. In all computers are attached to a central hub.

Star topology….confirm

65. In a all computers are attached to a single cable and any computer can send data to
any other computer.

Bus topology….confirm

66. is standard wireless LAN that uses radio signals at 2.4GHz.

IEEE 802.11…..confirm

ORANGE MONKEY Page 30

TEAM
67. Star topology is the kind of .

Point to point topology…..confirm

68. Tree topology is the kind of _.

Point to point topology….confirm

ORANGE MONKEY Page 31

TEAM
69. In FDDI, in case of a station failure, remaining stations loop back and

. Re-route data through spare ring…..confirm

70. are the two frame types

Multicast and broadcast….confrim

71. In topology if the switch goes down all the computers will be disconnected.

Star….confirm

72. Which type of network consists of wireless connection of laptops in a university


classroom?

LAN….confirm

ORANGE MONKEY Page 32

TEAM
73. The basic idea behind the operation of network analyzer is a computer with a network
interface that receives all frames, which is called
Promiscuous mode…..confirm

ORANGE MONKEY Page 33

TEAM
74. WE need packets rather than bits because .

a sender and receiver need to coordinate to detect transmission


errors…confirm

75. As a result of ARPA research, the first network was established which was named as
.

ARPANET…..confirm

76. While transmitting data from source destination B, 4 bits are changed during the
transmission then the error is a .

Brust error….confirm

77. Each computer in LAN is identified by a physical address, usually imprinted on the
.

Network interface card….confirm

ORANGE MONKEY Page 34

TEAM
78. Which type of network consists of wired computers in a university classroom?

LAN….confirm

ORANGE MONKEY Page 35

TEAM
79. Bluetooth uses shared medium and instead of coaxial cable.

Radio waves….confirm

80. The Ethernet standard specifies that frames are sent using the scheme.

Manchester Encoding…..confirm

81. In technique, all members of the network can send data on the specific time
slot?

CSMA….confirm

ORANGE MONKEY Page 36

TEAM
82. A network uses to arrange computers in a single closed loop

Ring topology….confrim

ORANGE MONKEY Page 37

TEAM
83. NICs can provide all three-connection technologies.
RJ-45 connector for 10 base-T, AUI connector for thicknet and BNC
connector for
Thinnet…..confirm

84. Computer networks are classified by factors.

4…confirm

85. is also called self healing network.

FDDI….confirm

ORANGE MONKEY Page 38

TEAM
86. was the first automated tool required to see whether the given computer is
online or not.

PING program….confirm

ORANGE MONKEY Page 39

TEAM
87. Ethernet uses a bit static addressing scheme in which device is assigned a unique
address by the manufacturer.

48….confirm

88. is designed to detect transmission errors, send one extra bit of information with
each character.

Parity….confirm

89. Hardware addresses must be on a LAN.

Unique….confirm

ORANGE MONKEY Page 40

TEAM
90. The Fast Ethernet hardware operates at a rate of .

100 Mbps…..confirm

ORANGE MONKEY Page 41

TEAM
91. Inside a computer each address mask is stored as a bit value.

32…..confirm

92. The protocol address of the next hop must be ------ to an equivalent hardware address
before a packet can be sent.

Translated….confirm

93. protocols of TCP/IP layering model specify how to ensure reliable transfer.

Transport layer….confirm

94. are two standard implementations to improve computational efficiency.

ORANGE MONKEY Page 42

TEAM
Hashing and direct indexing….confirm

ORANGE MONKEY Page 43

TEAM
95. of TCP/IP protocol suit defines the basic characteristics of network hardware.

Physical layer….confirm

96. Dotted decimal represents each octet in and uses a dot to separate octets.

Decimal…confirm

97. In closed-form computation the protocol address assigned to a computer is chosen


carefully so that computer’s hardware address can be computed from the protocol address
using basic Boolean and operations.

Arithmetic…confirm

ORANGE MONKEY Page 44

TEAM
98. Address Resolution Protocol is mostly used to bind a 32-bit IP address to a _
Ethernet address.

48-bit…confirm

99. A separate table is used for each physical network.

ORANGE MONKEY Page 45

TEAM
Address-binding…confirm

100. The ethernet speed was originally .

3MBps…..confirm

101. The current standard is .

10Mbps….confirm

102. Source is responsible for fragmentation.

a. IPV6……confirm
103. Which of the following statement is true regarding ATM?

a. It is a single technology for voice, video and data.


b. It has low jitter and high capacity.
c. It uses fixed size, small cells, 48 octet’s data.
d. All of the above
104. As a result of ARPA research, the first network was established which was named as
.

a. ARPANET…..confrim

105. protocol uses three way handshake to begin a connection.

a. TCP……confirm

ORANGE MONKEY Page 46

TEAM
106. NAT device stores state information in translation table.

ORANGE MONKEY Page 47

TEAM
False…confirm

107. NaT device stores state information in table


True…confirm

108. The number of connections needed for 8 computers in direct point to point communication
is equal to .
28….confirm

109. The bridges communicate with each other on the network and use algorithm to
decide which bridge will not forward frames if a cycle occurs.

Distributed Spanning Tree……confirm

110. places the boundary between the second and third octets.

Class B….confirm

111. cannot be extended arbitrarily far or to handle arbitrarily many computers.

ORANGE MONKEY Page 48

TEAM
LAN…..confirm

ORANGE MONKEY Page 49

TEAM
112. encapsulates IP datagram as data area in hardware frame.

Network Interface Layer….confirm

113. is standard wireless LAN that uses radio signals at 2.4GHz.

IEEE 802.11…..confirm

114. Missing in a frame format indicates receiving computer missed beginning of the
message.

Soh…….confirm

115. Missing indicates sending computer crashed.

Eot….confirm

ORANGE MONKEY Page 50

TEAM
116. An interior switch is one with wich ..

No computer is attached…..confirm

117. VBR stands for .

ORANGE MONKEY Page 51

TEAM
Variable Bit Rate….confirm

118. ABR stands for .

Available Bit rate….confirm

119. CBR stands for .

Constant Bit rate….confirm

120. If simultaneous transmission occurs, the frames interfere with each other and this
phenomenon is called .

Collision…..confirm

121. The first automated tool required to see whether the given computer is online or not was

PING program…..confirm

ORANGE MONKEY Page 52

TEAM
122. The recent executed instruction in temporal aspect of the locality of reference.

is temporarily not referenced

ORANGE MONKEY Page 53

TEAM
123. The of errors is easier than the of errors.

correction, detection

124. ATM header is about of the cell.

10 %

125. Hardware that calculates a CRC uses two simple components .

Shift register and XOR unit….confirm

ORANGE MONKEY Page 54

TEAM
126. is inflexible.

Static routing….confirm

127. Frames include additional information to detect/correct errors are insert by .

ORANGE MONKEY Page 55

TEAM
Sender and Receiver…confirm

128. Fragmentation when using ICMP for path MTU should be avoided.

True…confirm

129. The frame format of any LAN technology must consists of and .

Frame header and pay load…..confirm

130. SMDS(Switched Multi megabit Data Service) is .

Connection less service….confirm

131. Which of the following is not a guided medium?

Atmosphere

132. are more frequently being designed to allow specification of the quality of
service required by users.

Networks….confirm

133. The physical addressing in a WAN is similar as in LAN in the way .

a. The data is transmitted in packets equivalent to frames.


b. Each packet has a format with header.
c. The packet header includes destination and source addresses.
d. All of the above
134. Two computers with a connection through an ATM network will likely have same VPI/VCI

ORANGE MONKEY Page 56

TEAM
values for each end of the connection.

True….confirm

135. NIC connection in a physical network is known as .

LAN wiring scheme…..confirm

ORANGE MONKEY Page 57

TEAM
136. A is a special-purpose computer dedicated to the task of
interconnecting networks.

Router….confirm

137. The third field of the header consists of bit Ethernet frame type.

16

138. is the most popular wiring scheme because of lowest cost.

10 Base T….confirm

139. To span long distances or many computers, networks must replace shared medium
with
.

packet switches….confirm

140. Frame relay is .

Connection oriented service….confirm

141. Which multiplexing technique transmits analog signals?

a. FDM
b. TDM
c. WDM
d. Both (a) and (c)….confirm
142. Which of the following is not a benefit of Source Independence?

a. It allows fast and efficient routing.


b. Packet switch need not hove complete information about all destinations.
c. network functions even if
topology changes. d. None of the
given……confirm

CS610-COMPUTER NETWORK

A popular LAN Technology that uses a shared Bus Topology is called.

WAN

CSMA

Ethernet

Multicast

An electronic device that connects LAN segments

Ethernet

10Baset

Bridge

10Base5

A form of addressing; in which a set of computers is assigned one address.

.Broadcast

Multicast

Packet Switch
CRC

Bandwidth

A network technology that uses Collision Avoidance

Bridge

Broadcast

WAN

Wireless LAN

Formal name for Thick Ethernet..

TDM

Bandwidth

Network Analyzer

Broadcast

________ has a jitter zero

► None of the given

► Virtual Private Network

► Isochronous Network

► Asynchronous Network

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______.

►Connectionless
 service paradigm

►Connection oriented service paradigm

►Both Connectionless and Connection-oriented service paradigm

►None of the given


ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.

►21-bit

►22-bit

►23-bit

►24-bit

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication
routing is called___________

►Hierarchal address

►Default route

►Shortest path

►None of the given

The next hop to which a packet is sent depends only on

►Packet’s
 destination

►Packet’s original source

►Path the packet has taken

►Non of the given

An interface for twisted pair Ethernet must have a ____________ connector, and must generate signals
according to the_____________ specification.

►RJ-45, 10 Base T

►RJ-45, 10 Base 5

►BNC, 10 Base 2

►BNC, 10 Base T

When an application___________ data, it makes a copy of the data available to all other computers on
the network.

►Broadcasting
►Multicasting

►Unicasting

►None of the given

A ____________ provide a mechanism that a customer can use to set a physical address.

►Static addressing scheme

►Configurable addressing scheme

►Dynamic addressing scheme

►None of the given

FDDI can transmits data at a rate of ___________________

►100
 million bits per second

►100 million bits per second

►100 million bits per second

►None of the given

Computers attached to an ether use ------ in which a computer waits for the ether to be idle before
transmitting a frame.

►CSMA/CD

►CSMA/CA

►TOKEN PASSING

►None of the given

________________ has advantages arisen from the size and ease of computation.
►CRC

►Parity

►Checksums

►None of given
The term ___________ is used to denote the definition of a packet used with a specific type of network.
►Packet

►Frame

►Data

►None of the given

______________ has no way to determine the cause of the problem.


►Ping

►Trace route

►ICMP

►Non of the given

_____________ Program sends a message to a remote computer and reports whether the computer
responds.

►Ping

►Trace route

►ICMP

►Non of the given

In ____________, network occupies the smaller area like a room a floor or a building.

►LAN

►WAN

►MAN

►None of the given

No error detection scheme is perfect because transmission errors can affect the additional information
as well as the data.
► False

►True

A typical port on an ATM switch operates at __________ or higher.

► OC-2 speed (155Mbps)

► OC-3 speed (100Mbps)

► OC-3 speed (155Mbps)

► OC-3 speed (155Gbps)

The product of delay and throughput measures the _____ of data that can be present on the network.

► Area

► Volume

► Length

► None of the given

__________is used for compressed audio and video where the data rate depends on the level of
compression that can be achieved.

►Constant Bit Rate (CBR) service

►Variable
 Bit Rate (VBR) service

►Available Bit Rate (ABR) service

►None of the given

Which of the following is a connecting device?

►Bridge

►Repeater

►Hub

►All the given


A bridges function in the _________ layers(s).

►Physical (MAC)

►Data link

►Network

►Physical
 (MAC) and Data link

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

►8 octets

►8 bytes

►8
 bits

►None of the given

The third field of the header consists of ------ bit Ethernet frame type.

►48

►32

►16

►8

An ------------method, the network hardware designers specify how type information is included in the
frame and the value use to identify various frame types.

►Explicit
 frame type

►Ideal frame type

►Implicit frame type

►None of the given

Local Talk is a LAN technology that employs _____________


►Star topology

►Bus
 topology

►Ring topology

►None of the given

The Fast Ethernet hardware operates at a rate of _______________

►10 Mbps

►100
 Mbps

►1000 Mbps

►None of the given

___________scheme, which is designed to help detect transmissions errors, send one extra bit of
information with each character
►Parity

►Checksums

►CRC

►None of given

Computer networks are often called -------------- because they use packet technology.
►Ethernet

►Switch
 networks

►Packet networks

►None of the given

_____________Program sends a message to a remote computer and reports whether the computer
responds.

►Ping

►Trace route

►ICMP
►Non of the given

In ______________ network occupies larger areas like cities & countries.

►LAN

►WAN

►MAN

►None of the given

In -------------, network occupies the smaller area like a room a floor or a building.

►LAN

►WAN

►MAN

►None of the given

In Point-to-Point topology there are two topologies.

►Tree
 and Ring

►Star and Ring

►Star and Tree

►None of the given

Computer networks are often called -------------- because they use packet technology.

► Ethernet

► Switch networks

► Packet networks

► None of the given

A network uses a ------arranges for computers to be connected in a closed loop.


► Star Topology

► Ring Topology

► Bus Topology

► None of the given

An ------------method, the network hardware designers specify how type information is included in the
frame and the value use to identify various frame types.

► Explicit frame type

► Ideal frame type

► Implicit frame type

► None of the given

An interface for thin Ethernet must have a ____________ connector, and must generate signals
according to the_____________ specification.

► RJ-45, 10 Base T

► RJ-45, 10 Base 5

► BNC, 10 Base 2

► BNC, 10 Base T

A Bridge forwards or filters a frame by comparing the information in its address table to the
frame’s__________

► Layer 2 source address

► Source node’s physical address

► Layer 2 destination address

► Layer 3 destination address

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication
routing is called___________
► Hierarchal address

► Default route

► Shortest path

► None of the given

________ of TCP/IP layering model corresponds to basic network hardware.

► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer

_______ Protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer

________is called an end-to-end protocol because it provides a connection directly from an application
on one computer to an application on a remote computer.

► IP

► UDP

► TCP

► None of the given

____________uses distance vector approach to define routing

► BGP

► OSPF
► RIP

► None of the given

_______ is ideal in a situation where the group is small and all members are attached to contiguous
Local Area Networks.

► Flood-and -Prune

► Configuration-and -Tunneling

► Core-Based Discovery

► None of the given

Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source
address

►3

►2

►1

►0

Protocol addresses are abstractions provided by ___________.

► Hardware

► Software

► Operating system

► Internet

Although message exchange can be used to bind addresses, sending a request for each binding is
hopelessly inefficient.

► True

► False
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

► 32, 48

► 24, 32

► 32, 64

► 32, 128

In the 1970s large organizations began to acquire multiple networks. Each network in the organization
formed island. Employees needed to choose a computer appropriate for each task. So they needed
multiple screens, keyboards and computers.

► False

► True

In which method of Address Resolution Protocol the protocol address is determined by hardware
address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?

►T

►D

►C

► T, C

The general form of an IP datagram is with a header followed by data. The header contains
information that controls where and how the datagram is to be sent.

► True

► False

To save traffic, an EGP does not summarize routing information from the autonomous
system before passing it to another autonomous system.

► True

► False
Which of the following is a correct representation of the IPv6?

► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255

► 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255

► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256

► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255

A ________relies on the hardware manufacturer to assign a unique physical address to each network
interface is called.

► Static addressing scheme

► Configurable addressing scheme

► Dynamic addressing scheme

► None of the given

A system with redundant bridges might have a problem with_______ in the system.

► Loop

► Filters

► Spanning Trees

► All given choices

A Bridge can________

► Filter a frame

► Forward a frame

► Extend a LAN

► Do all the above


________ is used for typical data applications (where the data rate may be unknown and bursty) and
allows use of whatever bandwidth is available at a given time.

► Constant Bit Rate (CBR) service

► Variable Bit Rate (VBR) service

► Available Bit Rate (ABR) service

► None of the given

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.

► 21-bit

► 22-bit

► 23-bit

► 24-bit

________ of TCP/IP layering model corresponds to basic network hardware.

► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer

___________ places the boundary between the second and third octets

► Class A

► Class B

► Class C

► Class D

UDP and TCP are both_________ layer protocols


► Physical

► Data link

► Network

► Transport

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream


interface, Reliable connection startup and Graceful connection shutdown are the services provided
by__________

► IP

► None of the given

► TCP

► UDP

_______protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer

________identifies which application program on receiving computer should receive the data

Destination port

Source port

Logical address

None of the given

________ identifies the application program that sent the data.

► Destination Port

► Source port
► Logical address

► None of the given

Which of the following are interior routing protocols?

► RIP

► OSPF

► BGP

► RIP and OSPF

The Border Gateway Protocol (BGP) uses_________ for all communication

► UDP

► TCP

► Both UDP and TCP

► None of the given

__________measures distance in network hops, where each network between the source and
destination counts as single hop.

► BGP

► OSPF

► RIP

► None of the given

OSPF is based on--------

► Distance vector routing

► Link state routing

► Path vector routing

► Distance vector routing and Link state routing


_________ performs local multicast and uses IP-in-IP encapsulation to send multicast datagram’s from
one site on the Internet to another.

► Distance Vector Multicast Routing Protocol (DVMRP)

► Core Based Trees (CBT)

► Protocol Independent Multicast_ Sparse Mode (PIM-SM)

► Protocol Independent Multicast _ Dense Mode (PIM-DM)

The length of time required to send a variable length packet is variable and does not require a
complicated interrupt scheme to detect completion of transmission.

► True

► False

NEXT HEADER field in the base header defines type of header and it appears at end of fixed-size base
header.

► True

► False

Although message exchange can be used to bind addresses, sending a request for each binding is
hopelessly inefficient.

► True

► False

Address mask defines how many bits of address are in suffix?

► True

► False
A computer attached to a given network can only communicate with other computers attached to the
same network. Is this a problem with multiple networks?

► True

► False

The term self-identifying is used for Classful IP addresses because the class of the address can be
computed from the address__________.

► itsel

► prefix

► suffix

► mask

In which method of Address Resolution Protocol the protocol address independent of hardware
address?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► T, C

►D

►C

► T, D

Reconstruction of original datagram is called reassembly.

► True

► False

A computer needs a complete stack of protocols to run either a client or a server.

► True
► False

TCP uses _______ mechanism to control the flow of data.

► Door

► Window

► Acknowledgment

► Retransmission

To solve the problem the routers and networks in the Internet are divided into groups. How large do
you think are these groups?

Trace route continues to increment the Time To Live until the value is large enough for the datagram to
reach its final destination. What happens when the TTL is sufficiently large for the datagram to reach its
destination?

How can TCP monitor internet delays?

Which wireless standard is used in WIFI technology?

How does IP software reassemble fragments that arrive out of order?

What kind of information is in a routing table?

Define frames without type field?

What is the meaning of Facilities For Transit Routing as a characteristic of the Border Gateway Protocol?

What are the characteristics of the Border Gateway Protocol?

Describe how NAT can be useful for residence with cable modem or DSL?

In CRC there is no error if the remainder at the receiver is


Equal to the Remainder of the sender Zero Non Zero The quotient at the sender

------------------------------------------------------------------------------------------------------------

Router is __________ Device.

Layer one Intelligent Unintelligent None of above

------------------------------------------------------------------------------------------------------------

The repeater works at _______ Layer of OSI model

Data Link layer Physical layer Transport Layer Network Layer

------------------------------------------------------------------------------------------------------------

Bridges are _________ Devices

Networking Internetworking All of above None of above

------------------------------------------------------------------------------------------------------------

The address field of a frame in HDLC protocol contains the address of the ________ station.

Primary Secondary Tertiary Primary and secondary

------------------------------------------------------------------------------------------------------------

WDM stands for

Wave Division Multiplexing Wrong Division Multiplexing

Well Division Multiplexing West Division Multiplexing

------------------------------------------------------------------------------------------------------------

A traditional telephone line has a bandwidth of __________.

2000 Hz 4000 Hz 2000 MHz 4000 MHz

------------------------------------------------------------------------------------------------------------

Time slots are dynamically allotted in _______________TDM technique.

FDM Asynchronous WDM Synchronous

------------------------------------------------------------------------------------------------------------

A portion of the path that carries TX b/w a given pair of devices is known as __________.

Node Bridge Channel Access Point

------------------------------------------------------------------------------------------------------------

T Lines are ___________ lines designed for digital data

Analog Digital Composite Telephone

------------------------------------------------------------------------------------------------------------

Multiplexing has long been used as an essential tool in ______.


Electronic industry Telephone industry Space science VLAN

------------------------------------------------------------------------------------------------------------

Switched analog service is leased line.

True False

------------------------------------------------------------------------------------------------------------

If a T-1 carries 8000 frames, then data rate will be ___________

2.544 Mbps 1.544 Mbps 1.544 kbps 1.544 Gbps

------------------------------------------------------------------------------------------------------------

Given a 10-bit sequence 1010011110 and a divisor of 1011, CRC will be

001 000 100 101

------------------------------------------------------------------------------------------------------------

Asynchronous TDM is efficient only when the size of the time slot is kept relatively ________

Large Small Medium Zero

------------------------------------------------------------------------------------------------------------

FTTC can be implemented in ______________.

Telephone system Cable System Telephone and Cable System Non of the above

------------------------------------------------------------------------------------------------------------

Europeans use a version of T-lines called _________

F-lines E-line D-lines S-lines

------------------------------------------------------------------------------------------------------------

A prism can deflect the light depending upon the angle of ____________ and the frequency.

Deviation Incident Refraction Reflection

------------------------------------------------------------------------------------------------------------

Which error detection method can detect a single-bit error?

Simple parity check Two-dimensional parity check CRC All of the given

------------------------------------------------------------------------------------------------------------

Which of the following techniques takes data from one high speed line and breaks it into portions?

Inverse subtraction Inverse addition multiplexing inverse multiplexing

------------------------------------------------------------------------------------------------------------

Telephone network is an example of a __________ network

Packet-switched Circuit-switched Message-switched Tele-switched


------------------------------------------------------------------------------------------------------------

FTTC stands for ___________

fiber to the center fiber to the cable fiber to the curb flexible to the curb

------------------------------------------------------------------------------------------------------------

Cable that connects the subscriber telephone to the nearest end office in a local loop is called

Twisted-pair cable Coaxial cable Fiber-optic cable Subscriber cable

------------------------------------------------------------------------------------------------------------

In Synchronous TDM, Time slots are not same in number as input devices

True False

------------------------------------------------------------------------------------------------------------

In Synchronous TDM, Time slots are not same in number as input devices.

True False

------------------------------------------------------------------------------------------------------------

At the CRC checker, ________ means that the data unit is damaged

A string of 0s -- A string of 1s --A string of alternating 1s and 0s -A nonzero-remainder

------------------------------------------------------------------------------------------------------------

Which of the following best describes a single-bit error?

A single bit is inverted A single bit is inverted per data unit

A single bit is inverted per transmission none of the given

------------------------------------------------------------------------------------------------------------

Multiplexing is the set of techniques that allows simultaneous TX of multiple signals across a
___________ data link

Single Double Multi None of the given

------------------------------------------------------------------------------------------------------------

If the ASCII character G is sent and the character D is received, what type of error is this?

Single-bit Multiple-bit Burst Recoverable

------------------------------------------------------------------------------------------------------------

Which error detection method involves polynomials?

Simple parity check Two-dimensional parity check CRC Checksum

------------------------------------------------------------------------------------------------------------

For point-to-point configuration, addressing is needed


True False

------------------------------------------------------------------------------------------------------------

Data link control is composed of ____________ important functions.

2 3 4 5

------------------------------------------------------------------------------------------------------------

The checksum of 0000 and 0000 is __________

1111 0000 1110 0111

------------------------------------------------------------------------------------------------------------

Question # 1 of 10 ( Start time: 09:46:21 PM ) Total Marks: 1

_________ is used to attach two autonomous systems.

Select correct option:

BGP

IGP

EGP

none of the given

Question # 2 of 10 ( Start time: 09:47:49 PM ) Total Marks: 1

The Border Gateway Protocol (BGP) uses_________ for all communication

Select correct option:

UDP

TCP

UDP and TCP


None of the given

Question # 3 of 10 ( Start time: 09:49:09 PM ) Total Marks: 1

Routing inserts or changes values in _______

Select correct option:

MAC address

routing table

both (a) and (b)

None of the given

 
Question # 4 of 10 ( Start time: 09:50:37 PM ) Total Marks: 1

___________ does not depend on any particular unicast routing protocol.

Select correct option:

PIM-DM

PIM-SM

PIM-AM

none of the given

Question # 5 of 10 ( Start time: 09:51:08 PM ) Total Marks: 1

NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:

True

False

 
Question # 6 of 10 ( Start time: 09:51:42 PM ) Total Marks: 1

Each autonomous system used to communicate among autonomous systems by chooses an IGP.

Select correct option:

True

False

 
Question # 7 of 10 ( Start time: 09:52:50 PM ) Total Marks: 1

Which of the following protocols provide the routing information at the autonomous system level?

Select correct option:

BGP

OSPF

RIP

OSPF and RIP

 
Question # 8 of 10 ( Start time: 09:54:16 PM ) Total Marks: 1

Which of the following protocols allows the sender and receiver to enforce polices.
Select correct option:

RIP

OSPF

BGP

BGP and RIP

 
Question # 9 of 10 ( Start time: 09:55:47 PM ) Total Marks: 1

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet
Routing Protocol.

Select correct option:

True

False

 
Question # 10 of 10 ( Start time: 09:56:52 PM ) Total Marks: 1

The computer uses _________ to inform Local router about the last application when it leaves.

Select correct option:

ICMP

IGMP

SNMP

None of the given

 
Question # 1 of 10 ( Start time: 05:14:11 PM ) Total Marks: 1

We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

Select correct option: 3

routing path

routing metric

routing

switching

Question # 2 of 10 ( Start time: 05:15:44 PM ) Total Marks: 1

_________ is a current version of BGP.

Select correct option: 3

none of the given


Question # 4 of 10 ( Start time: 05:17:18 PM ) Total Marks: 1

OSPF is based on--------

Select correct option: 2

Distance vector routing

Link state routing

Path vector routing

Distance vector routing and Link state routing

 
5 . OSPF is based

Question # 6 of 10 ( Start time: 05:19:14 PM ) Total Marks: 1

NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.

Select correct option: F

True

False

Question # 7 of 10 ( Start time: 05:20:05 PM ) Total Marks: 1

In _______ routing, the table is initialized when system boots and there is no further changes.
Select correct option: 2

Dynamic

Static

Both (a) and (b)

None of the given

Question # 8 of 10 ( Start time: 05:20:56 PM ) Total Marks: 1

OSPF does'nt allows a router to introduce routes learned from another means.

Select correct option: F

True

False

Question # 9 of 10 ( Start time: 05:21:44 PM ) Total Marks: 1

Twice NAT fails if an application uses the IP addresses instead of Domain Name.

Select correct option: T

True
False

Question # 10 of 10 ( Start time: 05:22:38 PM ) Total Marks: 1

A one-to-many communication between a source and a specific group of hosts is classified as a_______ communication.

Select correct option: 3

Unicast

Multicast

Broadcast

Unicast & Multicast

Question # 1 of 10 ( Start time: 05:25:34 PM ) Total Marks: 1

________ identifies the application program that sent the data.

Select correct option: 1

Destination Port

Source port
Logical address

None of the given

Question # 2 of 10 ( Start time: 05:26:21 PM ) Total Marks: 1

Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.

Select correct option: T

False

True

Question # 3 of 10 ( Start time: 05:27:12 PM ) Total Marks: 1

Which of the following protocols allows the sender and receiver to enforce polices.

Select correct option: 3

RIP

OSPF

BGP
BGP and RIP

Question # 4 of 10 ( Start time: 05:28:45 PM ) Total Marks: 1

OSPF includes ________ address mask with each address.

Select correct option: 2

30Bit

32Bit

34Bit

none of the given

Question # 5 of 10 ( Start time: 05:29:03 PM ) Total Marks: 1

Twice NAT allows a site to run servers.

Select correct option: T

True

False

Question # 6 of 10 ( Start time: 05:29:58 PM ) Total Marks: 1

OSPF has designed as an Exterior Gateway Protocol used to pass routing information among routers within an autonomous system.
Select correct option: F

True

False

Question # 7 of 10 ( Start time: 05:30:50 PM ) Total Marks: 1

In _______ routing, the table is initialized when system boots and there is no further changes.

Select correct option: 2

Dynamic

Static

Both (a) and (b)

None of the given

Question # 8 of 10 ( Start time: 05:31:28 PM ) Total Marks: 1

In IP routing, forwarding refers to ______ transfer.

Select correct option: 2

packet
datagram

message

None of the given

Question # 9 of 10 ( Start time: 05:32:20 PM ) Total Marks: 1

It allows ________ computer(s) to share _______ IP address(s).

Select correct option: 2

multiple , multiple

multiple , single

single , single

None of the given

Question # 10 of 10 ( Start time: 05:33:35 PM ) Total Marks: 1

Network Address Translation (NAT) requires device to perform packet translation.

Select correct option: T


True

False

Question # 1 of 10 ( Start time: 04:33:55 PM )

________ encapsulates IP datagram as data area in hardware frame.

Select correct option:

Network Interface Layer

Datalink Layer

Network Layer

None of the given

CS610-Computer network
 
Question # 2 of 10 ( Start time: 04:35:26 PM ) Total Marks: 1

________ field is used to identify a specific path through the network

Select correct option:

FLOW LABEL

TRAFFIC CLASS

Both a and b
none of the given

Question # 3 of 10 ( Start time: 04:36:51 PM ) Total Marks: 1

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.

Select correct option:

96
100

120

none of the given

Question # 4 of 10 ( Start time: 04:38:19 PM ) Total Marks: 1

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost
always used to bind a 32-bit IP address to a ____ Ethernet address.

Answer(48bit)
Select correct option:

Question # 5 of 10 ( Start time: 04:39:45 PM ) Total Marks: 1

For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must
be updated as network topology changes.

Select correct option:

Efficiency

Security

Accuracy

Anomalies

 
Question # 6 of 10 ( Start time: 04:41:15 PM ) Total Marks: 1
_______ is a technique used to Limit datagram size to small MTU of any network

Select correct option:

Segmentation

Fragmentation

Encapsulation

none of the given

 
Question # 7 of 10 ( Start time: 04:42:37 PM ) Total Marks: 1

Class A mask is 255.0.0.0 which is used for ______

Select correct option:

Unicasting

Multicasting

Subnetting

All of the given

Question # 8 of 10 ( Start time: 04:44:08 PM ) Total Marks: 1

When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a
message inside a frame for transport is not called encapsulation.

Select correct option:

True

False
 
Question # 9 of 10 ( Start time: 04:45:12 PM ) Total Marks: 1
Which one of these is not a main feature of connectionless service:

Select correct option:

It includes extension of LAN abstraction.

It has universal addressing and the data is delivered in packets frames), each with a header.

It combines collection of physical networks into a single virtual network.

It has universal addressing and the data is delivered in packets


frames), without a header.

 
Question # 10 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1

Which protocol is used to test different tools.

Select correct option:

ICMP

IGMP

TCP/IP

none of the given

Question # 1 of 10 ( Start time: 04:49:54 PM ) Total Marks: 1

________ message is sent in response to incoming datagrams with problems.

Select correct option:

TCP/IP

IGMP

ICMP
none of the given

 
Question # 2 of 10 ( Start time: 04:50:45 PM ) Total Marks: 1

Which one is NOT the function of ping program

Select correct option:

Traceability

Reach ability

Both a and b

None of the given

Question # 3 of 10 ( Start time: 04:52:14 PM ) Total Marks: 1

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.

Select correct option:

96

100

120

none of the given

Question # 4 of 10 ( Start time: 04:52:32 PM ) Total Marks: 1

A datagram cannot be larger than ________ of a network over which it is sent.

Select correct option:

MTU

Size
IP header

None of the given

Question # 5 of 10 ( Start time: 04:52:55 PM ) Total Marks: 1

The Source can configure outgoing datagram’s to avoid _________

Select correct option:

Segmentation

Defragmentation

Fragmentation

None of the given

Question # 6 of 10 ( Start time: 04:54:24 PM ) Total Marks: 1

Which one of these is not a main feature of connectionless service:

Select correct option:

It includes extension of LAN abstraction.

It has universal addressing and the data is delivered in packets frames), each with a header.

It combines collection of physical networks into a single virtual network.

It has universal addressing and the data is delivered in packets


frames), without a header.
Question # 7 of 10 ( Start time: 04:55:27 PM ) Total Marks: 1

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the
____________ Transmission Unit.

Select correct option:

Least
Maximum

Fragment

Frame

Question # 8 of 10 ( Start time: 04:56:40 PM ) Total Marks: 1

_____ Protocol provides error reporting mechanism.

Select correct option:

IGMP

SNMP

ICMP

none of the given

Question # 9 of 10 ( Start time: 04:57:51 PM ) Total Marks: 1

_______ Source is responsible for fragmentation.

Select correct option:

IPV4

IPV6
Question # 10 of 10 ( Start time: 04:58:56 PM ) Total Marks: 1

MTU Stands for _______

Select correct option:

Mininum transmission unit

Maximum transmission unit

Multicast transmission unit


None of the given

TTL stands for __________

Time to Learn
Time to Leave
Time to Live
none of the given
---------------------------------------
H.LEN shows the header length in units of ____ Bits

34
32
30
None of the given
---------------------------------------------------
There are _______ possibilities to detect the destination using Trace-route

1
2
3
None of the given
----------------------------------------------------
_______ Source is responsible for fragmentation.

IPV4
IPV6
------------------------------------------------
________ encapsulates IP datagram as data area in hardware frame.

Network Interface Layer


Data link Layer
Network Layer
none of the given
----------------------------------------------

IPV6 address consists of ________

32 Bits
64 Bits
128 Bits
none of the given
--------------------------------------------------
_______ shows senders preference for low latency, high Reliability.
:
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given

-------------------------------------------------------------

Class A mask is 255.0.0.0 which is used for ______

Unicasting
Multicasting
Subnetting
All of the given
-------------------------------------------------------
_____ Protocol provides error reporting mechanism.

IGMP
SNMP
ICMP
none of the given
---------------------------------------------------------
ICMP message transport is acted upon by getting ICMP _________ in IP.

De-encapsulated
Encapsulated
Segmented
none of the given
------------------------------------------------------------

Which protocol is used to test different tools.

ICMP
IGMP
TCP/IP
none of the given
----------------------------------------------------------------------
When one computer sends an ARP message to another the message travels inside the hardware frame.
Technically, placing a message inside a frame for transport is not called encapsulation.

True
False
---------------------------------------------------

Preliminary version of IP was called _________.


IP - New Generation (IPng)
IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given
-----------------------------------------------

Header contains all information needed to deliver datagram to the destination computer. But which one
of the following is not included:

Destination address
Source address
Rectifier
Other delivery information

_______ Source is responsible for fragmentation.

IPV4
IPV6
------------------------------------------------------

______ layer Provides reliable delivery of datagram.

Network
Transport
Data link
none of the given
-----------------------------------------------------------------
Which one of these is not a main feature of connectionless service:

It includes extension of LAN abstraction.


It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.
-----------------------------------------------------------------

The process of learning the path MTU is known as path MTU discovery.

True
False
------------------------------------------------------------------

IPv6 ______________ is responsible for fragmentation. Routers simply drop datagram’s larger than
network

Destination
Intermediate routers
Source
Medium
-----------------------------------------------------
IP datagram can contains ________ octets.

0-65,535
1-65,535
1-65,536
none of the given

------------------------------------------------

_______ shows senders preference for low latency, high Reliability.

TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
------------------------------------------------

Computer networks are often called -------------- because they use packet technology.
► Ethernet

► Switch networks

► Packet networks

► None of the given

A network uses a ------arranges for computers to be connected in a closed loop.

► Star Topology

► Ring Topology

► Bus Topology

► None of the given

An ------------method, the network hardware designers specify how type information is included in the
frame and the value use to identify various frame types.
► Explicit frame type

► Ideal frame type

► Implicit frame type

► None of the given

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication
routing is called___________

► Hierarchal address

► Default route

► Shortest path

► None of the given

________ of TCP/IP layering model corresponds to basic network hardware.

► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer

_______Protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer

► Network Interface Layer

► Internet Layer

► Transport Layer
________is called an end-to-end protocol because it provides a connection directly from an application
on one computer to an application on a remote computer.

► IP

► UDP

► TCP

► None of the given

____________uses distance vector approach to define routing

► BGP

► OSPF

► RIP

► None of the given

_______ is ideal in a situation where the group is small and all members are attached to contiguous
Local Area Networks.

► Flood-and -Prune

► Configuration-and -Tunneling

► Core-Based Discovery

► None of the given

Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source
address

►3

►2

►1

►0
Protocol addresses are abstractions provided by ___________.

► Hardware

► Software

► Operating system

► Internet

Although message exchange can be used to bind addresses, sending a request for each binding is
hopelessly inefficient.

► True

► False

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

► 32, 48

► 24, 32

► 32, 64

► 32, 128

To save traffic, an EGP does not summarize routing information from the autonomous system before
passing it to another autonomous system.

► True

► False

When an application_______data, it makes a copy of the data available to all other computers on the
network.

► Broadcasting

► Multicasting

► Unicasting
► None of the given

Ethernet uses a _________ bit static addressing scheme in which each device is assigned a unique
address by the manufacturer.

► 64

► 48

► 32

►8

The product of delay and throughput measures the _____ of data that can be present on the network.

► Area

► Volume

► Length

► None of the give

Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary interaction
and operating system independent are the characteristics of _____________

► TCP

► UDP

► IP

► None of the given

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream


interface, Reliable connection startup and Graceful connection shutdown are the services provided
by__________

► None of the given

► TCP

► UDP

► IP
The process of using a routing table to select a next hop for a given datagram is called_________

► Encapsulation

► Reassembling

► Routing or forwarding

► None of the given

____________uses distance vector approach to define routing

► BGP

► OSPF

► RIP

► None of the given

A multicast routing scheme in which the protocol software builds a delivery tree from a central point is
called__________

► Distance Vector Multicast Routing Protocol (DVMRP)

► Core Based Trees (CBT)

► Protocol Independent Multicast_ Sparse Mode (PIM-SM)

► Protocol Independent Multicast _ Dense Mode (PIM-DM)

One repeater _______two repeaters ________ the maximum cable length limitation.

► doubles, cancel

► doubles, triple

► square roots, cude roots

► and, triple
Whenever it handles a packet, IP software needs to separate the destination address into a _________
and ___________.

► postfix, Infix

► non of these

► Infix, prefix

► prefix, suffix

End-to-end delivery service is connection oriented.

► True

► False

A single networking technology is best for all needs.

► True

► False

We use the term _______ to refer to a measure of the path that routing software use when
choosing a route.

► routing path

► routing metric

► routing

► switching

Question No: 1 ( Marks: 1 ) - Please choose one

In Point-to-Point topology there are two topologies.


► Star and Tree
► Tree and Ring

► Star and Ring

► Star and Tree

► None of the given

Question No: 2 ( Marks: 1 ) - Please choose one

------ Program sends a message to a remote computer and reports whether the computer responds.

► Ping
► Ping
Ping

► Traceroute

► ICMP

► Non of the given

Question No: 3 ( Marks: 1 ) - Please choose one

------ has no way to determine the cause of the problem.


► ICMP
► ICMP

► Non of the given

► Ping

► Trace route

Question No: 4 ( Marks: 1 ) - Please choose one

The term----- ------- refers to the general concept of a small block of data

► Packet
► Packet

► Frame

► Data

► None of the given

Question No: 5 ( Marks: 1 ) - Please choose one


---------- scheme, which is designed to help detect transmissions errors, send one extra bit of
information with each character

► Parity
► Parity

► Checksums

► CRC

► None of given

Question No: 6 ( Marks: 1 ) - Please choose one

Local Talk is a LAN technology that employs -------------

► Bus topology
► Bus topology

► Ring topology

► None of the given

► Star topology

Question No: 7 ( Marks: 1 ) - Please choose one


Most LANs that employ ring topology use an access mechanism known as-------

► TOKEN PASSING
► CSMA/CD

► CSMA/CA

► TOKEN PASSING

► None of the given

Question No: 8 ( Marks: 1 ) - Please choose one

Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the
manufacturer.

► 64
► 64

► 48

► 32

►8
Question No: 9 ( Marks: 1 ) - Please choose one

Formally named __________ informally known as the thick wire Ethernet or Thick net.

► 10 Base T
► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given

Question No: 10 ( Marks: 1 ) - Please choose one

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

► 10 Base 2
► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given


Question No: 11 ( Marks: 1 ) - Please choose one

The maximum size of an Ethernet segment is___________

► 500 meters
► 250 meters

► 500 meters

► 700 meters

► None of the given

Question No: 12 ( Marks: 1 ) - Please choose one

A Bridge can ________

► Do all the above


► Filter a frame

► Forward a frame

► Extend a LAN

► Do all the above


Question No: 13 ( Marks: 1 ) - Please choose one

________ computes shortest paths in a graph by using weights on edges as a measure of distance.

► Dijksta’s algorithm
► Greedy algorithm

► Distance vector algorithm

► Dijksta’s algorithm

► Non of the given

Question No: 14 ( Marks: 1 ) - Please choose one

__________is used for compressed audio and video where the data rate depends on the level of
compression that can be achieved.

► Constant Bit Rate (CBR) service


► Constant Bit Rate (CBR) service

► Variable Bit Rate (VBR) service

► Available Bit Rate (ABR) service

► None of the given


Question No: 15 ( Marks: 1 ) - Please choose one

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.

► Connection-oriented service paradigm


► Connectionless service paradigm

► Connection-oriented service paradigm

► Both Connectionless and Connection-oriented service paradigm

► None of the given

Question No: 16 ( Marks: 1 ) - Please choose one

The product of delay and throughput measures the _____ of data that can be present on the network.

► None of the given


► Area

► Volume

► Length
► None of the given

Question No: 17 ( Marks: 1 ) - Please choose one

A network with throughput T and delay D has a total of ________ bit in transit at any time.

►TxD
►T/D

►TxD

►T+D

► None of the given

Question No: 18 ( Marks: 1 ) - Please choose one

One repeater _______, two repeaters ________ the maximum cable length limitation.

► doubles, triple
► doubles, triple

► square roots, cude roots


► and, triple

► doubles, cancel

Question No: 19 ( Marks: 1 ) - Please choose one

A network uses a ------ if all computers attach to a central point

► Star Topology
► Star Topology

► Ring Topology

► Bus Topology

► None of the given

Question No: 20 ( Marks: 1 ) - Please choose one

Computers attached to an ethernet use ------ in which a computer waits for the ether to be idle before
transmitting a frame.

► TOKEN PASSING
► CSMA/CD
► CSMA/CA

► TOKEN PASSING

► None of the given

Question No: 1 ( Marks: 1 ) - Please choose one

No error detection scheme is perfect because transmission errors can affect the additional information as
well as the data.

► True

► False

Question No: 2 ( Marks: 1 ) - Please choose one

------ Program sends a message to a remote computer and reports whether the computer responds.

► Ping
Ping

► Traceroute

► ICMP
► Non of the given

Question No: 3 ( Marks: 1 ) - Please choose one

---------- was especially concerned about the lack of high powered computers.

► ARPA

► IEEE

► EIA

► Non of the given

Question No: 4 ( Marks: 1 ) - Please choose one

The term -------- is used to denote the definition of a packet used with a specific type of network.

► Packet

► Frame

► Data
► None of the given

Question No: 5 ( Marks: 1 ) - Please choose one

Computer networks are often called -------------- because they use packet technology.

► Ethernet

► Switch networks

► Packet networks

► None of the given

Question No: 6 ( Marks: 1 ) - Please choose one

-------------- have advantages arisen from the size and ease of computation.

► CRC

► Parity

► Checksums
► None of given

Question No: 7 ( Marks: 1 ) - Please choose one

Most LANs that employ ring topology use an access mechanism known as-------

► CSMA/CD

► CSMA/CA

► TOKEN PASSING

► None of the given

Question No: 8 ( Marks: 1 ) - Please choose one

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

► 8 octets

► 8 bytes

► 8 bits
► None of the given

Question No: 9 ( Marks: 1 ) - Please choose one

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given

Question No: 10 ( Marks: 1 ) - Please choose one

An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals
according to the_____________ specification.

► RJ-45, 10 Base T

► RJ-45, 10 Base 5

► BNC, 10 Base 2
► BNC, 10 Base T

Question No: 11 ( Marks: 1 ) - Please choose one

A bridges function in the _________ layers(s).

► Physical (MAC)

► Data link

► Network

► Physical (MAC) and Data link

Question No: 12 ( Marks: 1 ) - Please choose one

A Bridge can ________

► Filter a frame

► Forward a frame

► Extend a LAN

► Do all the above


Question No: 13 ( Marks: 1 ) - Please choose one

A Bridge forwards or filters a frame by comparing the information in its address table to the
frame’s__________

► Layer 2 source address

► Source node’s physical address

► Layer 2 destination address

► Layer 3 destination address

Question No: 14 ( Marks: 1 ) - Please choose one

________ computes shortest paths in a graph by using weights on edges as a measure of distance.

► Greedy algorithm

► Distance vector algorithm

► Dijksta’s algorithm

► Non of the given


Question No: 15 ( Marks: 1 ) - Please choose one

___________ is used for audio and video, since these have predefined maximum data rates

► Constant Bit Rate (CBR) service

► Variable Bit Rate (VBR) service

► Available Bit Rate (ABR) service

► None of the given

Question No: 16 ( Marks: 1 ) - Please choose one

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .

► Connectionless service paradigm

► Connection oriented service paradigm

► Both Connectionless and Connection-oriented service paradigm

► None of the given

Question No: 17 ( Marks: 1 ) - Please choose one


A network with throughput T and delay D has a total of ________ bit in transit at any time.

►T/D

►TxD

►T+D

► None of the given

Question No: 18 ( Marks: 1 ) - Please choose one

ATM is designed to work on___________.

► Twisted Pair

► Coaxial

► Radio Frequency

► Fiber

Question No: 19 ( Marks: 1 ) - Please choose one


Computers attached to an ethernet use ------ in which a computer waits for the ether to be idle before
transmitting a frame.

► CSMA/CD

► CSMA/CA

► TOKEN PASSING

► None of the given

Question No: 20 ( Marks: 1 ) - Please choose one

FDDI can transmits data at a rate of ----------

► 100 million bits per second

► 10 million bits per second

► 1000 million bits per second

► None of the given

Computer Network s (CS 6 1 0 )


Ethernet uses a ---------bit static addressing scheme in which each device is assigned a unique address by
the manufacturer.

Ethernet uses a__________________ static addressing scheme in which each device is assigned a unique
address by the manufacturer.

x 64 x 48
x 32 x 8

The -----------bit preamble in the Ethernet frame format that precedes the frame contains alternating 1s and

0s that allow the receiver’s hardware to synchronize with the incoming signal.

x 64

x 32

16 x
8

The third field of the header consists of -------bit Ethernet frame type.

x 48 x 32
x 16 x 8

An interface for twisted pair Ethernet must have


according to the______________specification. a_____________connector, and must generate signals

x BNC- t base 10

x RJ 45- t base 10

x BNC-t base 5

x RJ 45-t base 2

A bridge uses the_____________to determine which computers connect to which segment, and uses the to
determine whether to forward a copy of frame.

x Source , destination

x Source , source

x Destination, source

x None from above

Formally named____________informally known as the thick wire Ethernet or Thick net.

x 10 Base 2 x 10
Base 5 x 10
Base T

x None of the given

Formally named ---------------informally known as thin wire Ethernet or thin net.


x 10 Base 2 x 10
Base 5 x 10 Base T

x None of the given

Formally named___________informally known as the twisted pair Ethernet or TP Ethernet.

x 10 Base 2 x 10
Base 5 x 10
Base T
circuitry that allows the NIC to operate independent of the CPU.
x None of the given

x DMA(Direct Memory Access)

x Multiplexer

x Transceiver

x None of the given

A system with redundant bridges might have a problem with________in the system.

x Loop

x Filters

x Spamming

x All above

ABridgecan

x Filter a frame

x Forward a frame x
Extend a LAN

x Do all the above

has a jitter zero

None of the given Virtual

Private Network

Isochronous Network

Asynchronous Network

UnlikeFrameRelayandATM,SMDS(Switchedmulti-megabitDataservice)offers Connectionless service paradigm

Connection oriented service paradigm

Both Connectionless and Connection-oriented service paradigm

None of the given

ATM assigns each VC a_______________identifier that is divided two parts to produce a hierarchy.
x 21-bit

x 22-bit

x 23-bit

x 24-bit

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication
routing is called________________________________________________________________________

x Hierarchal address

x Default route

x Shortest path

x None of the given

The next hop to which a packet is sent depends only on

x Packet’s destination

x Packet’s original source

x Path the packet has taken

x Non of the given

When an application-------------------data, it makes a copy of the data available to all other computers on the
network?

x Broadcasting

x Multicasting

x Unicasting

x None of the given

A ------------provide a mechanism that a customer can use to set a physical address.

x Static addressing scheme

x Configurable addressing scheme

x Dynamic addressing scheme

x None of the given

sense a signal on one cable and then transmits an amplified copy on the other cable.

x Repeater

x Bridge

x Hub

x None of the given

ThemaximumsizeofanEthernetsegmentis
x 250 meters x 500
meters x 700
meters

x None of the given

FDDI can transmits data at a rate of -----

x 100 million bits per second

x 100 million bits per second

x 100 million bits per second

x None of the given

Computers attached to an ether use ------------------in which a computer waits for the ether to be idle before
transmitting a frame.

x CSMA/CD x CSMA/CA

x TOKEN PASSING

x None of the given

---------------have advantages arisen from the size and ease of computation.

x CRC

x Parity

x Checksums

x None of given

The term ---------is used to denote the definition of a packet used with a specific type of network.

x Packet

x Frame

x Data

x None of the given

-------has no way to determine the cause of the problem.

x Ping

x Trace route

x ICMP

x Non of the given

In --------------, network occupies the smaller area like a room a floor or a building

x LAN

x WAN

x MAN
x None of the given

In ---------, network occupies larger areas like cities & countries.

x LAN

x WAN

x MAN

x None of the given

No error detection scheme is perfect because transmission errors can affect the additional information as
well as the data.

x False

x True

A typical port on an ATM switch operates at____________or higher.

x OC-2 speed (155Mbps) x


OC-3 speed (100Mbps) x OC-
3 speed (1 55Mbps) x OC-3
speed (155Gbps)

The product of delay and throughput measures the --------of data that can be present on the network.

x Area

x Volume

x Length

x None of the given

is used for compressed audio and video where the data rate depends on the level of
compression that can be achieved.

x Constant Bit Rate (CBR) service x


Variable Bit Rate (VBR) service x
Available Bit Rate (ABR) service x
None of the given

Which of the following is a connecting device?

x Bridge

x Repeater

x Hub

x All the given

A bridges function in the__________layers(s).


x Physical (MAC)

x Data link

x Network
by comparing the information in its address table to the
x Physical (MAC) and Data link

x Layer 2 source address

x Source node’s physical address

x Layer 2 destination address

x Layer 3 destination address

IEEE LLC/SNAP header is ---------, which is used to specify the type of data.

x 8 octets

x 8 bytes

x 8 bits

x None of the given

An --------------method, the network hardware designers specify how type information is included in the
frame and the value use to identify various frame types.

x Explicit frame type

x Ideal frame type

x Implicit frame type

x None of the given

Local Talk is a LAN technology that employs -------------

x Star topology

x Bus topology

x Ring topology

x None of the given

The Fast Ethernet hardware operates at a rate of -------

x 10 Mbps

x 100 Mbps

x 1000 Mbps

x None of the given

-----------scheme, which is designed to help detect transmissions errors, send one extra bit of information
with each character

x Parity

x Checksums

x CRC
x None of given

Computer networks are often called ---------------because they use packet technology.

x Ethernet

x Switch networks

x Packet networks

x None of the given Å NS

-------Program sends a message to a remote computer and reports whether the computer responds.

x Ping

x Traceroute

x ICMP

x Non of the given

In Point-to-Point topology there are two topologies.

x Tree and Ring x


Star and Ring x Star
and Tree

x None of the given

A network uses a ------arranges for computers to be connected in a closed loop.

x Star Topology

x Ring Topology

x Bus Topology

x None of the given

An interface for thin Ethernet must have an__________________ connector, and must generate signals

according to the______________specification.

x RJ-45, 10 Base T x
RJ-45, 10 Base 5 x
BNC, 10 Base 2 x BNC,
10 Base T

Final Starts Here

of TCP/IP layering model, corresponds to basic network hardware.

x Physical Layer

x Network Interface Layer

x Internet Layer

x Transport Layer
protocols of TCP/IP layering model specify how to ensure reliable transfer.

x Physical Layer

x Network Interface Layer

x Internet Layer

x Transport Layer

is called an end-to-end protocol because it provide a connection directly from an application on


one computer to an application on a remote computer.

x IP

x UDP x TCP

x None of the given

uses distance vector approach to define routing

x BGP

x OSPF

x RIP

x None of the given

is ideal in a situation where the group is small and all members are attached to contiguous Local
Area Networks.

x Flood-and -Prune

x Configuration-and -Tunneling

x Core-Based Discovery

x None of the given

Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source
address

x 3 x 2 x
1 x0

Protocol addresses are abstractions provided by____________.

x hardware

x software

x operating system

x internet

Although message exchange can be used to bind addresses, sending a request for each binding is
hopelessly inefficient.

x True
x False

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

x 32, 48 x 24,
32 x 32, 64 x
32, 128

In the 1970s large organizations began to acquire multiple networks. Each network in the organization

formed island. Employees needed to choose a computer appropriate for each task. So they needed

multiple screens, keyboards and computers.

x False

x True

In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

xT xD x
C

x T, C

Which method of Address Resolution Protocol is useful with any hardware?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange? x T

xC xD

x C, D

In which method of Address Resolution Protocol the implimentation is more difficult?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

x T, C

x T x C x
D

Which method of Address Resolution Protocol resolution with minimum delay?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

x T, D x c

xT

x T, C

The general form of an IP datagram is with a header followed by data. The header contains information that
controls where and how the datagram is to be sent.

x True

x False
To save traffic, an EGP does not summerize routing information from the autonomous system before
passing it to another autonomous system.

x True x False

--------------was especially concerned about the lack of high powered computers.

x IEEE

x APRA

x EIA

x None

Missing eot indicates sending computer crashed in frame format.

x True x False

The -------------term refers to the general concept of a small block of data.

x Packets

x Data x Fram

x None of given

CRC can detect more errors than a simple shecksum.

x True x False

The network that uses a -------------, usually consist of a single long cable to which computer attach.

x Star topology x Bus


topology

x Ring topology

x None of the given

LAN that use ATM technology have a -------------

x Star topology

x Bus topology

x Ring topology

x None of the given

A bridge uses ----------------to determine which computer is connected to which segment, and uses the -----

-----------to determine whether to forward a copy of frame.

x Source address, destination address. x


Destination adress, destination address. x
Destination adress, source address. x source
adress, source address.

----------------has a jitter zero


x Virtual Private Network

x Isochronous Network

x Asynchronous Network

x None of the given

The network with Throughput T and Delay D has a total ----------------bits in transit at a time.

xD + T xD –
T xD X T xD
/T

One repeater -----------------, two repeaters --------------the maximum cable length limitation.

x Double, triple x Double, 4 time

x half, triple

x Double, half

End-to-end delivery service is connection oriented.

x True

x False

A single networking technology is best for all needs.

x True

x False

Twice NAT allows a site to run servers.

x True

x False

device is used for multicasting.

x Hub

x Switch

x Router

x none of the given

does not depend on any particular unicast routing protocol.


x PIM-DM x
PIM-SM x
PIM-AM

x none of the given

Aroutingtablecontains

x The destination network ID

x The hop count to reach the network

x The router ID of the next hop

x All of the given

can be used to propagate information about remote networks.

x Dynamic routing x
Static routing

x Address resolution x
None of the given

protocol is designed to use within an organization.

x OSPF

x MEOSPF

x MOSPF

x none of the given

NAPTstandsfor

x Network Address and Protocol Translation

x Network Address and Port Translation

x Network Address and Packet Translation

x None of the given

In dynamic routing, the routing table is initialized when system boots.

x True

x False

OSPF includes address mask with each address.

x 30Bit x
32Bit x
34Bit

x none of the given

Twice NAT fails if an application uses the IP addresses instead of Domain Name.
x True

x False

uses window mechanism to control the flow of data.

x IP

x UDP x TCP

x none of the given

TCP uses mechanism to control the flow of data.

x door

x window

x acknowledgment
x retransmission
IGPs stand for

x Internal Gateway Protocols

x Interior Gateway Protocols

x Intermediate Gateway Protocols

x None of the given

protocol uses distance vector algorithm.

x IGP x
BGP x RIP

x none of the given

measures distance in network hops, where each network between the source and destination
counts as single hop.

x BGP

x OSPF

x RIP

x Non of these

Network Address Translation (NAT) requires device to perform packet translation.

x True

x False

We use the term____________to refer to a measure of the path that routing software use when choosing a
route.

x routing path

x routing metric

x routing

x switching

Which of the following is a correct representation of the IPv6?

x 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255

x 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255

x 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256

x 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255

Part of the 3-way handshake used to create a connection, requires each end to generate a random ---------
sequence number.

x 32 bit
x 16 bit

x 8 bit

x 64 bit

Reconstruction of original datagram is called reassembly.

x True x False

Reliability is the responsibility of the________layer.

x Transport x
Network x
Physical

x Internet

is ideal in a situation where the group is small and all members are attached to contiguous
Local Area Networks.

x Flood-and -Prune

x Configuration-and -Tunneling

x Core-Based Discovery

x None of the given

In Direct point to point communication adding the Nth computer requires-------------new connections.

x None of the given

xN 2

x N-1

x (N2 –N)/2

The number of connections needed for N computer in direct point to point communication is equal to:

x (N2-N)/2

x N(N-1)

xN 2

x None of the given

Hardware that calculates a CRC uses two simple components.

x AND unit and XOR unit

x Shift register and XOR unit

x Shift register and AND unit

x None of the given

The Gigabit Ethernet hardware operates at a rate of --------

x 10 Mbps
x 100 Mbps

x 1000 Mbps

x None of the given

computes shortest paths in a graph by using weights on edges as a measure of distance.

x Greedy algorithm

x Distance vector algorithm

x Dijksta’s algorithm

x Non of the given

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a ---------.

x Connectionless service paradigm

x Connection-oriented service paradigm

x Both Connectionless and Connection-oriented service paradigm

x None of the given

An Internet Address (IP address) is a unique____________binary number assigned to a host and used for
all communication with host

x 48-bit

x 32-bit

x 24-bit

x None of the given

The address_____________ identifies the physical network to which the computer is attached, while the
identifies an individual computer on that network.
x prefix , suffix

x suffix , prefix

x suffix , suffix

x None of the given

places the boundary between the first and second octets

x Class A x
Class B x
Class C x
Class D

places the boundary between the second and third octets.

x Class A x
Class B x
Class C x
Class D

places the boundary between the third and fourth octets.

x Class A x
Class B x
Class C x
Class D

field of header indicates whether a datagram is a fragment or a complete datagram.

x FLAGS

x FLAGMENT OFFSET

x IDENTIFICATION

x None of the given

provides connectionless service.

x TCP x
UDP x
IP

x None of the given

UDP and TCP are both__________layer protocols

x Physical

x Data link

x Network

x Transport

identifies which application program on receiving computer should receive the data
Logical address

§ Source port
§ Source port
§ Destination Port
§ None of the given identifies the application program that
sent the data.

§ Destination Port
§ Source port
§ Logical address
x None of the given

The Border Gateway Protocol (BGP) uses__________for all communication

x UDP x TCP

x Both UDP and TCP

x None of the given

Which of the following protocols allows the sender and receiver to enforce polices.

x RIP

x OSPF

x BGP

x RIP and OSPF

ICMP message transport is acted upon by getting ICMP encrypted in IP.

x True x False

Thesepacketsservesamepurposeon____________________as frames on

x Intranet, LAN x
Internet, WAN x
Intranet, WAN x
Internet, LAN

Address mask defines how many bits of address are in suffix?

x True

x False

A computer attached to a given network can only communicate with other computers attached to the same
network. Is this a problem with multiple networks?

x True

x False

The term self-identifying is used for Classful IP addresses because the class of the address can be
computed from the address__________.

x itself

x prefix

x suffix x mask

Find the class of the address:

11110011 10011011 11111011 00001111

x A x C x
E xB
Find the class of the address.

10100111 11011011 10001011 01101111

xA xB

xE

xC

On of the design goals for unicast route propagation is___________.

x consistency

x inconsistency

x stability

x dynamic addressing

Propagation multicast routing information differs dramatically from unicast route propagation?

x True

x False

The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast
group at any time. While_______________application on a computer remain a member of a group.

x one or more

x only one

x no Å

x many

In IPv6 the type of address used for collection of computers with same prefix. Are known as__________.

x Anycast

x Unicast

x Multicast

x Non of the given Æ Cluster

Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as .

x Unicast

x Anycast

x Multicast

x Non of the given

UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to
preserve data boundaries.
x True

x False

The time for acknowledgement to arrival of packet depends on.

x Distance to destination and Current traffic conditions

x Current traffic conditions

x Distance to destination

x non of these

Cost, effort, risks, and resources are the factors included in--------

x Estimation x
Testing

x Development x
Maintenance
Quiz_12_07_2010

There are_________possibilities to detect the destination using Trace-route

§ 1
§ 2
§ 3
§ None of the given
is used for single destination computer.

§ Multicast
§ Broadcast
§ unicast
x none of the given

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware
addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.

x 16-bit x 48-bit

x 64-bit

x 128-bit

Which is not the type of error messages defined by ICM P.

x Source quench

x Time exceeded

x Destination unreachable

x none of the given

End to End delivery Service of IP datagram is ---------


x Connection oriented x
Connection less x both a
and b

x none of the given

is a type of address used for collection of computers with same prefix.

x Cluster

x unicast

x Multicast

x none of the given

IPv6_________________ is responsible for fragmentation. Routers simply drop datagram’s larger than
network

x Destination

x Intermediate routers

x Source x Medium

Source is responsible for fragmentation.

x IPV4 x IPV6

message is sent in response to incoming datagrams with problems.

x TCP/IP x
IGMP x ICMP

x none of the given

field is used to identify a specific path through the network

x FLOW LABEL

x TRAFFIC CLASS x
Both a and b

x none of the given

Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction &
operating system independent are the characteristics of_________________________________________

x TCP x
UDP x
IP

x None of the given

The process of using a routing table to select a next hop for a given datagram is called

x Encapsulation x Reassembling

x Routing or forwarding
x None of the given

A multicast routing scheme in which the protocol software builds a delivery tree from a central point is
called________________________________________________________________________________

x Distance Vector Multicast Routing Protocol (DVMRP)

x Core Based Tree (CBT)

x Protocol Independent Multicast_Sparse Mode (PIM-SM)

x Protocol Independent Multicast_Dense Mode (PIM-DM)

Whenever it handles a packet, IP software needs to separate the destination address into a____________

and_____________.

x postfix, Infix x non of these

x Infix, prefix

x prefix, suffix

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream


interface, Reliable connection startup and Graceful connection shutdown are the services provided by____

x None of the given

x TCP x
UDP x
IP

Protocol provides error reporting mechanism.

x IGMP x
SNMP x
ICMP

x none of the given

encapsulates IP datagram as data area in hardware frame.

x Network Interface Layer

x Datalink Layer x Network Layer

x None of the given

TTL stands for___________

§ Time to Learn
§ Time to Leave
§ Time to Live
§ none of the given
layer Provides reliable delivery of datagram.

x Network
x Transport x
Datalink

x none of the given

Which protocol is used to test different tools.

x ICMP x IGMP
x TCP/IP

x none of the given

Routers use_________to forward datagrams along prearranged path.

x Traffic class

x Flow label

x Destination address

x none of the given

NEXT HEADER field in the base header defines type of header it appears at the end of fixed-size base
header.

x TRUE

x FALSE

Every hardware technology specification includes the definition of the maximum size of the frame data
area, which is called the______________Transmission Unit.

x Least

x Maximum

x Fragment

x Frame

Postfix defines how much of address used to identify network.

x TRUE

x FALSE Æ Prefix

contains all information needed to deliver datagram to the destination.

x Header

The Source can configure outgoing datagram’s to avoid___________

x Segmentation

x Defragmentation x
Fragmentation

x None of the given

The Current version of IP-Version 4 is ---------old


x 18 years x 20 years

x 22 years

x none of given

The Header format of IPv6 is entirely different.

x TRUE

x FALSE

shows senders preference for low latency, high Reliability.

x TYPE

x SERVICE TYPE

x SERVICE PRIORITY

x None of the given

TheNetworkLayerProtocolICMPstandsfor

x Instant Control Message Protocol

x Internet Control Message Protocol

x Initial Control Message Protocol

x None of the given IPV6 address consists of

x 32 Bits x 64
Bits x 128 Bits

x none of the given

is a technique used to Limit datagram size to small MTU of any network

x Segmentation x
Fragmentation x
Encapsulation

x none of the given

ICMP message transport is acted upon by getting ICMP___________in IP.

x De-encapsulated x
Encapsulated x
Segmented

x none of the given

IETFstandsfor

x Internet Engineering Task Force

x Internal Efficient Task Force

x Internet Engineering Technical Force


x none of the given

Which of the following protocols provide the routing information at the autonomous system level?

x BGP

x OSPF

x RIP

x OSPF and RIP

Aone-to-manycommunicationbetweenasourceandaspecificgroupofhostsisclassifiedasa communication.

x Unicast

x Multicast

x Broadcast

x Unicast & Multicast

includes a 32-bits address mask with each address, which allows the address to be classful,
classless, or subnetted.

x RIP

x OSPF

x BGP

x None of the given

In TCP when a computer sends a segment, the___________and________fields refer to incoming data.

x ACKNOWLEGE NUMBER, WINDOW

x SEQUENCE NUMBER, WINDOW

x ACKNOWLGEGE NUMBER, SEQUENCE NUMBER x


None of the given

is used to attach two autonomous systems.

x BGP x
IGP x EGP

x none of the given

Routing inserts or changes values in

x MAC address x routing table

x both (a) and (b)

x None of the given

NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.

x True
x False

Each autonomous system used to communicate among autonomous systems by chooses an IGP.

x True

x False

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet
Routing Protocol.

x True x False

The computer uses___________to inform Local router about the last application when it leaves.

x ICMP x
IGMP x
SNMP

x None of the given

IPV6 address with________leading zeros is interpreted to hold an IPV4 address.

x 96 x 100
x 120

x none of the given

For_______________, information about forwarding is stored in a routing table, which is initialized at system
initialization and must be updated as network topology changes.

x Efficiency x
Security x
Accuracy x
Anomalies

Class A mask is 255.0.0.0 which is used for

x Unicasting

x Multicasting

x Subnetting

x All of the given

When one computer sends an ARP message to another the message travels inside the hardware frame.
Technically, placing a message inside a frame for transport is not called encapsulation.

x True

x False

Which one of these is not a main feature of connectionless service:

x It includes extension of LAN abstraction.

x It has universal addressing and the data is delivered in packets frames), each with a header. x
It combines collection of physical networks into a single virtual network.
x It has universal addressing and the data is delivered in packets frames), without a header.
Which one is NOT the function of ping program

x Traceability

x Reach ability

x Both a and b

x None of the given

A datagram cannot be larger than__________of a network over which it is sent.

x MTU

x Size

x IP header

x None of the given MTU


Stands for

x Minimum transmission unit

x Maximum transmission unit

x Multicast transmission unit

x None of the given

Fragmentation when using ICMP for path MTU should be avoided.

x True x False

HEADER LEN field gives size of extention header.

x False x True

The process of learning the path MTU is known as path MTU discovery.

x True
x False

is less complex and easy to understand.

x TCP x
UDP x
IP

x None of the given

IPV6 128 bits address includes network prefix and__________

x Host sufix

x Host prefix

x source Prefix

x None of the given

The Universal Datagram is not an end-to-end protocol.

x True x
False

The routers within an autonomous system use a______________to exchange routing information.

Interior Gateway protocols(IGPs)

In IP routing, forwarding refers to________transfer.

datagram

The Border Gateway Protocol (BGP) uses__________for all communication

TCP

In TCP when a computer sends a segment, the___________and________fields refer to incoming data.

Routing refers to the____________of routing information.

propagation

NAT device stores state information in translation table.

True

A one-to-many communication between a source and a specific group of hosts is classified as a_______communication
identifies the application program that sent the data.

None

OSPF stands for

Open Shortest Path First Protocol

Unicasting
multi cast

is used to attach two autonomous systems.

none of the given

Routing inserts or changes values in_______________________________________________

routing table

The computer uses___________to inform Local router about the last application when it leaves.

IGMP

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of
Internet Routing Protocol

True

Quiz Start Time: 09:22 PM Time Left 84

sec(s)

Question # 1 of 10 ( Start time: 09:22:58 PM ) Total Marks: 1

Class A mask is 255.0.0.0 which is used for_______

Select correct option:

A one-to-many communication between a source and a specific group of hosts is classified as a_______communication
Multicasting

Su bnetting

All of the given

Network Interface Layer


www.virtualinspire.com

Question # 3 of 10 ( Start time: 04:36:51 PM ) Total Marks: 1


www.virtualinspire.com

Question # 1 of
10 ( Start time:
04:33:55 PM )

encap

sulates IP

datagram as

data area in

hardware frame.

Question # 3 of 10 ( Start time: 04:36:51 PM ) Total Marks: 1


www.virtualinspire.com

Select correct

option:

Question # 3 of 10 ( Start time: 04:36:51 PM ) Total Marks: 1


Datalink Layer

Network Layer

None of the given

CS6 10-Computer network

Question # 2 of 10 ( Start time: 04:35:26 PM ) Total Marks: 1

field is used to identify a specific path through the network

Select correct option:

FLOW LABEL

TRAFFIC CLASS

Both a and b

none of the given

Question # 3 of 10 ( Start time: 04:36:51 PM ) Total Marks: 1


IPV6 address with________leading zeros is interpreted to hold an IPV4 address.

Select correct option:

96

100

120

none of the given

Question # 4 of 10 ( Start time: 04:38:19 PM ) Total Marks: 1

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware
addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.

Answer

(48bit)

Select correct option:

Question # 5 of 10 ( Start time: 04:39:45 PM ) Total Marks: 1

For_______________, information about forwarding is stored in a routing table, which is initialized at


system initialization and must be updated as network topology changes.
Select correct option:

Efficiency

Security

Accuracy

Anomalies

Question # 6 of 10 ( Start time: 04:41:15 PM ) Total Marks: 1

is a technique used to Limit datagram size to small MTU of any network

Select correct option:

Segmentation

Fragmentation

Encapsulation

none of the given


Question # 7 of 10 ( Start time: 04:42:37 PM ) Total Marks: 1

Class A mask is 255.0.0.0 which is used for_______ Select

correct option:

Unicasting

Multicasting

Su bnetting

All of the given

Question # 8 of 10 ( Start time: 04:44:08 PM ) Total Marks: 1

When one computer sends an ARP message to another the message travels inside the
hardware frame. Technically, placing a message inside a frame for transport is not called
encapsulation.

Select correct option:


True

False

Question # 9 of 10 ( Start time: 04:45:12 PM ) Total Marks: 1 Which

one of these is not a main feature of connectionless service: Select

correct option:

It includes extension of LAN abstraction.

It has universal addressing and the data is delivered in packets frames), each with a header.

It combines collection of physical networks into a single virtual network.

It has universal addressing and the data is delivered in packets frames), without a header.

Select correct option:


www.virtualinspire.com
Question # 10 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1

Which protocol is used to test different tools.

Select correct option:


ICMP

IGMP

TCP/IP

none of the given

Question # 1 of 10 ( Start time: 04:49:54 PM ) Total Marks: 1

message is sent in response to incoming datagrams with problems.

Select correct option:

TCP/IP

IGMP

ICMP

none of the given


www.virtualinspire.com
Question # 2 of 10 ( Start time: 04:50:45 PM ) Total Marks: 1

Which one is NOT the function of ping program


www.virtualinspire.com
Select correct option:

Traceability

Reach ability

Both a and b

None of the given

Question # 3 of 10 ( Start time: 04:52:14 PM ) Total Marks: 1

IPV6 address with_______leading zeros is interpreted to hold an IPV4 address.

Select correct option:

96

100

120
Question # 4 of 10 ( Start time: 04:52:32 PM ) Total Marks: 1

A datagram cannot be larger than__________of a network over which it is sent.

Select correct option:

MTU

Size

IP header

None of the given

Question # 5 of 10 ( Start time: 04:52:55 PM ) Total Marks: 1

TheSourcecanconfigureoutgoingdatagram’stoavoid Select correct option:

Segmentation

Defrag mentation
Fragmentation
None of the given

Question # 6 of 10 ( Start time: 04:54:24 PM ) Total Marks: 1 Which

one of these is not a main feature of connectionless service: Select

correct option:

It includes extension of LAN abstraction.

It has universal addressing and the data is delivered in packets frames), each with a header.

It combines collection of physical networks into a single virtual network.

It has universal addressing and the data is delivered in packets frames), without a header.

Question # 7 of 10 ( Start time: 04:55:27 PM ) Total Marks: 1

Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the_____________Transmission Unit.

Select correct option:

Least

Maximum
Fragment

Frame

Question # 8 of 10 ( Start time: 04:56:40 PM ) Total Marks: 1

Protocol provides error reporting mechanism. Select

correct option:

IGMP

SNMP

ICMP

none of the given

Question # 9 of 10 ( Start time: 04:57:51 PM ) Total Marks: 1 Source is

responsible for fragmentation.

Select correct option:

I PV4
www.virtualinspire.com

I PV6

Question # 10 of 10 ( Start time: 04:58:56 PM ) Total Marks: 1

MTU Stands for________

Select correct option:

Mininum transmission unit

Maximum transmission unit

Multicast transmission unit

None of the given

Question # 1 of 10 ( Start time: 10:18:08 PM ) Total Marks: 1

Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the____________Transmission Unit.

Select correct option:

Least
Maximum Fragment
www.virtualinspire.com
Frame

Question # 2 of 10 ( Start time: 10:19:35 PM ) Total Marks: 1

IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.

Select correct option:

Question # 3 of 10 ( Start time: 10:20:11 PM ) Total Marks: 1

is a type of address used for collection of computers with same prefix.

Select correct option:

Cluster

unicast

Multicast

none of the given

Question # 4 of 10 ( Start time: 10:21:24 PM ) Total Marks: 1

field is used to identify a specific path through the network


www.virtualinspire.com
Select correct option:

FLOW LABEL

TRAFFIC CLASS

Both a and b

none of the given

Question # 5 of 10 ( Start time: 10:22:16 PM ) Total Marks: 1

message is sent in response to incoming datagrams with problems.

Select correct option:

TCP/IP

IGMP ICMP

none of the given

Question # 6 of 10 ( Start time: 10:22:56 PM ) Total Marks: 1

___ Protocol provides error reporting mechanism.

Select correct option:

IGMP

SNMP
www.virtualinspire.com
ICMP

none of the given

Question # 7 of 10 ( Start time: 10:23:53 PM ) Total Marks: 1

One of the parameters, which motivated IP for change is address space. The____________
address space allows for over a million networks. But most networks are class C and too small
for many organizations.

Select correct option:

32-bit

128-bit

16-bit

64-bit

Question # 8 of 10 ( Start time: 10:24:41 PM ) Total Marks: 1

ICMP message transport is acted upon by getting ICMP_________in IP.

Select correct option:

De-encapsulated

Encapsulated

Segmented

none of the given

Question # 9 of 10 ( Start time: 10:26:04 PM ) Total Marks: 1


Class A mask is 255.0.0.0 which is used for ____

Select correct option:

Unicasting

Multicasting

Su bnetting

All of the given

Question # 10 of 10 ( Start time: 10:26:34 PM ) Total Marks: 1

Due to revolutionalization of IP-V6 the speed has increased from______

Select correct option:

56kbps to 512kbps

512kbps to 1gbps

56kbps to 1gbps

none of the given

Question # 1 of 10 ( Start time: 10:29:35 PM ) Total Marks: 1

Which protocol is used to test different tools.

Select correct option:

ICMP

IGMP

TCP/IP
www.virtualinspire.com
none of the given

Question # 2 of 10 ( Start time: 10:30:29 PM ) Total Marks: 1

Routers use_______to forward datagrams along prearranged path.

Select correct option:

Traffic class

Flow label

Destination address

none of the given

Question # 3 of 10 ( Start time: 10:31:40 PM ) Total Marks: 1

Source is responsible for fragmentation.

Select correct option:

I PV4 I PV6

Question # 4 of 10 ( Start time: 10:32:19 PM ) Total Marks: 1

Class A mask is 255.0.0.0 which is used for_______ Select

correct option:

Unicasting

Multicasting

Su bnetting
www.virtualinspire.com
All of the given

Question # 5 of 10 ( Start time: 10:32:54 PM ) Total Marks: 1

For_____________, information about forwarding is stored in a routing table, which is initialized at


system initialization and must be updated as network topology changes.

Select correct option:

Efficiency

Security

Accuracy

Anomalies

Question # 6 of 10 ( Start time: 10:33:31 PM ) Total Marks: 1

Header contains all information needed to deliver datagram to the destination computer. But
which one of the following is not included:

Select correct option:

Destination address

Source address

Rectifier

Other delivery information

Question # 7 of 10 ( Start time: 10:34:16 PM ) Total Marks: 1


www.virtualinspire.com
ICMP message transport is acted upon by getting ICMP_________in IP.

Select correct option:


De-encapsulated

Encapsulated

Segmented

none of the given

Question # 8 of 10 ( Start time: 10:35:11 PM ) Total Marks: 1

End to End delivery Service of IP datagram is______ Select

correct option:

Connection oriented

Connectionless

both a and b

none of the given

Question # 9 of 10 ( Start time: 10:36:10 PM ) Total Marks: 1

One of the parameters, which motivated IP for change is address space. The____________
address space allows for over a million networks. But most networks are class C and too small
for many organizations.
Select correct option:

32-bit

128-bit
16-bit

64-bit
Question # 10 of 10 ( Start time: 10:37:07 PM ) Total Marks: 1

Address mask defines how many bits of address are in prefix.

Select correct option:

True

False

Time Left 84 sec(s)

Quiz Start Time: 09:22 PM

Question # 1 of 10 ( Start time: 09:22:58 PM )


Total Marks: 1
Class A mask is 255.0.0.0 which is used for

Select correct option:

Unicasting

Multicasting

Subnetting

Click here to Save Answer & Move to Next Question


All of the given
www.virtualinspire.com

Time Left 83
sec(s)

Quiz Start Time:


09:22 PM

Question # 2 of
10 ( Start time:
09:23:54 PM )

IPV6 address with_______


leading zeros is
interpreted to hold
an IPV4 address.

Select correct
option:

Click here to Save

Answer & Move to Next


Question

Time Left
3
9
www.virtualinspire.com

s
e
c
(
s
)

Quiz Start Time:


09:22 PM

Question # 3 of
10 ( Start time:
09:24:23 PM )

ICMP message
transport is acted
upon by getting
ICMP_________________________
in IP.

Select correct
option:
www.virtualinspire.com

De-encapsulated

Encapsulated

Segmented

none of the given

Click here to Save


A n s w e r & Move to Next
Question

Time Left 6
s
e
c
(
s
)

Quiz Start Time:


09:22 PM

Question # 5 of 10
Total Marks: 1
( Start time:
09:27:02 PM )

Routers use________
to forward
datagrams along
prearranged path.
www.virtualinspire.com

Select correct
option:

Traffic class

Flow label

Destination
address
“doubt”

none of the
given
www.virtualinspire.com

Click here to Save Answer & Move to Next Question

Time Left 81 sec(s)

Quiz Start Time: 09:22 PM

Question # 6 of 10 ( Start time: 09:28:29 PM )


Total M
MTU Stands for

Select correct option:

Mininum transmission unit

Maximun transmission unit

Multicast transmission unit

None of the given

Click here to Save Answer & Move to Next Question

Time Left 62 sec(s)

Quiz Start Time: 09:22 PM


www.virtualinspire.com
Preliminary version of IP was called__________ .
Select correct option:

IP - New Generation (IPng)

IP - Next Generation (IPng)

IP - Net Generation (IPng)

None of the given

Click here to Save A n sw e r & Move to Next Question

Time Left 49 sec(s)

Quiz Start Time: 09:22 PM

Question # 8 of 10 ( Start time: 09:29:50 PM )


Total Marks: 1
contains all information needed to deliver datagram to the destination.

Select correct option:

Header

Data Area

Identifier
www.virtualinspire.com

Click here to Save Answer & Move to Next Question

Time Left 39 sec(s)

Quiz Start Time: 09:22 PM

Question # 9 of 10 ( Start time: 09:31:17 PM ) Total Marks: 1

field tells the receiver how to order fragments within a given datagram.

Select correct option:

FLAGS

FLAGMENT OFFSET

IDENTIFICATION “not confirm”


None of the given

Click here to Save Answer & Move to Next Question

Time Left 19
sec(s)
www.virtualinspire.com
Quiz Start Time: 09:22 PM

Question # 10 of 10 ( Start time: 09:32:47 PM ) Total Marks: 1

Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the______________Transmission Unit.

Select correct option:

Least
Click here to Save A n sw e r & Move to Next Question

Maximum

Fragment

Frame

Question # 2 of 10 ( Start time: 09:23:54 PM ) Total Marks: 1

IPV6 address with________leading zeros is interpreted to hold an IPV4 address.

Select correct option:

96
www.virtualinspire.com

Quiz Start Time: 09:22 PM Time Left 39

sec(s)

Question # 3 of 10 ( Start time: 09:24:23 PM ) Total Marks: 1

ICMP message transport is acted upon by getting ICMP___________in IP.

Select correct option:


www.virtualinspire.com
De-encapsulated

Encapsulated

Segmented

none of the given

a
www.virtualinspire.com
r

L
www.virtualinspire.com
e

Question # 5 of 10
( Start time:
09:27:02 PM )
Total Marks: 1

Routers use_________

to forward

datagrams along

prearranged path.

Select correct

option:
www.virtualinspire.com

Traffic class

Flow label

Destination address “doubt”

none of the given

Quiz Start Time: 09:22 PM Time Left 81 sec(s)

Question # 6 of 10 ( Start time: 09:28:29 PM ) Total Marks: 1

MTU Stands for_________________________________________

Select correct option:


www.virtualinspire.com

Mininum transmission unit

Maximun transmission unit

Multicast transmission unit

None of the given

Quiz Start Time: 09:22 PM Time Left 62

sec(s)

Question # 7 of 10 ( Start time: 09:28:57 PM ) Total Marks: 1


www.virtualinspire.com
Preliminary version of IP was called__________ .
Select correct option:

IP - New Generation (IPng)

IP - Next Generation (IPng)

IP - Net Generation (IPng)

None of the given

Quiz Start Time: 09:22 PM Time Left 49 sec(s)


contains all information needed to deliver datagram to the destination.

Select correct option:

Header

Data Area

Identifier

none of the given

Quiz Start Time: 09:22 PM Time Left 39 sec(s)


Question # 9 of 10 ( Start time: 09:31:17 PM ) Total Marks: 1

field tells the receiver how to order fragments within a given datagram.

Select correct option:

FLAGS

FLAGMENT OFFSET

IDENTIFICATION “not confirm”

None of the given

Quiz Start Time: 09:22 PM Time Left 19


Question # 10 of 10 ( Start time: 09:32:47 PM ) Total Marks: 1

Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the______________Transmission Unit.

Select correct option:

Least

Maximum

Fragment

Frame

MC080408134 : Muhammad Aamir Ayyub


Time Left 39
sec(s)

Quiz Start Time: 07:18 PM


Question # 1 of 10 ( Start time: 07:18:50 PM )
Total Marks: 1
protocol uses distance vector algorithm.

Select correct option:


IGP

BGP

RIP

none of the given

MC080408134 : Muhammad Aamir Ayyub


Time Left
s

Quiz Start Time: 07:18 PM

Question # 2 of 10 ( Start time: 07:20:03 PM )


Tot

NAT stands for

Select correct option:

Network Address Translation


Network Address Transmission

Network Address Test

None of the given

MC080408134 : Muhammad Aamir Ayyub


Time Left 33
TCP achieves by retransmission.
sec(s)

Quiz Start Time:option:


07:18 PM
Select correct

Question # 3 of 10 ( Start time: 07:21:02 PM ) Total Marks: 1

Efficiency

Accuracy

Reliability

none of the given


MC080408134 : Muhammad Aamir Ayyub
Time Left
s

Quiz Start Time: 07:18 PM

Question # 4 of 10 ( Start time: 07:22:11 PM )


Tot
Network Address and Port Translation (NAPT) is by far the most
popular form of

Select correct option:

MC080408134 : Muhammad Aamir Ayyub


Time Left
s

Quiz Start Time: 07:18 PM

Question # 4 of 10 ( Start time: 07:22:11 PM )


Tot
Network Address and Port Translation (NAPT) is by far the most
popular form of

Select correct option:

Network Address Transmission

Network Address Translation


Network Address Transformation
None of the given

MC080408134 : Muhammad Aamir Ayyub

Quiz Start Time: 07:18 PM

Question # 5 of 10 ( Start time: 07:23:37 PM ) Total Marks: 1

Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.

Select correct option:

False

True

MC080408134 : Muhammad Aamir Ayyub

Time Left 49
sec(s)
Quiz Start Time: 07:18 PM

Question # 6 of 10 ( Start time: 07:24:56 PM ) Total Marks: 1

TCP provides___________communication.

Select correct option:

Half-duplex

MC080408134 : Muhammad Aamir Ayyub


Full-duplex

Quiz Start Time:


Both 07:18
(a) and (b)PM

Question # 7 of 10 ( Start time: 07:26:03 PM )


None of the given Total Marks: 1

Routing refers to the__________of routing information.

Select correct option:

transmission

propagation
communication

None of the given

MC080408134 : Muhammad Aamir Ayyub


Time Left

Quiz Start Time: 07:18 PM

Question # 8 of 10 ( Start time: 07:26:50 PM )


Tota

All routers within a group exchange routing information.

Select correct option:

True

False

MC080408134 : Muhammad Aamir Ayyub


Quiz Start Time: 07:18 PM

Question # 9 of 10 ( Start time: 07:27:50 PM ) Total Marks: 1

A standard protocol exits that allows a host to inform a nearby router whenever the host needs to join or leave a particular
multicast group is known as__________.

Select correct option:

IGMP

OSPF

BGP

None of the given

MC080408134 : Muhammad Aamir Ayyub 54


Time Left
sec(s)

Quiz Start Time: 07:18 PM

Question # 10 of 10 ( Start time: 07:29:16 PM ) Total Marks: 1

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct opti on:

True

False

TTLstandsfor Select
correct option:

Time to Learn
Time to Leave
Time to Live
none of the given

---------------------------------------

H.LEN shows the header length in units of ____ Bits


Select correct option:

34
32
30
None of the given

---------------------------------------------------

There are_________possibilities to detect the destination using Trace-route


Select correct option:

1
2
3

----------------------------------------------------
None of the given

----------------------------------------------------
www.virtualinspire.com

Source is responsible for fragmentation.


Select correct option:

I PV4 I PV6

------------------------------------------------

encapsulates IP datagram as data area in hardware frame.


Select correct option:

Network Interface Layer


Datalink Layer
Network Layer
None of the given

----------------------------------------------

IPV6 address consists of_________


Select correct option:

32 Bits 64
Bits 128
Bits
none of the given

--------------------------------------------------

shows senders preference for low latency, high Reliability.


Select correct option:

TYPE
SERVICE TYPE
www.virtualinspire.com
SERVICE PRIORITY
None of the given
www.virtualinspire.com

------------------------------------------------------------ -

Class A mask is 255.0.0.0 which is used for


Select correct option:

Unicasting

Multicasting

Su bnetting

All of the given

-------------------------------------------------------

Protocol provides error reporting mechanism.


Select correct option:

IGMP
SNMP
ICMP

none of the given

---------------------------------------------------------

ICMP message transport is acted upon by getting ICMP____________in IP.


Select correct option:

De-encapsulated
Encapsulated

Segmented

none of the given

------------------------------------------------------------
www.virtualinspire.com
Question # 5 of 10 ( Start time: 06:19:01 PM ) Total Marks: 1
Which protocol is used to test different tools.

Select correct option:


www.virtualinspire.com

ICMP
IGMP
TCP/IP

none of the given

--------------

When one computer sends an ARP message to another the message travels inside the
hardware frame. Technically, placing a message inside a frame for transport is not called
encapsulation.

Select correct option:

True
False

---------------------------------------------------

Question # 7 of 10 ( Start time: 06:20:16 PM ) Total Marks: 1


Preliminary version of IP was called__________.

Select correct option:

IP - New Generation (IPng)


IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given

---------------------------------------------- -

Question # 8 of 10 ( Start time: 06:21:46 PM ) Total Marks: 1

Header contains all information needed to deliver datagram to the destination computer. But
which one of the following is not included:
www.virtualinspire.com
Select correct
option:
www.virtualinspire.com

Destination address
Source address
Rectifier
Other delivery information

--------------------------------------------------------------

Question # 9 of 10 ( Start time: 06:23:13 PM ) Total Marks: 1 Source is responsible for


fragmentation.
Select correct option:

I PV4 I PV6

------------------------------------------------------

Question # 10 of 10 ( Start time: 06:23:29 PM ) Total Marks: 1 layer Provides reliable delivery
of datagram.
Select correct option:

Network
Transport
Datalink
none of the given

-----------------------------------------------------------------

Question # 3 of 10 ( Start time: 06:28:42 PM ) Total Marks: 1 Which


one of these is not a main feature of connectionless service: Select
correct option:

It includes extension of LAN abstraction.


www.virtualinspire.com
It has universal
addressing and the data is delivered in packets frames), each with a header. It combines
collection of physical networks into a single virtual network.
www.virtualinspire.com
It has universal addressing and the data is delivered in packets frames), without a header.

-----------------------------------------------------------------

Question # 7 of 10 ( Start time: 06:30:56 PM ) Total Marks: 1


The process of learning the path MTU is known as path MTU discovery.
Select correct option:

True False

------------------------------------------------------------------

Question # 8 of 10 ( Start time: 06:31:37 PM ) Total Marks: 1


IPv6________________is responsible for fragmentation. Routers simply drop datagram’s larger
than network
Select correct option:

Destination
Intermediate routers
Source
Medium

-----------------------------------------------------

Question # 9 of 10 ( Start time: 06:32:19 PM ) Total Marks: 1


IP datagram can contains__________octets.
Select correct option:
www.virtualinspire.com
0-65,535
1-65,535
1-65,536
none of the given
www.virtualinspire.com

------------------------------------------------

Question # 10 of 10 ( Start time: 06:33:26 PM ) Total Marks: 1


shows senders preference for low latency, high Reliability.
Select correct option:

TYPE

SERVICE TYPE

SERVICE PRIORITY
None of the given

------------------------------------------------

IPV6 addresses are_______bits.


Select correct option:

32

The Source can configure outgoing datagram’s to avoid


Select correct option:
www.virtualinspire.com

Segmentation

Defrag mentation

Fragmentation

None of the given

---------------------------------------------

field of header indicates whether a datagram is a fragment or a complete datagram.


Select correct option:

FLAGS

FLAGMENT OFFSET

IDENTIFICATION

None of the given

Quiz Start Time: 09:22 PM Time Left 84 sec(s)

Question # 1 of 10 ( Start time: 09:22:58 PM ) Total Marks: 1 Class A mask is 255.0.0.0 which is
used for___________________________________ Select correct option:
www.virtualinspire.com

Unicasting

Multicasting

Su bnetting

All of the given

Quiz Start Time: 09:22 PM Time Left 83


sec(s)

Question # 2 of 10 ( Start time: 09:23:54 PM ) Total Marks: 1


IPV6 address with_______leading zeros is interpreted to hold an IPV4 address.
Select correct option:

Quiz Start Time: 09:22 PM Time Left 39


sec(s)
www.virtualinspire.com

Question # 3 of 10 ( Start time: 09:24:23 PM ) Total Marks: 1


ICMP message transport is acted upon by getting ICMP___________in IP.
Select correct option:

De-encapsulated

Encapsulated

Segmented

none of the given

Quiz Start Time: 09:22 PM Time Left 6


sec(s)

Question # 5 of 10 ( Start time: 09:27:02 PM ) Total Marks: 1 Routers


use________________to forward datagrams along prearranged path.
Select correct option:

Traffic class

Flow label

Destination address “doubt”

none of the given


www.virtualinspire.com

Quiz Start Time: 09:22 PM Time Left 81


sec(s)

Question # 6 of 10 ( Start time: 09:28:29 PM ) Total Marks: 1


MTU Stands for________
Select correct option:

Mininum transmission unit

Maximun transmission unit

Multicast transmission unit

None of the given

Quiz Start Time: 09:22 PM Time Left 62


sec(s)

Question # 7 of 10 ( Start time: 09:28:57 PM ) Total Marks: 1


Preliminary version of IP was called___________.
Select correct option:

IP - New Generation (IPng)

IP - Next Generation (IPng)

IP - Net Generation (IPng)


www.virtualinspire.com
None of the given

Quiz Start Time: 09:22 PM Time Left 49


sec(s)

Question # 8 of 10 ( Start time: 09:29:50 PM ) Total Marks: 1


contains all information needed to deliver datagram to the destination.
Select correct option:

Header

Data Area

Identifier

none of the given

Quiz Start Time: 09:22 PM Time Left 39


sec(s)

Question # 9 of 10 ( Start time: 09:31:17 PM ) Total Marks: 1


www.virtualinspire.com
field tells the receiver how to order fragments within a given datagram.
Select correct option:
www.virtualinspire.com
FLAGS

FLAGMENT OFFSET

IDENTIFICATION “not confirm”

None of the given

Quiz Start Time: 09:22 PM Time Left 19


sec(s)

Question # 10 of 10 ( Start time: 09:32:47 PM ) Total Marks: 1


Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the_____________Transmission Unit.
Select correct option:

Least

Maximum

Fragment
www.virtualinspire.com
Frame
www.virtualinspire.com
Question # 1 of 10 ( Start time: 04:33:55 PM )

encapsulates IP datagram as data area in hardware frame.

Select correct option:

Network Interface Layer

Datalink Layer

Network Layer

None of the given

CS6 10-Computer network

Question # 2 of 10 ( Start time: 04:3 5:26 PM ) Total Marks: 1

field is used to identify a specific path through the network Select

correct option:
FLOW LABEL

TRAFFIC CLASS

Both a and b

none of the given

Question # 3 of 10 ( Start time: 04:36:5 1 PM ) Total Marks: 1

IPV6 address with_________leading zeros is interpreted to hold an IPV4 address.

Select correct option:

96

100

120

none of the given


www.virtualinspire.com

Question # 4 of 10 ( Start time: 04:38:19 PM ) Total Marks: 1

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware
addresses. ARP is almost always used to bind a 32-bit IP address to a____________________Ethernet
address.

Answer

(48bit)

Select correct option:

Question # 5 of 10 ( Start time: 04:39:45 PM ) Total Marks: 1

For________________, information about forwarding is stored in a routing table, which is


initialized at system initialization and must be updated as network topology changes.

Select correct option:

Efficiency

Security

none of the given


www.virtualinspire.com
Anomalies

Question # 6 of 10 ( Start time: 04:41:15 PM ) Total Marks: 1

is a technique used to Limit datagram size to small MTU of any network Select

correct option:

Segmentation

Fragmentation

Encapsulation

none of the given


www.virtualinspire.com
Question # 7 of 10 ( Start time: 04:42:37 PM ) Total Marks: 1 Class A

mask is 255.0.0.0 which is used for__________________ Select

correct option:
www.virtualinspire.com

Unicasting

Multicasting

Subnetting

All of the given

Question # 8 of 10 ( Start time: 04:44:08 PM ) Total Marks: 1

When one computer sends an ARP message to another the message travels inside the hardware frame.
Technically, placing a message inside a frame for transport is not called encapsulation.

Select correct option:

True
www.virtualinspire.com

Question # 9 of 10 ( Start time: 04:45:12 PM ) Total Marks: 1 Which one

of these is not a main feature of connectionless service: Select correct

option:

It includes extension of LAN abstraction.

It has universal addressing and the data is delivered in packets frames), each with a header.

It combines collection of physical networks into a single virtual network.

It has universal addressing and the data is delivered in packets frames), without a header.

Question # 10 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1 Which

protocol is used to test different tools.

Select correct option:


ICMP

IGMP

Question # 1 of 10 ( Start time: 04:49:54 PM ) Total Marks: 1

message is sent in response to incoming datagrams with problems. Select

correct option:

TCP/IP

IGMP

ICMP

none of the given


Question # 2 of 10 ( Start time: 04:50:45 PM ) Total Marks: 1 Which

one is NOT the function of ping program

Select correct option:

Traceability

Reach ability

Both a and b

None of the given

Question # 3 of 10 ( Start time: 04:52:14 PM ) Total Marks: 1

IPV6 address with__________leading zeros is interpreted to hold an IPV4 address. Select

correct option:

96
www.virtualinspire.com

Question # 4 of 10 ( Start time: 04:52:32 PM ) Total Marks: 1

A datagram cannot be larger than_____________of a network over which it is sent.

Select correct option:

MTU

Size

IP header

None of the given

Question # 5 of 10 ( Start time: 04:52:55 PM ) Total Marks: 1

TheSourcecanconfigureoutgoingdatagram’stoavoid Select correct option:


www.virtualinspire.com

Segmentation

Defragmentation

Fragmentation

None of the given

Question # 6 of 10 ( Start time: 04:54:24 PM ) Total Marks: 1 Which one

of these is not a main feature of connectionless service: Select correct

option:

It includes extension of LAN abstraction.

It has universal addressing and the data is delivered in packets frames), each with a header.

It combines collection of physical networks into a single virtual network.


www.virtualinspire.com
It has universal addressing and the data is delivered in packets frames), without a header.

Question # 7 of 10 ( Start time: 04:55:27 PM ) Total Marks: 1

Every hardware technology specification includes the definition of the maximum size of the frame
data area, which is called the______________________Transmission Unit.

Select correct option:

Least

Maximum

Fragment

Frame

Question # 8 of 10 ( Start time: 04:56:40 PM ) Total Marks: 1

Protocol provides error reporting mechanism.

Select correct option:


www.virtualinspire.com

SNMP

Question # 9 of 10 ( Start time: 04:57:5 1 PM ) Total Marks: 1 Source

is responsible for fragmentation.

Select correct option:

IPV4

IPV6

Question # 10 of 10 ( Start time: 04:58:56 PM ) Total Marks: 1 MTU

Stands for_______________

Select correct option:


www.virtualinspire.com
Mininum transmission unit

Maximum transmission unit

Multicast transmission unit

None of the given

Question # 1 of 10 ( Start time: 10:18:08 PM ) Total Marks: 1

Every hardware technology specification includes the definition of the maximum size of the frame
data area, which is called the___________________Transmission Unit.

Select correct option:

Least

Maximum

Fragment

Frame

Question # 2 of 10 ( Start time: 10:19:35 PM ) Total Marks: 1


IPV6 address with________leading zeros is interpreted to hold an IPV4 address. Select

correct option:

96

100 120

none of the given

Question # 3 of 10 ( Start time: 10:20:11 PM ) Total Marks: 1

is a type of address used for collection of computers with same prefix. Select

correct option:

Cluster

unicast

Multicast

none of the given

Question # 4 of 10 ( Start time: 10:21:24 PM ) Total Marks: 1

field is used to identify a specific path through the network Select

correct option:

Question # 2 of 10 ( Start time: 10:19:35 PM ) Total Marks: 1


FLOW LABEL TRAFFIC

CLASS Both a and b

none of the given

Question # 5 of 10 ( Start time: 10:22:16 PM ) Total Marks: 1

message is sent in response to incoming datagrams with problems. Select

correct option:

TCP/IP

IGMP

ICMP

none of the given

Question # 6 of 10 ( Start time: 10:22:56 PM ) Total Marks: 1 ___

Protocol provides error reporting mechanism.

Select correct option:


www.virtualinspire.com
SNMP

ICMP

none of the given

Question # 7 of 10 ( Start time: 10:23:53 PM ) Total Marks: 1

One of the parameters, which motivated IP for change is address space. The__________________
address space allows for over a million networks. But most networks are class C and too small for many
organizations.

Select correct option:

32-bit

128-bit

16-bit 64-

bit

Question # 8 of 10 ( Start time: 10:24:4 1 PM ) Total Marks: 1

ICMP message transport is acted upon by getting ICMP______________in IP.

Select correct option:

De-encapsulated

Encapsulated

Question # 2 of 10 ( Start time: 10:19:35 PM ) Total Marks: 1


www.virtualinspire.com
Segmented
www.virtualinspire.com
none of the given

Question # 9 of 10 ( Start time: 10:26:04 PM ) Total Marks: 1 Class A

mask is 255.0.0.0 which is used for________________

Select correct option:

Unicasting

Multicasting

Subnetting

All of the given

Question # 10 of 10 ( Start time: 10:26:34 PM ) Total Marks: 1 Due to

revolutionalization of IP-V6 the speed has increased from Select correct

option:

56kbps to 5 12kbps 5

12kbps to 1gbps

56kbps to 1gbps

none of the given


www.virtualinspire.com

Question # 1 of 10 ( Start time: 10:29:35 PM ) Total Marks: 1 Which

protocol is used to test different tools.

Select correct option:

ICMP

IGMP

TCP/IP

none of the given

Question # 2 of 10 ( Start time: 10:30:29 PM ) Total Marks: 1 Routers

use______________to forward datagrams along prearranged path.

Select correct option:

Traffic class

Flow label

Destination address

none of the given


www.virtualinspire.com
Question # 3 of 10 ( Start time: 10:31:40 PM ) Total Marks: 1 Source

is responsible for fragmentation.


www.virtualinspire.com
Select correct option:

IPV4

IPV6

Question # 4 of 10 ( Start time: 10:32:19 PM ) Total Marks: 1 Class A

mask is 255.0.0.0 which is used for__________________ Select

correct option:

Unicasting

Multicasting

Subnetting

All of the given

Question # 5 of 10 ( Start time: 10:32:54 PM ) Total Marks: 1

For______________, information about forwarding is stored in a routing table, which is initialized at


system initialization and must be updated as network topology changes.

Select correct option:

Efficiency

Security

Accuracy

Anomalies
www.virtualinspire.com
Header contains all information needed to deliver datagram to the destination computer. But which
one of the following is not included:

Select correct option:

Destination address

Source address

Rectifier

Other delivery information

Question # 7 of 10 ( Start time: 10:34:16 PM ) Total Marks: 1

ICMP message transport is acted upon by getting ICMP______________in IP.

Select correct option:

De-encapsulated

Encapsulated

Segmented

none of the given

Question # 8 of 10 ( Start time: 10:35:11 PM ) Total Marks: 1

End to End delivery Service of IP datagram is___________


www.virtualinspire.com
Select correct option:
www.virtualinspire.com
Connection oriented

Connectionless

both a and b

none of the given

Question # 9 of 10 ( Start time: 10:36:10 PM ) Total Marks: 1

One of the parameters, which motivated IP for change is address space. The_________________
address space allows for over a million networks. But most networks are class C and too small for many
organizations.

Select correct option:

32-bit

128-bit

16-bit 64-

bit

Question # 10 of 10 ( Start time: 10:37:07 PM ) Total Marks: 1

Address mask defines how many bits of address are in prefix.

Select correct option:

True

False
www.virtualinspire.com

Quiz Start Time:


09:22 PM

Time Left
84
sec(s)

Question # 1 of 10 (
Start time:
09:22:58 PM Total Marks: 1
)

Class A mask is 255.0.0.0 which is used for

Select correct option:


www.virtualinspire.com

Subnetting

All of the given

Q
u
i
z

S
t
a
r
t

T
i
m
e
:

0
www.virtualinspire.com
9
:
2
2

P
M

Time Left
83
sec(s)

Question # 2 of 10 (
Start time:
09:23:54 PM

T
otal
Ma
rks:
1
IPV6
addr
ess
with

lea
din
g
zer
os
is
int
erp
ret
ed
to
www.virtualinspire.com
hol
d
an
IPV
4
add
res
s.

Select
correct
option:
www.virtualinspire.com

96

100

120

none of the given

Quiz Start Time: 09:22 PM

Time Left
39
sec(s)
www.virtualinspire.com

Question # 3 of 10 (
Start time:
09:24:23 PM

Total Marks: 1
ICMPmessagetransportisacteduponbygettingICMP in IP.

Select correct option:

De-encapsulated

Encapsulated

Segmented

none of the given


www.virtualinspire.com

Quiz Start Time:


09:22 PM

Time Left
6
sec(s)

Question # 5 of 10 (
Start time:
09:27:02 PM

Total Marks: 1
Routers use__________
to forward
datagrams along
prearranged path.

Select
correct
option:
www.virtualinspire.com

Traffic
class

Flow label
Destination address “doubt”

none of the given

Quiz Start Time:


09:22 PM
Time Left
81
sec(s)

Question # 6 of 10 (
Start time:
09:28:29 PM

)
Total Marks: 1

MTU Stands for__________


Mininum transmission unit

Maximun transmission unit

Multicast transmission unit

None of the given

Quiz Start Time: 09:22 PM

Time Left
62
sec(s)
Question # 7 of 10 (
Start time:
09:28:57 PM

)
Total Marks:
1.
Preliminary version of IP was called______________

Select correct option:

IP - New Generation (IPng)

IP - Next Generation (IPng)

IP - Net Generation (IPng)

None of the given


www.virtualinspire.com

Quiz Start Time:


09:22 PM

Time Left
49
sec(s)

Question # 8 of 10 (
Start time:
09:29:50 PM

T
otal Marks: 1 containsall
informationneededtodeliver
datagramtothedestination.

Sele
ct
corr
ect
opti
on:

Header
www.virtualinspire.com

Data
Area

Identifie
r
www.virtualinspire.com

none of the given

Q
u
i
z

S
t
a
r
t

T
i
m
e
:

0
9
:
2
2

P
M
www.virtualinspire.com
Time Left
39
sec(s)

Question # 9 of 10 (
Start time:
09:31:17 PM

T
otal
Marks: 1
fieldtellsthe
receiverhowto
order
fragments
withinagiven
datagram.

Select
correct
option:
www.virtualinspire.com

FLAGMENT OFFSET

IDENTIFICATION

“not confirm”

None of the given

Quiz Start Time: 09:22 PM

Time Left
19
sec(s)
www.virtualinspire.com
Question # 10 of 10 (
Start time:
09:32:47 PM
www.virtualinspire.com

Total Marks:

1
Every hardware technology specification includes the definition of the maximum size of the

frame data area, which is called the________________Transmission Unit.

Select correct option:

Least

Maximum

Fragment

Frame

Question # 1 of 10 ( Start time: 10:29:45 PM Total Marks: 1

Select correct option:


www.virtualinspire.com

IP - New Generation (IPng)


www.virtualinspire.com
IP - Next Generation (IPng)

IP - Net Generation (IPng)

None of the given

Question # 2 of 10 ( Start time: 10:30:33 PM ) Total Marks: 1


IP datagram can contains octets.

Select correct option:

0-65,535

1-65,535

1-65,536

none of the given

Total Marks: 1
Question # 3 of 10 ( Start time: 10:31:42 PM )

Select correct option:

Traffic class

Flow label

Destination address

none of the given

Source is responsible for fragmentation.

Select correct option:

IPV4

IPV6

The process of learning the path MTU is known as path MTU discovery.
Select correct option:

True

False

Question # 6 of 10 ( Start time: 10:32:50 PM ) Total Marks: 1


A datagram cannot be larger than of a network over which it is
Sele correct option: sent.
ct
MTU

Size

IP header

None of the given

Question # 7 of 10 ( Start time: 10:33:31 PM )

layer Provides reliable delivery of datagram.

Select correct option:


Total Marks: 1

Network

Transport

Datalink

none of the given

# 8 of 10 ( Start time: 10:34:00 PM )

There are____possibilities to detect the


destination using Trace-route Total Marks: 1

Select correct option:

None ofall
contains the given
information needed to Total Marks: 1
deliver datagram to the destination.
Question # 9 of 10 ( Start time: 10:34:21 PM )
Select correct option:

Header

Data Area

Identifier

none of the given

IPv6___________is responsible for fragmentation. Routers simply drop datagram’s larger than network
Select correct option:
Destination ►21-bit

Intermediate routers ►22-bit


►23-bit
Source
►24-bit
Medium

Question No: 4 ( Marks: 1 ) -


Please choose one
Question No: 1 ( Marks: 1 ) - Please choose one
Most WAN systems include a
mechanism that can be used to eliminate
________ has a jitter zero
the common case of duplication routing
is called___________

► None of the given ►Hierarchal address


►Default route

► Virtual Private Network ►Shortest path

► Isochronous Network ►None of the given

► Asynchronous Network

Question No: 2 ( Marks: 1 ) - Please choose one Question No: 5 ( Marks: 1 ) -


Please choose one

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit


Data service) offers_______ . The next hop to which a packet is sent
depends only on
►Connectionless service paradigm
►Packet’s destination
►Connection oriented service paradigm
►Packet’s original
►Both Connectionless and Connection-oriented source
service paradigm
►Path the packet has
taken
►None of the given ►Non of the given

Question No: 3 ( Marks: 1 ) - Please choose one Question No: 6 ( Marks: 1 ) -


Please choose one
ATM assigns each VC a _____________ identifier that is divided
two parts to produce a hierarchy. An interface for twisted pair Ethernet
must have an ____________ connector ,
[email protected]
and must generate signals according to the_____________
specification.
►100 million bits per
►RJ-45, 10 Base T second
►RJ-45, 10 Base 5 ►100 million bits per
second
►BNC, 10 Base 2
►100 million bits per
second
►BNC, 10 Base T
►None of the given

Question No: 7 ( Marks: 1 ) - Please choose one


Question No: 10 ( Marks: 1 ) -
Please choose one
When an application--------------- data, it makes a copy of the data
available to all other computers on the network.
Computers attached to an ether use
------ in which a computer waits for the
ether to be idle before transmitting a
►Broadcasting frame.
►Multicasting
►Unicasting ►CSMA/CD
►None of the given ►CSMA/CA
►TOKEN PASSING
Question No: 8 ( Marks: 1 ) - Please choose one

►None of the given


A ---------- provide a mechanism that a customer can use to set a
physical address.
Question No: 11 ( Marks: 1 ) -
Please choose one
►Static addressing scheme
►Configurable addressing scheme -------------- have advantages arisen
►Dynamic addressing scheme from the size and ease of
computation.
►CRC
►None of the given
►Parity
►Checksums
Question No: 9 ( Marks: 1 ) - Please choose one

►None of given
FDDI can transmits data at a rate of -----100 million bits per
second -----
[email protected]
Question No: 12 ( Marks: 1 ) - Please choose one Question No: 15 ( Marks: 1 ) -
Please choose one

The term -------- is used to denote the definition of a packet used


with a specific type of network. In -------------, network occupies the
smaller area like a room a floor or a
building
►Packet

►LAN
►Frame
►WAN
►MAN
►Data
►None of the given
Question No: 16 ( Marks: 1 ) -
►None of the given Please choose one

No error detection scheme is perfect


Question No: 13 ( Marks: 1 ) - Please choose one because transmission errors can affect
the additional information as well as the
------ has no way to determine the cause of the problem. data.
► False

►Ping ►

►Trace route Question No: 1


►ICMP
( Marks: 1 ) - Please choose one
►Non of the given
The number of connections needed
for N computer in direct point to
Question No: 14 ( Marks: 1 ) - Please choose one point communication is equal to: ►
(N2 –N)/2 ► N(N- 1) ► N2 ► None
of the given
------ Program sends a message to a remote computer and reports
whether the computer responds.
Question No: 2
►Ping
( Marks: 1 ) - Please choose one
Ping
►Traceroute When an application---------------
data, it makes a copy of the data
►ICMP available to all other computers on
►Non of the given the network. ► Broadcasting ►
Multicasting ► Unicasting ► None
of the given

[email protected]
Question No: 3 Question No: 8

( Marks: 1 ) - Please choose one ( Marks: 1 ) - Please choose one

Ethernet uses a ------ bit static addressing scheme in which The process of using a routing table
each device is assigned a unique address by the manufacturer. to select a next hop for a given
► 64 ► 48 ► 32 datagram is called_________ ►
Encapsulation ► Reassembling ►
►8 Routing or forwarding ► None of the
given
Question No: 4
Question No: 9
( Marks: 1 ) - Please choose one
( Marks: 1 ) - Please choose one
A system with redundant bridges might have a problem
with_______ in the system. ► Loop ► Filters ► Spanning ____________ uses distance vector
Trees ► All given choices approach to define routing ► BGP

Question No: 5 ► OSPF ► RIP ► None of the


given
( Marks: 1 ) - Please choose one
Question No: 10
The product of delay and throughput measures the _____ of
data that can be present on the network. ► Area ► Volume ( Marks: 1 ) - Please choose one
► Length ► None of the given
A multicast routing scheme in which
Question No: 6 the protocol software builds a
delivery tree from a central point is
( Marks: 1 ) - Please choose one called__________ ► Distance
Vector Multicast Routing Protocol
Connectionless service, Message-Oriented protocol, best (DVMRP) ► Core Based Trees
effort delivery service, arbitrary interaction and operating (CBT) ► Protocol Independent
system independent are the characteristics of _____________ Multicast_ Sparse Mode (PIM-SM)
► TCP ► UDP ► Protocol Independent Multicast _
Dense Mode (PIM-DM)
► IP ► None of the given
Question No: 11
Question No: 7
( Marks: 1 ) - Please choose one
( Marks: 1 ) - Please choose one
One repeater _______, two repeaters
Connection-oriented service, Point-to-point, Complete ________ the maximum cable length
reliability, Full-duplex communication, Stream interface, limitation. ► doubles, cancel ►
Reliable connection startup and Graceful connection doubles, triple ► square roots, cude
shutdown are the services provided by__________ ► None roots ► and, triple
of the given ► TCP ► UDP ► IP
Question No: 12
[email protected]
( Marks: 1 ) - Please choose one task. So they needed multiple
screens, keyboards and computers. ►
Whenever it handles a packet, IP software needs to False ► True
separate the destination address into a _________ and
___________. Question No: 18

► postfix, Infix ► non of these ► Infix, prefix ► prefix, ( Marks: 1 ) - Please choose one
suffix
Which method of Address Resolution
Question No: 13 Protocol is useful with any hardware?
Were "T" stands for Table lookup,
( Marks: 1 ) - Please choose one "C" for Closed-form Computation
and "D" for Data Exchange?
Although message exchange can be used to bind addresses,
sending a request for each binding is hopelessly inefficient. ► ►T ►C ►D ► C, D
True ► False
Question No: 19
Question No: 14
( Marks: 1 ) - Please choose one
( Marks: 1 ) - Please choose one
In which method of Address
ARP is almost always used to bind a ___-bit IP address to a Resolution Protocol the protocol
___-bit Ethernet address. ► 32, 48 ► 24, 32 ► 32, 64 ► 32, address is determined by hardware
128 address? Were "T" stands for Table
lookup, "C" for Closed-form
Question No: 15 Computation and "D" for Data
Exchange? ►T ►D ►C ► T, C
( Marks: 1 ) - Please choose one
Question No: 20
End-to-end delivery service is connection oriented. ►
True ► False ( Marks: 1 ) - Please choose one

Question No: 16 We use the term _______ to refer to a


measure of the path that routing
( Marks: 1 ) - Please choose one software use when choosing a route.
► routing path ► routing metric ►
A single networking technology is best for all needs. ► routing ► switching
True ► False
Question No: 1
Question No: 17
( Marks: 1 ) - Please choose one
( Marks: 1 ) - Please choose one
Computer networks are often called
In the 1970s large organizations began to acquire multiple -------------- because they use packet
networks. Each network in the organization formed island. technology. ► Ethernet ► Switch
Employees needed to choose a computer appropriate for each networks ► Packet networks ►
None of the given
[email protected]
Question No: 2 ( Marks: 1 ) - Please choose one

( Marks: 1 ) - Please choose one ________ of TCP/IP layering model,


corresponds to basic network
A network uses a ------arranges for computers to be connected hardware. ► Physical Layer ►
in a closed loop. ► Star Topology ► Ring Topology ► Bus Network Interface Layer ► Internet
Topology ► None of the given Layer ► Transport Layer

Question No: 3 Question No: 8

( Marks: 1 ) - Please choose one ( Marks: 1 ) - Please choose one

An ------------method, the network hardware designers specify _______ protocols of TCP/IP


how type information is included in the frame and the value layering model specify how to ensure
use to identify various frame types. ► Explicit frame type ► reliable transfer. ► Physical Layer
Ideal frame type ► Implicit frame type ► None of the given ► Network Interface Layer ►
Internet Layer ► Transport Layer
Question No: 4
Question No: 9
( Marks: 1 ) - Please choose one
( Marks: 1 ) - Please choose one
An interface for thin Ethernet must have an ____________
connector , and must generate signals according to ________is called an end-to-end
the_____________ specification. ► RJ-45, 10 Base T ► RJ- protocol because it provide a
45, 10 Base 5 ► BNC, 10 Base 2 ► BNC, 10 Base T connection directly from an
application on one computer to an
Question No: 5 application on a remote computer. ►
IP
( Marks: 1 ) - Please choose one
► UDP ► TCP ► None of the
A Bridge forwards or filters a frame by comparing the given
information in its address table to the frame’s__________ ►
Layer 2 source address ► Source node’s physical address ► Question No: 10
Layer 2 destination address ► Layer 3 destination address
( Marks: 1 ) - Please choose one
Question No: 6
____________ uses distance vector
( Marks: 1 ) - Please choose one approach to define routing ► BGP
► OSPF ► RIP ► None of the
Most WAN systems include a mechanism that can be used to given
eliminate the common case of duplication routing is
called___________ ► Hierarchal address ► Default route ► Question No: 11
Shortest path
( Marks: 1 ) - Please choose one
► None of the given
_______ is ideal in a situation where
Question No: 7 the group is small and all members
[email protected]
are attached to contiguous Local Area Networks. ► Flood- Question No: 17
and -Prune ► Configuration-and -Tunneling ► Core-Based
Discovery ► None of the given ( Marks: 1 ) - Please choose one

Question No: 12 In which method of Address


Resolution Protocol the protocol
( Marks: 1 ) - Please choose one address is determined by hardware
address? Were "T" stands for Table
Router that decrements TTL to __ sends ICMP time lookup, "C" for Closed-form
exceeded message, with router’s address as source address Computation and "D" for Data
Exchange? ►T ►D ►C ► T, C
►3 ►2 ►1 ►0
Question No: 18
Question No: 13
( Marks: 1 ) - Please choose one
( Marks: 1 ) - Please choose one
The general form of an IP datagram
Protocol addresses are abstractions provided by ___________. is with a header followed by data.
► hardware ► software ► operating system ► internet The header contains information that
controls where and how the datagram
Question No: 14 is to be sent. ► True ► False

( Marks: 1 ) - Please choose one Question No: 19

Although message exchange can be used to bind addresses, ( Marks: 1 ) - Please choose one
sending a request for each binding is hopelessly inefficient. ►
True ► False To save traffic, an EGP does not
summerize routing information from
Question No: 15 the autonomous system before
passing it to another autonomous
( Marks: 1 ) - Please choose one system. ► True ► False

ARP is almost always used to bind a ___-bit IP address to a Question No: 20


___-bit Ethernet address. ► 32, 48 ► 24, 32 ► 32, 64
( Marks: 1 ) - Please choose one
► 32, 128
Which of the following is a correct
Question No: 16 representation of the IPv6? ►
105.220.136.100.255.255.255.255.0.
( Marks: 1 ) - Please choose one 0.18.128.140.10.255.255 ►
105.220.136.100.255.255.255.256.0.
In the 1970s large organizations began to acquire multiple 0.18.128.140.10.255.255 ►
networks. Each network in the organization formed island. 105.220.136.100.255.255.255.255.0.
Employees needed to choose a computer appropriate for each 0.18.128.140.10.255.255.256 ►
task. So they needed multiple screens, keyboards and 105.220.136.100.255.255.255.255.0.
computers. ► False ► True 0.18.128.140.10.255

[email protected]
Question No: 1 ( Marks: 1 ) - Please choose one ►Bridge
►Repeater
A typical port on an ATM switch operates at __________ or higher.
►Hub
► OC-2 speed (155Mbps)
►All the given
► OC-3 speed (100Mbps)
► OC-3 speed (155Mbps)
Question No: 5 ( Marks: 1 ) -
► OC-3 speed (155Gbps) Please choose one

A bridges function in the _________


Question No: 2 ( Marks: 1 ) - Please choose one
layers(s).
►Physical (MAC)
The product of delay and throughput measures the _____ of data
that can be present on the network. ►Data link
►Network

► Area ►Physical (MAC) and


Data link
► Volume
► Length
Question No: 6 ( Marks: 1 ) -
► None of the given
Please choose one

IEEE LLC/SNAP header is --------,


which is used to specify the type of data.
Question No: 3 ( Marks: 1 ) - Please choose one
►8 octets

__________is used for compressed audio and video where the data ►8 bytes
rate depends on the level of compression that can be achieved. ►8 bits
►Constant Bit Rate (CBR) service ►None of the given
►Variable Bit Rate (VBR) service
►Available Bit Rate (ABR) service
Question No: 7 ( Marks: 1 ) -
►None of the given Please choose one

The third field of the header consists of


------ bit Ethernet frame type.
Question No: 4 ( Marks: 1 ) - Please choose one ►48
►32
Which of the following is a connecting device?
►16
[email protected]
►8
---------- scheme, which is designed
to help detect transmissions errors,
Question No: 8 ( Marks: 1 ) - Please choose one send one extra bit of information
with each character

An ------------method, the network hardware designers specify how ►Parity


type information is included in the frame and the value use to ►Checksums
identify various frame types.
►CRC
►Explicit frame type
►None of given
►Ideal frame type
►Implicit frame type
Question No: 12 ( Marks: 1 ) -
Please choose one
►None of the given
Computer networks are often called
-------------- because they use packet
Question No: 9 ( Marks: 1 ) - Please choose one technology.
►Ethernet
Local Talk is a LAN technology that employs -------------

►Switch networks
►Star topology
►Bus topology
►Packet networks

►Ring topology
►None of the given
►None of the given

Question No: 13 ( Marks: 1 ) -


Question No: 10 ( Marks: 1 ) - Please choose one Please choose one

The Fast Ethernet hardware operates at a rate of -------- ------ Program sends a message to a
remote computer and reports whether the
►10 Mbps computer responds.
►100 Mbps ►Ping
►1000 Mbps Ping
►None of the given ►Traceroute
►ICMP
Question No: 11 ( Marks: 1 ) - Please choose one ►Non of the given
[email protected]
Question No: 14 ( Marks: 1 ) - Please choose one ► None of the given

In ---------, network occupies larger areas like cities & countries.


► Virtual Private Network
►LAN
► Isochronous Network
► Asynchronous Network
►WAN
►MAN
Question No: 2 ( Marks: 1 ) -
►None of the given Please choose one

Unlike Frame Relay and ATM, SMDS


Question No: 15 ( Marks: 1 ) - Please choose one (Switched multi-megabit Data service)
offers_______ .
In -------------, network occupies the smaller area like a room a floor ►Connectionless service
or a building paradigm
►Connection oriented
►LAN service paradigm

►WAN ►Both Connectionless


and Connection-oriented service
►MAN paradigm
►None of the given

►None of the given


Question No: 16 ( Marks: 1 ) - Please choose one

Question No: 3 ( Marks: 1 ) -


In Point-to-Point topology there are two topologies. Please choose one

►Tree and Ring ATM assigns each VC a


►Star and Ring _____________ identifier that is divided
two parts to produce a hierarchy.
►Star and Tree
►21-bit
►None of the given
►22-bit
►23-bit
Question No: 1 ( Marks: 1 ) - Please choose one
►24-bit

________ has a jitter zero

[email protected]
Question No: 4 ( Marks: 1 ) - Please choose one available to all other computers on the
network.

Most WAN systems include a mechanism that can be used to


eliminate the common case of duplication routing is
►Broadcasting
called___________
►Multicasting
►Hierarchal address
►Unicasting
►Default route
►None of the given
►Shortest path
►None of the given

Question No: 8 ( Marks: 1 ) -


Please choose one
Question No: 5 ( Marks: 1 ) - Please choose one
A ---------- provide a mechanism that a
The next hop to which a packet is sent depends only on customer can use to set a physical
address.
►Packet’s destination
►Packet’s original source
►Static addressing
►Path the packet has taken scheme
►Non of the given ►Configurable
addressing scheme

Question No: 6 ( Marks: 1 ) - Please choose one ►Dynamic addressing


scheme

An interface for twisted pair Ethernet must have an


____________ connector , and must generate signals according to ►None of the given
the_____________ specification.
►RJ-45, 10 Base T
Question No: 9 ( Marks: 1 ) -
►RJ-45, 10 Base 5 Please choose one
►BNC, 10 Base 2
FDDI can transmits data at a rate of
-----100 million bits per second -----
►BNC, 10 Base T

►100 million bits per


Question No: 7 ( Marks: 1 ) - Please choose one second
►100 million bits per
When an application--------------- data, it makes a copy of the data second

[email protected]
►100 million bits per second ►Data
►None of the given
►None of the given

Question No: 10 ( Marks: 1 ) - Please choose one


Question No: 13 ( Marks: 1 ) -
Computers attached to an ether use ------ in which a computer Please choose one
waits for the ether to be idle before transmitting a frame.
------ has no way to determine the
cause of the problem.
►CSMA/CD
►CSMA/CA
►Ping
►TOKEN PASSING
►Trace route
►ICMP
►None of the given
►Non of the given

Question No: 11 ( Marks: 1 ) - Please choose one


Question No: 14 ( Marks: 1 ) -
Please choose one
-------------- have advantages arisen from the size and ease of
computation.
------ Program sends a message to a
►CRC
remote computer and reports whether the
►Parity computer responds.

►Checksums ►Ping
Ping

►None of given ►Traceroute


►ICMP

Question No: 12 ( Marks: 1 ) - Please choose one ►Non of the given

The term -------- is used to denote the definition of a packet used Question No: 15 ( Marks: 1 ) -
with a specific type of network. Please choose one

►Packet In -------------, network occupies the


smaller area like a room a floor or a
building
►Frame

[email protected]
►LAN It is computed as delay time
multiplied by effective throughput. It
►WAN
measures amount of data that can be
►MAN present in the network.
   
►None of the given Question No: 3    ( Marks: 1 )    -
Please choose one
 __________is used for compressed
Question No: 16 ( Marks: 1 ) - Please choose one audio and video where the data rate
depends on the level of compression
that can be achieved.
No error detection scheme is perfect because transmission errors
Constant Bit Rate (CBR)
can affect the additional information as well as the data.
service►
► False Variable Bit Rate (VBR)
service►
►
Available Bit Rate (ABR)
service►
None of the given►
MIDTERM EXAMINATION  
Fall 2008  VARIABLE BIT RATE (VBR):
CS610- Computer Network It is used for compressed audio and
  video where the data rate depends on
  the level
Question No: 1    ( Marks: 1 )    - Please choose one of compression that can be achieved.
 A typical port on an ATM switch operates at __________ or Question No: 4    ( Marks: 1 )    -
higher. Please choose one
       ► OC-2 speed (155Mbps)  Which of the following is a
       ► OC-3 speed (100Mbps) connecting device?
       ► OC-3 speed (155Mbps)
Bridge►
       ► OC-3 speed (155Gbps)
Repeater►
    ATM DETAILS: Hub►
·        It transmits data at over 100Mbps. All the given►
• It uses fiber optics to connect computer to switch.    
• Each connection includes two fibers. Question No: 5    ( Marks: 1 )    -
• It is also shown in figure. Please choose one
Question No: 2    ( Marks: 1 )    - Please choose one  A bridges function in the _________
 The product of delay and throughput measures the _____ of layers(s).
data that can be present on the network. Physical (MAC)►
 
Data link►
       ► Area
Network►
       ► Volume
       ► Length Physical (M►AC) and Data link
       ► None of the given    
  Switches and bridges use MAC
DELAY THROUPUT PRODUCT: addressing to make networking

[email protected]
decisions and therefore these types of equipment function on Question No: 10    ( Marks: 1 )    -
the data link layer. Please choose one
   The Fast Ethernet hardware operates
Question No: 6    ( Marks: 1 )    - Please choose one at a rate of --------
 IEEE LLC/SNAP header is --------, which is used to specify 10 Mbps►
the type of data. 100 Mbps►
8 octets► 1000 Mbps►
8 bytes► None of the given►
8 bits►  
None of the given►  The Ethernet speed was originally
    3Mbps, and the current standard is
Question No: 7    ( Marks: 1 )    - Please choose one 10Mbps
  the fast Ethernet operates at
The third field of the header consists of ------ bit Ethernet 100Mbps. There are also gigabits
frame type. Ethernet available now  
48► Question No: 11    ( Marks: 1 )    -
32► Please choose one
16►  ---------- scheme, which is designed
8► to help detect transmissions errors,
    send one extra bit of information with
Question No: 8    ( Marks: 1 )    - Please choose one each character
  ►Parity
An ------------method, the network hardware designers specify Checksums►
how type information is included in the frame and the value CRC►
use to identify various frame types. None of given►
Explicit frame type►   
Ideal frame type► Question No: 12    ( Marks: 1 )    -
Implicit frame type► Please choose one
None of the given►  Computer networks are often called
    -------------- because they use packet
EXPLICIT FRAME TYPE: technology.
In this type the identifying value is included with frame
describes types of included data. ►Ethernet
   
Question No: 9    ( Marks: 1 )    - Please choose one ►Switch networks
 Local Talk is a LAN technology that employs -------------  
  ►Packet networks
Star topology►  
Bus topology► ►None of the given
Ring topology►    
None of the given► Question No: 13    ( Marks: 1 )    -
    Please choose one
Almost altogether network technologies use different wiring  -----Program sends a message to a
schemes. e.g., local talk uses hubs remote computer and reports whether
(physical star) to simulate a bus topology. the computer responds.
  ►Ping

[email protected]
►Traceroute Connectionless service
►ICMP paradigm►
►Non of the given ►Connection oriented service
 Ping program tests reachability. It sends datagram from B to paradigm
A, that echoes back to B. it uses ICMP echorequest and echo Both Connectionless and Connection-
reply messages.   oriented service paradigm►
Question No: 14    ( Marks: 1 )    - Please choose one  
 In ---------, network occupies larger areas like cities & None of the given►
countries.    
►LAN Question No: 3    ( Marks: 1 )    -
  Please choose one
►WAN ATM assigns each VC a
►MAN _____________ identifier that is
►None of the given divided two parts to produce a
    hierarchy.
WIDE AREA NETWORK (WAN): 21-bit►
It is used for a country level networking and even for 22-bit►
continents. 23-bit►
Question No: 15    ( Marks: 1 )    - Please choose one 24-bit►
 In -------------, network occupies the smaller area like a room    
a floor or a building Question No: 4    ( Marks: 1 )    -
  Please choose one
►LAN Most WAN systems include a
►WAN mechanism that can be used to
►MAN eliminate the common case of
►None of the given duplication routing is
    LOCAL AREA NETWORK (LAN): called___________
It is used for a single building. Hierarchal address►
Question No: 16    ( Marks: 1 )    - Please choose one Default route►
 In Point-to-Point topology there are two topologies. Shortest path►
►Tree and Ring None of the given►
 
►Star and Ring
   
►Star and Tree
Question No: 5    ( Marks: 1 )    -
►None of the given Please choose one
Question No: 1    ( Marks: 1 )    - Please choose one
The next hop to which a packet is
 ________ has a jitter zero
sent depends only on
 
►Packet’s destination
       ► None of the given
  Packet’s original source►
       ► Virtual Private Network Path the packet has taken►
       ► Isochronous Network Non of the given►
       ► Asynchronous Network    
    Question No: 6    ( Marks: 1 )    -
Question No: 2    ( Marks: 1 )    - Please choose one Please choose one
Unlike Frame Relay and ATM, SMDS (Switched multi- An interface for twisted pair Ethernet
megabit Data service) offers_______ . must have an
[email protected]
____________ connector , and must generate signals    
according to the_____________ specification. Question No: 11    ( Marks: 1 )    -
RJ-45, 10 Base T► Please choose one
RJ-45, 10 Base 5► -------------- have advantages arisen
BNC, 10 Base 2► from the size and ease of
  computation.
BNC, 10 Base T► ►CRC
    Parity►
Question No: 7    ( Marks: 1 )    - Please choose one Checksums►
When an application--------------- data, it makes a copy of the  
data available to all other computers on the network. None of given►
     
Broadcasting► Question No: 12    ( Marks: 1 )    -
Multicasting► Please choose one
Unicasting► The term -------- is used to denote the
None of the given► definition of a packet used with a
  specific type of network.
   
Question No: 8    ( Marks: 1 )    - Please choose one  
A ---------- provide a mechanism that a customer can use to ►Packet
set a physical address.  
  ►Frame
Static addressing scheme►  
Configurable addressing scheme► ►Data
Dynamic addressing scheme►  
  ►None of the given
None of the given►    
    Question No: 13    ( Marks: 1 )    -
Question No: 9    ( Marks: 1 )    - Please choose one Please choose one
FDDI can transmits data at a rate of -----100 million bits per ------ has no way to determine the
second ----- cause of the problem.
   
100 million bits per second► ►Ping
100 million bits per second► ►Trace route
100 million bits per second► ►ICMP
None of the given► ►Non of the given
       
Question No: 10    ( Marks: 1 )    - Please choose one Question No: 14    ( Marks: 1 )    -
Computers attached to an ether use ------ in which a computer Please choose one
waits for the ether to be idle before transmitting a frame. ------ Program sends a message to a
  remote computer and reports whether
►CSMA/CD the computer responds.
CSMA/CA► ►Ping
TOKEN PASSING► Ping
  ►Traceroute
None of the given► ►ICMP
[email protected]
►Non of the given
   
Question No: 15    ( Marks: 1 )    - Please choose one Question No: 3 ( Marks: 1 ) -
Please choose one
In -------------, network occupies the smaller area like a room
------ has no way to determine
a floor or a building
the cause of the problem.
 
►LAN ► ICMP
►WAN ► Ping
►MAN ► Trace route
►None of the given ► Non of the given
   
Question No: 16    ( Marks: 1 )    - Please choose one Ping has no way to determine the
cause of the problem. Tracing A
No error detection scheme is perfect because transmission
Route Network administrators use
errors can affect the additional information as well as the another tool, trace route.
data.
► False Question No: 4 ( Marks: 1 ) -
► Please choose one
The term----- ------- refers to
the general concept of a small
block of data
Question No: 1 ( Marks: 1 ) - Please choose one
 
In Point-to-Point topology there are two
► Packet
topologies.
► Frame
► Star and Tree ► Data
► Tree and Ring ► None of the given
► Star and Ring
Packet is a generic term that
► Star and Tree
refers to small block of data.
► None of the given
Packet have different format.
Each hardware uses different
In Point-to-Point topology there are two topologies.
packet format.
1) STAR topology
2) TREE topology
Question No: 5 ( Marks: 1 ) -
Please choose one
---------- scheme, which is
Question No: 2 ( Marks: 1 ) - Please choose one
designed to help detect
------ Program sends a message to a remote
transmissions errors, send
computer and reports whether the computer
one extra bit of information
responds.
with each character
 
 
► Ping  (Not Sure)
► Parity
► Traceroute
► Checksums
► ICMP
► CRC
► Non of the given
► None of given
Ping program tests reach ability. It sends datagram
from B to A, that echoes back to B. it uses ICMP echo A parity scheme, which is
request and echo reply messages.   designed to help detect
[email protected]
transmission errors, sends one extra hit of information Question No: 9 ( Marks: 1 ) -
with each character. Although it allows receiver to Please choose one
determine if a single bit has been changed parity can Formally named __________
not detect transmission errors that change an even informally known as the thick
number of bits. wire Ethernet or Thick net.

Question No: 6 ( Marks: 1 ) - Please choose one  


Local Talk is a LAN technology that employs ► 10 Base 2
------------- ► 10 Base 5
► 10 Base T
  ► None of the given
► Bus topology
► Ring topology Thick Ethernet Wiring informally
► Star topology called thick wire Ethernet or Thick
► None of the given net

LOCAL TALK:
Apple invented the LAN technology that uses bus Question No: 10 ( Marks: 1 ) -
topology. Its interface is included with all Macintosh Please choose one
computers. Formally named __________
informally known as the
Question No: 7 ( Marks: 1 ) - Please choose one twisted pair Ethernet or TP
Most LANs that employ ring topology use an Ethernet.
access mechanism known as-------

  ► 10 Base 2
► CSMA/CD ► 10 Base 5
► CSMA/CA ► 10 Base T
► TOKEN PASSING ► None of the given
► None of the given
twisted pair ethernet
Most LANs that employ ring technology use an access  Formally called 10 Base –T
mechanism known as token passing. A token ring  Also twisted pair Ethernet
operates as a single, shared medium. When a computer or simply TP Ethernet
wants to send data, it must wait until it obtains the
token, when it is in control of the ring
Question No: 11 ( Marks: 1 ) -
Please choose one
Question No: 8 ( Marks: 1 ) - Please choose one The maximum size of an
Ethernet uses a ------ bit static addressing scheme Ethernet segment
in which each device is assigned a unique address is___________
by the manufacturer.  
► 250 meters
► 500 meters
► 64 ► 700 meters
► 48 ► None of the given
► 32
►8 One Ethernet cable is sometimes
called a segment. This segment is
Ethernet uses a 48-bit static addressing scheme limited to 500 meters in length.

[email protected]
The minimum separation between connections is 3
meters. (P# 27) Question No: 15 ( Marks: 1 ) -
Please choose one
Question No: 12 ( Marks: 1 ) - Please choose one Basic LAN technologies such
A Bridge can ________ as Ethernet, Token Ring, and
FDDI use a _____.
   
► Filter a frame ► Connectionless service
► Forward a frame paradigm
► Extend a LAN ► Connection-oriented service
► Do all the above paradigm
► Both Connectionless and
A bridge is a hardware device also used to connect two Connection-oriented service
LAN segments to extend a LAN. It listens to all traffic paradigm
and recognizes frame format. It also forwards only ► None of the given
correct complete frames and discards the collided and
error frames.
The most important task a bridge performs is frame
filtering. Question No: 16 ( Marks: 1 ) -
Please choose one
Question No: 13 ( Marks: 1 ) - Please choose one The product of delay and
_______ computes shortest paths in a graph by throughput measures the
using weights on edges as a measure of distance. _____ of data that can be
present on the network.
   
► Greedy algorithm ► Area
► Distance vector algorithm ► Volume
► Dijksta’s algorithm ► Length
► Non of the given ► None of the given

Dijkstras algorithm computes shortest paths in a graph DELAY THROUPUT PRODUCT:


by using weights on edg as a measure of distance. A It is computed as delay time
path with the fewest number of edges may not be the multiplied by effective
path with least weight. (P# 173 e-books) throughput. It measures
amount of data that can be
Question No: 14 ( Marks: 1 ) - Please choose one present in the network (P# 80)
__________is used for compressed audio and
video where the data rate depends on the level of Question No: 17 ( Marks: 1 ) -
compression that can be achieved. Please choose one
A network with throughput T
  and delay D has a total of
► Constant Bit Rate (CBR) service ________ bit in transit at any
► Variable Bit Rate (VBR) service time.
► Available Bit Rate (ABR) service  
► None of the given ►T/D
►TxD
VARIABLE BIT RATE (VBR): ►T+D
It is used for compressed audio and video where the ► None of the given
data rate depends on the level of compression that can
be achieved. A network with throughput T and
delay D has a total of T x D bits in

[email protected]
transit at ------ Program sends a message
any time. (e-books) to a remote computer and reports
whether the computer responds.
Question No: 18 ( Marks: 1 ) - Please choose one ► Ping 
One repeater _______, two repeaters ________ ► Traceroute
the maximum cable length limitation. ► ICMP
► Non of the given
   
► doubles, triple Question No: 3 ( Marks: 1 ) -
► square roots, cude roots Please choose one
► and, triple ---------- was especially
► doubles, cancel concerned about the lack of high
powered computers.
One repeater doubles, two repeaters triple the ► ARPA
maximum cable length limitation. (P# 49) ► IEEE
► EIA
Question No: 19 ( Marks: 1 ) - Please choose one ► Non of the given
A network uses a ------ if all computers attach to a The US Department of Defense
central point Advanced Research Projects
Agency (ARPA) was especially
concerned about the lack of high-
  powered computers. Many of the
► Star Topology ARPA research projects needed
► Ring Topology access to the latest equipment
► Bus Topology  
► None of the given Question No: 4 ( Marks: 1 ) -
Please choose one
Question No: 20 ( Marks: 1 ) - Please choose one The term -------- is used to
Computers attached to an ethernet use ------ in denote the definition of a packet
which a computer waits for the other to be idle used with a specific type of
before transmitting a frame. network.
  ► Packet
► CSMA/CD ► Frame
► CSMA/CA ► Data
► TOKEN PASSING ► None of the given
► None of the given To help distinguish between the
general idea of packet
Question No: 1 ( Marks: 1 ) - Please choose one transmission and the specific
No error detection scheme is perfect because definition of packets for a given
transmission errors can affect the additional information hardware technology, we use the
as well as the data. term frame to denote the
► True definition of a packet used with a
► False specific type of network. Thus one
No error detection scheme is perfect because might refer the maximum amount
transmission errors can affect the additional information of data a frame can hold or the
as well as the data. A cyclicly redunduncy chcek, which order in which bits of a frame are
is slightly more difficult to computer can detect more sent across a network.
errors then a Parity or Check sum mechnasim.  
  Question No: 5 ( Marks: 1 ) -
Question No: 2 ( Marks: 1 ) - Please choose one Please choose one

[email protected]
Computer networks are often called --------------
because they use packet technology.
► Ethernet
► Switch networks
► Packet networks
► None of the given
 
Question No: 6 ( Marks: 1 ) - Please choose one
-------------- have advantages arisen from the size and
ease of computation.
► CRC
► Parity
► Checksums
► None of given
 
Question No: 7 ( Marks: 1 ) - Please choose one
Most LANs that employ ring topology use an access
mechanism known as-------
Question No: 9 ( Marks: 1 ) -
► CSMA/CD
Please choose one
► CSMA/CA
Formally named __________
► TOKEN PASSING
informally known as the twisted
► None of the given
pair Ethernet or TP Ethernet.
Most LANs that employ ring technology use an access
► 10 Base 2
mechanism known as token passing. A token ring
► 10 Base 5
operates as a single, shared medium. When a computer
► 10 Base T
wants to send data, it must wait until it obtains the
► None of the given
token, when it is in control of the ring
   
Question No: 8 ( Marks: 1 ) - Please choose one twisted pair ethernet
IEEE LLC/SNAP header is --------, which is used to          Formally called 10 Base –T
specify the type of data.          Also twisted pair Ethernet or
► 8 octets simply TP Ethernet
► 8 bytes  
► 8 bits Question No: 10 ( Marks: 1 ) -
► None of the given Please choose one
An interface for twisted pair
Ethernet must have an
  ____________ connector , and
must generate signals according
to the_____________
specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
an interface for twisted pair
Ethernet must have an RJ-45
connector, and must generate
signals according to the 10BaseT
specification.  (P# 683 E-books)
 

[email protected]
Question No: 11 ( Marks: 1 ) - Please choose one It is used for audio and video,
A bridges function in the _________ layers(s). since these have predefined
► Physical (MAC) maximum data rates. (P# 71)
► Data link  
► Network Question No: 16 ( Marks: 1 ) -
► Physical (MAC) and Data link Please choose one
  Unlike Frame Relay and ATM,
Question No: 12 ( Marks: 1 ) - Please choose one SMDS (Switched multi-megabit
A Bridge can ________ Data service) offers_______ .
► Filter a frame ► Connectionless service
► Forward a frame paradigm
► Extend a LAN ► Connection oriented service
► Do all the above paradigm
A bridge is a hardware device also used to connect two ► Both Connectionless and
LAN segments to extend a LAN. It listens to all traffic Connection-oriented service
and recognizes frame format. It also forwards only paradigm
correct complete frames and discards the collided and ► None of the given
error frames. Switched Multi megabit Data
The most important task a bridge performs is frame Service (SMDS) is also a Telco
filtering. service. It is a connection less
  service.
Question No: 13 ( Marks: 1 ) - Please choose one FRAME RELAY:
A Bridge forwards or filters a frame by comparing the It is used for Telco service for
information in its address table to the delivering blocks of data. It is
frame’s__________ connection based
► Layer 2 source address Service
► Source node’s physical address ATM uses the concept of
► Layer 2 destination address connection-oriented networking
► Layer 3 destination address  
  Question No: 17 ( Marks: 1 ) -
Question No: 14 ( Marks: 1 ) - Please choose one Please choose one
________ computes shortest paths in a graph by using A network with throughput T and
weights on edges as a measure of distance. delay D has a total of ________
► Greedy algorithm bit in transit at any time.
► Distance vector algorithm ►T/D
► Dijksta’s algorithm ►TxD
► Non of the given ►T+D
Dijkstras algorithm computes shortest paths in a graph ► None of the given
by using weights on edg as a measure of distance. A A network with throughput T and
path with the fewest number of edges may not be the delay D has a total of T x D bits in
path with least weight. (P# 173 e-books) transit at 
  any time. (e-books)
Question No: 15 ( Marks: 1 ) - Please choose one  
___________ is used for audio and video, since these Question No: 18 ( Marks: 1 ) -
have predefined maximum data rates Please choose one
► Constant Bit Rate (CBR) service ATM is designed to work
► Variable Bit Rate (VBR) service on___________.
► Available Bit Rate (ABR) service ► Twisted Pair
► None of the given ► Coaxial
CONSTANT BIT RATE (CBR): ► Radio Frequency
► Fiber
[email protected]
ATM is designed to work on fiber (but can be used with
twisted pair). (P# 72)
 
Question No: 19 ( Marks: 1 ) - Please choose one
Computers attached to an ethernet use ------ in which a
computer waits for the ether to be idle before Ref No:
transmitting a frame. 1143600
► CSMA/CD
► CSMA/CA Time: 60 min
► TOKEN PASSING
► None of the given
All computers attached to the Ethernet use CSMA/CD to
co-ordinate their activities. A computer wishing to
transmit checks for electrical activity on the cable,
informally called a carrier. If there is no carrier, the
computer can transmit. If a carrier is present, the
computer waits for the sender to finish before
proceeding
 
Question No: 20 ( Marks: 1 ) - Please choose one
FDDI can transmits data at a rate of ----------
► 100 million bits per second
► 10 million bits per second
► 1000 million bits per second
► None of the given
FDDI: Fiber distributed data interconnect (FDDI) is
another ring technology. Its most important features
are: It uses fiber optics between stations and transmits
data at 100Mbps.
 
MIDTERM
EXAMINATION

Spring 2010
CS610- Computer
Network

[email protected]
[email protected]
Question No: 1 ( Marks: 1 ) - Please choose one

In Point-to-Point topology there are two topologies.

► Star and Tree

► Tree and Ring

► Star and Ring

► Star and Tree

► None of the given

Question No: 2 ( Marks: 1 ) - Please choose one

------ Program sends a message to a remote computer and reports


whether the computer responds.

► Ping

► Traceroute

► ICMP

► Non of the given

Question No: 3 ( Marks: 1 ) - Please choose one

------ has no way to determine the cause of the problem.


[email protected]

► ICMP

► Non of the given

► Ping

► Trace route

[email protected]
Question No: 4 ( Marks: 1 ) - Please choose one

The term----------refers to the general concept of a small block of data

► Packet

► Frame

► Data

► None of the given

Question No: 5 ( Marks: 1 ) - Please choose one

---------- scheme, which is designed to help detect transmissions


errors, send one extra bit of information with each character
► Parity

► Checksums

► CRC

► None of given

Question No: 6 ( Marks: 1 ) - Please choose one

Local Talk is a LAN technology that employs -------------


[email protected]
► Bus topology

► Ring topology

► None of the given

► Star topology

[email protected]
Question No: 7 ( Marks: 1 ) - Please choose one

Most LANs that employ ring topology use an access mechanism known
as-------

► TOKEN PASSING

► CSMA/CA

► TOKEN PASSING

► None of the given

Question No: 8 ( Marks: 1 ) - Please choose one

Ethernet uses a----bit static addressing scheme in which each device is


assigned a
unique address by the manufacturer.

► 64

► 48

► 32

►8

Question No: 9 ( Marks: 1 ) - Please choose one

[email protected]
Formally named informally known as the thick wire Ethernet or
Thick net.

► 10 Base T ( not sure )


► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given

[email protected]
Question No: 10 ( Marks: 1 ) - Please choose one

Formally named informally known as the twisted pair


Ethernet or TP Ethernet.

► 10 Base 2
► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given

Question No: 11 ( Marks: 1 ) - Please choose one

The maximum size of an Ethernet segment is

► 500 meters
► 250 meters

► 500 meters

► 700 meters

► None of the given

[email protected]
Question No: 12 ( Marks: 1 ) - Please choose one

A Bridge can

► Do all the above


► Filter a frame

[email protected]
► Forward a frame

► Extend a LAN

► Do all the above

Question No: 13 ( Marks: 1 ) - Please choose one

computes shortest paths in a graph by using weights on edges as a


measure of distance.

► Dijksta’s algorithm
► Greedy algorithm

► Distance vector algorithm

► Dijksta’s algorithm

► Non of the given ( not sure )

Question No: 14 ( Marks: 1 ) - Please choose one

is used for compressed audio and video where the data rate
depends on the level of compression that can be achieved.

► Constant Bit Rate (CBR) service

► Variable Bit Rate (VBR) service

► Available Bit Rate (ABR) service

► None of the given

[email protected]
Question No: 15 ( Marks: 1 ) - Please choose one

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a .

[email protected]
► Connection-oriented service paradigm ( not sure )
► Connectionless service paradigm

► Connection-oriented service paradigm

► Both Connectionless and Connection-oriented service paradigm

► None of the given

Question No: 16 ( Marks: 1 ) - Please choose one

The product of delay and throughput measures the of data that can
be present on the network.

► None of the given ( not sure )


► Area

► Volume

► Length

Question No: 17 ( Marks: 1 ) - Please choose one

A network with throughput T and delay D has a total of bit in


transit at any time.

[email protected]
►TxD
►T/D

►TxD

►T+D

► None of the given

[email protected]
Question No: 18 ( Marks: 1 ) - Please choose one

One repeater , two repeaters the maximum cable length limitation.

► doubles, triple

► square roots, cude roots

► and, triple

► doubles, cancel

Question No: 19 ( Marks: 1 ) - Please choose one

A network uses a- - -if all computers attach to a central point

► Star Topology

► Ring Topology

► Bus Topology

► None of the given

Question No: 20 ( Marks: 1 ) - Please choose one

[email protected]
Computers attached to an ethernet use in which a computer waits for the
ether to be
idle before transmitting a frame.

► TOKEN PASSING
► CSMA/CD

► CSMA/CA

[email protected]
► None of the given

Question No: 21 ( Marks: 2 )

What is the difference between LAN and WAN?

Local area network (LAN)


LAN is small in size covers the area within a room,
building or cities. Wide area network (WAN)
WAN is large in size and covers the area cities, countries and
continents.

Question No: 22 ( Marks: 2 )

Define the term Jitter.

The term Jitter is used for variance in transmission delays. Jitter


is significance for voice, video and data. Jitter can occur when
a packet is delayed because the network is busy.

Question No: 23 ( Marks: 3 )

GIve a comparision of wiring Schemes.

Thick Ethernet wiring scheme.


This uses thick coax cable. AUI cable or transceiver or drop
cable connects from NIC to transceiver. AUI cable carries
digital signal from NIC to transceiver. The transceiver
[email protected]
generates analog signal on coax cable. The wires in AUI carry
digital signals power and other control signals. Thick Ethernet
also requires terminators to avoid signal reflectance.

Thin Ethernet wiring scheme.


Thin Ethernet uses thin coax cable that is cheaper and easier
to install than thick Ethernet coax. In thin ethernet wiring
scheme transceiver electronics are built into NIC and NIC
connect directly to network medium. Coax cable use
connector on NIC. Coax runs directly to back of each
connected computer by T-connector. The T-connector
directly attaches to NIC.

Question No: 24 ( Marks: 3 )

[email protected]
How can Switched Virtual Network be established?

Most networks offer dynamic connections that last for a relatively


short time. ATM can dynamically establish a switched virtual
circuit SVC that allows it as long as necessary and then
terminate it. The computer sends a connection request to the
switch to which it is attached. Software in the switch finds a
path to the destination and sends with the connection request.
Each pair of switches in the path communicates to choose a
VPI/VCI for their tables. Once the connection is established by
the destination than a message is given back to the originating
computer to indicate the SVC is ready.

Question No: 25 ( Marks: 5 )

Describe permanent virtual circuits (PVC).

ATM can provide the virtual circuits that look like traditional leased
digital circuits. The permanent virtual circuits PVC works as long
as the customer pays the periodic fee for its use. The forwarding
table enter configured the terms used by Telco Provisioning
requires two steps.

To determine a complete path.

To choose appropriate VPI/VCI for each step in the path and


configures each adjacent pair of switches.

Question No: 26 ( Marks: 5 )


[email protected]
What are default routes, draw the table.

Routing table entries can collapse with a default route. If destination


doesn’t have in explicit routing table entry and then it use a default
route. It is shown in the below table.

Destination Next Destination Next Destination Next Destination Next


hop hop hop hop
1 - 2 - 1 3,1 2 4,2
* 1,3 4 2,4 2 3,2 4 -
* 2,3 3 - * 4,3
4 3,4
Node 1 Node 2 Node 3 Node 4

[email protected]
MIDTERM EXAMINATION
Spring 2010
CS610- Computer Network
Time: 60 min
Marks: 40

Question No: 1 ( Marks: 1 ) - Please choose one

No error detection scheme is perfect because transmission errors can


affect the additional information as well as the data.

► True

► False

Question No: 2 ( Marks: 1 ) - Please choose one

------ Program sends a message to a remote computer and reports


whether the computer responds.

► Ping
Ping

► Traceroute

► ICMP

► Non of the given

[email protected]
Question No: 3 ( Marks: 1 ) - Please choose one

---------- was especially concerned about the lack of high powered


computers.

► ARPA

► IEEE

[email protected]
► EIA

► Non of the given

Question No: 4 ( Marks: 1 ) - Please choose one

The term-------is used to denote the definition of a packet used with a


specific type of
network.

► Packet

► Frame

► Data

► None of the given

Question No: 5 ( Marks: 1 ) - Please choose one

Computer networks are often called----because they use packet technology.

► Ethernet

► Switch networks

[email protected]
► Packet networks

► None of the given

Question No: 6 ( Marks: 1 ) - Please choose one

[email protected]
-------------- have advantages arisen from the size and ease of
computation.

► CRC

► Parity

► Checksums

► None of given

Question No: 7 ( Marks: 1 ) - Please choose one

Most LANs that employ ring topology use an access mechanism known
as-------

► CSMA/CD

► CSMA/CA

► TOKEN PASSING

► None of the given

Question No: 8 ( Marks: 1 ) - Please choose one

[email protected]
IEEE LLC/SNAP header is- , which is used to specify the type of data.

► 8 octets

► 8 bytes

► 8 bits

► None of the given

[email protected]
Question No: 9 ( Marks: 1 ) - Please choose one

Formally named informally known as the twisted pair


Ethernet or TP Ethernet.

► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given

Question No: 10 ( Marks: 1 ) - Please choose one

An interface for twisted pair Ethernet must have an connector , and


must generate signals according to the specification.

► RJ-45, 10 Base T

► RJ-45, 10 Base 5

► BNC, 10 Base 2

► BNC, 10 Base T

Question No: 11 ( Marks: 1 ) - Please choose one

A bridges function in the layers(s).


[email protected]
Question No: 9 ( Marks: 1 ) - Please choose one
► Physical (MAC)

► Data link

► Network

► Physical (MAC) and Data link

[email protected]
Question No: 12 ( Marks: 1 ) - Please choose one

A Bridge can

► Filter a frame

► Forward a frame

► Extend a LAN

► Do all the above

Question No: 13 ( Marks: 1 ) - Please choose one

A Bridge forwards or filters a frame by comparing the information


in its address table to the frame’s

► Layer 2 source address

► Source node’s physical address

► Layer 2 destination address

► Layer 3 destination address

Question No: 14 ( Marks: 1 ) - Please choose one

[email protected]
Question No: 12 ( Marks: 1 ) - Please choose one
computes shortest paths in a graph by using weights on edges as a
measure of distance.

► Greedy algorithm

► Distance vector algorithm

► Dijksta’s algorithm

[email protected]
► Non of the given

Question No: 15 ( Marks: 1 ) - Please choose one

is used for audio and video, since these have predefined


maximum data rates

► Constant Bit Rate (CBR) service

► Variable Bit Rate (VBR) service

► Available Bit Rate (ABR) service

► None of the given

Question No: 16 ( Marks: 1 ) - Please choose one

Unlike Frame Relay and ATM, SMDS (Switched multi-


megabit Data service) offers .

► Connectionless service paradigm

► Connection oriented service paradigm

► Both Connectionless and Connection-oriented service paradigm

► None of the given

[email protected]
Question No: 17 ( Marks: 1 ) - Please choose one

A network with throughput T and delay D has a total of bit in


transit at any time.

►T/D

[email protected]
►TxD

►T+D

► None of the given

Question No: 18 ( Marks: 1 ) - Please choose one

ATM is designed to work on .

► Twisted Pair

► Coaxial

► Radio Frequency

► Fiber

Question No: 19 ( Marks: 1 ) - Please choose one

Computers attached to an ethernet use in which a computer waits for the


ether to be
idle before transmitting a frame.

► CSMA/CD

► CSMA/CA

[email protected]
► TOKEN PASSING

► None of the given

Question No: 20 ( Marks: 1 ) - Please choose one

[email protected]
FDDI can transmits data at a rate of ----------

► 100 million bits per second

► 10 million bits per second

► 1000 million bits per second

► None of the given

Question No: 21 ( Marks: 2 )

What is the difference between the physical and logical topologies?

Every LAN has a topology, or the way that the devices on a network
are arranged and how they communicate with each other.
PHYSICL TOPOLOGY:
The way that the workstations are connected to the network through
the actual cables that transmit data -- the physical structure of the
network -- is called the physical topology. It depends on the
wiring scheme.
LOGICAL TOPOLOGY:
The logical topology, in contrast, is the way that the signals act on
the network media, or the way that the data passes through the
network from one device to the next without regard to the physical
interconnection of the devices. We can say that it is defined by the
specific network technology.

Question No: 22 ( Marks: 2 )

[email protected]
Define Vector-Distance Algorithm.

Packet switches wait for next update message and they iterate
through entries in message. If entry has shortest path to
destination, insert source as next hop to destination and record
distance as distance from next hop to destination plus distance
from this switch to next hop.

Question No: 23 ( Marks: 3 )

What is the concept of store and forward technology?

[email protected]
STORE AND FORWARD:
Data delivery from one computer to another is accomplished
through store and forward technology. In this technology packet
switch stores incoming packet and also forwards that packet to
another switch or computer. For this purpose packet switch has
internal memory into which it can hold packet if outgoing
connection is busy. Packets for each connection held on queue.

Question No: 24 ( Marks: 3 )

How can Switched Virtual Network be established?


SWITCHED VIRTUAL CIRCUITS:

Most networks offer dynamic connections, which last for a relatively short
time.
To handle this, ATM can dynamically establish a switched virtual
circuit (SVC), allow it last as long as necessary and then terminate
it.
The terminology comes from the Telco’s where switching system
normally refers to all switching.

ESTABLISHING AN SVC:

The computer sends a connection request to the switch to which


it is attached. Software in the switch finds a network path to
the destination and sends along the connection request.
Each pair of switches in the path communicates to choose a
VPI/VCI for their tables. Once the connection is established by
the destination, a message is sent back to the originating
computer to indicate the SVC is ready.
If any switch or the destination computer does not agree to setting
up the VC, an error message is sent back and the SVC is not
[email protected]
established

Question No: 25 ( Marks: 5 )

How can a bridge know whether to forward frames?

The bridge builds a list of MAC addresses on either side of the


bridge. Therefore, it knows which packets should be forwarded to
the other side and which should not. Most bridges are self-
learning bridges. As soon as a frame arrives to a bridge, it
extracts a source address from its header and automatically adds
it in the list for that segment. In this way a bridge builds up
address lists.
In the example of a packet that uses a MAC address not in its table
it can err on the side of caution by forwarding the packet.

[email protected]
Question No: 26 ( Marks: 5 )

Compare connection oriented and connectionless Service.

Connection-Oriented vs. Connectionless Service


This characteristic specifies whether conversations take place in a
more or less structured manner. When using a connection-
oriented protocol, you incur the overhead of setting up a virtual
circuit (a defined communications path) between the sender and
receiver, which is maintained until the sender and receiver have
completed their entire conversation.
When the conversation is completed, you incur the overhead of
tearing down the virtual circuit. Connection-oriented protocols
provide guaranteed delivery of messages in the order in which
they were sent.
Contrast this with Connectionless service, which does not require
establishing a session and a virtual circuit. This can be found in
the network layer or transport layer, depending on the protocol.
You can think of a connectionless protocol as being akin to
mailing a post card. You send it and hope that the receiver gets it.
Common features of a connectionless service are:
• Packets do not need to arrive in a specific order
• Reassembly of any packet broken into fragments during transmission must be
in proper order
• No time is used in creating a session
• No Acknowledgement is required.
• The largest connectionless network in use today is the Internet

MIDTERM EXAMINATION
Fall 2008
CS610- Computer Network
(Session - 2)

Time: 60 min
Marks: 38

[email protected]
Question No: 1 ( Marks: 1 ) -
Please choose one
A typical port on an ATM switch operates at or higher.
► OC-2 speed (155Mbps)
► OC-3 speed (100Mbps)
► OC-3 speed (155Mbps)
► OC-3 speed (155Gbps)

Question No: 2 ( Marks: 1 ) -


Please choose one
The product of delay and throughput measures the of data that
can be present on the network.

► Area

[email protected]
► Volume
► Length
► None of the given

Question No: 3 ( Marks: 1 ) -


Please choose one
is used for compressed audio and video where the data
rate depends on the level of compression that can be achieved.
. . . .►.Constant Bit Rate (CBR) service
. . . .►.Variable Bit Rate (VBR) service
. . . .►.Available Bit Rate (ABR) service
. . . .►.None of the given

Question No: 4 ( Marks: 1 ) -


Please choose one
Which of the following is a connecting device?
. . . .►.Bridge
. . . .►.Repeater
. . . .►.Hub
. . . .►.All the given

Question No: 5 ( Marks: 1 ) -


Please choose one
A bridges function in the layers(s).
. . . .►.Physical (MAC)
. . . .►.Data link
. . . .►.Network (not sure)
. . . .►.Physical (MAC) and Data link

Question No: 6 ( Marks: 1 ) -


Please choose one
IEEE LLC/SNAP header is- , which is used to specify the type of data.
. . . .►.8 octets
. . . .►.8 bytes
. . . .►.8 bits
. . . .►.None of the given

Question No: 7 ( Marks: 1 ) -


[email protected]
Please choose one
The third field of the header consists of bit Ethernet frame type.
. . . .►.48(not sure)
. . . .►.32
. . . .►.16
. . . .►.8

Question No: 8 ( Marks: 1 ) -


Please choose one
An--------method, the network hardware designers specify how
type information is included in the frame and the value use to
identify various frame types.
. . . .►.Explicit frame type

[email protected]
. . . .►.Ideal frame type
. . . .►.Implicit frame type

. . . .►.None of the given

Question No: 9 ( Marks: 1 ) -


Please choose one
Local Talk is a LAN technology that employs -------------

. . . .►.Star topology
. . . .►.Bus topology

. . . .►.Ring topology
---------- scheme,
. . . .►.None which
of the is designed to help detect transmissions errors, send one extra bit of
given
information with each character
.......►.Parity
Question No: 10 ( Marks: 1 )
.......►.Checksums
-
Please choose one
.......►.CRC
The Fast Ethernet
.......►.None of given hardware operates at a rate of --------
. . . .►.10 Mbps
. . . .►.100 No:
Question Mbps12( Marks: 1 )- Please choose one
. . . .►.1000networks
Computer Mbps are often calledbecause they use packet technology.
. . . .►.None of the given
.......►.Ethernet

Question No:
.......►.Switch 11 (
networks Marks: 1 ) - Please choose one
.......►.Packet networks

. . . .►.None of the given

Question No: 13 ( Marks: 1 ) -


Please choose one
------ Program sends a message to a remote computer and reports
whether the computer responds.
. . . .►.Ping
. . . .►.Traceroute
. . . .►.ICMP

[email protected]
. . . .►.Non of the given

Question No: 14 ( Marks: 1 ) -


Please choose one
In , network occupies larger areas like cities & countries.
. . . .►.LAN

. . . .►.WAN
. . . .►.MAN
. . . .►.None of the given

Question No: 15 ( Marks: 1 ) -


Please choose one
In , network
.......►.Star occupies the smaller area like a room a floor or a building
and Tree
.......►.None of the given
.Question
. . .►.LANNo: 17( Marks: 2 )
. . . .►.WAN
□□□□.□□□.□□□.□□□□□□□.□□.□□□□□.□□□□□.□□□□□□□
. . . .►.MAN
.Question
. . .►.NoneNo:of18(the given
Marks: 2)

Question No: 16 ( Marks: 1 ) - Please choose one


□□□□.□□□□.□□.□□□□□□.□□□.□□□□□□□□□.□□□.□□.□□□□□□□□□□□□.□
□.□□□□□.□□□□□..□□□□.□□.□□□.□□□□□□.□□.□□□□□.□□□□□□□
In Point-to-Point topology there are two topologies.

.Question
. . .►.TreeNo:
and19(Ring
Marks: 3 )
.Why
. . .►.Star andT wiring
10-base Ringscheme is called star shaped bus wiring scheme.
The main feature of twisted pair Ethernet is that it forms a classic star topology however
functions like a bus. 10Base-T Ethernet is often called a star shaped bus.
Question No: 20 ( Marks: 5 )
What are the main factors due to which mechanism of error detections
schemes differ?

Question No: 21 ( Marks: 10 )


How much data can be present on an original Ethernet segment at
one time? To find out, compute the delay-throughput product. The
original Ethernet operate at 10 mega bits per second, and a segment
was limited to 500 meters. Assume the signals propagate down the
cable at 66 percent of the speed of light.\

[email protected]
One Ethernet cable is sometimes called a segment. This
segment is limited to 500 meters in length. The minimum
separation between connections is 3 meters.

MIDTERM EXAMINATION
Fall 2008
CS610- Computer Network
(Session - 2)
Ref No: 109816
Time: 60 min
Marks: 38
Question No: 1 ( Marks: 1 ) -
Please choose one
has a jitter zero

► None of the given

► Virtual Private Network


► Isochronous Network
► Asynchronous Network

Question No: 2 ( Marks: 1 )- Please choose one


.Unlike Frame Relay and ATM, SMDS (Switched multi-
megabit Data service) offers .
. . . .►.Connectionless service paradigm
. . . .►.Connection oriented service paradigm
. . . .►.Both Connectionless and Connection-oriented service paradigm

. . . .►.None of the given

Question No: 3 ( Marks: 1 )- Please choose one


.ATM assigns each VC a identifier that is divided two parts
to produce a hierarchy.
. . . .►.21-bit
. . . .►.22-bit
. . . .►.23-bit
. . . .►.24-bit

[email protected]
Question No: 4 ( Marks: 1 )- Please choose one
.Most WAN systems include a mechanism that can be used to
eliminate the common case of duplication routing is called
. . . .►.Hierarchal address
. . . .►.Default route
. . . .►.Shortest path
. . . .►.None of the given

Question No: 5 ( Marks: 1 )- Please choose one


.The next hop to which a packet is sent depends only on

[email protected]
. . . .►.Packet’s destination
. . . .►.Packet’s original source
. . . .►.Path the packet has taken
. . . .►.Non of the given

Question No: 6 ( Marks: 1 )- Please choose one


.An interface for twisted pair Ethernet must have an connector ,
and must generate signals according to the specification.
. . . .►.RJ-45, 10 Base T
. . . .►.RJ-45, 10 Base 5
. . . .►.BNC, 10 Base 2

. . . .►.BNC, 10 Base T

Question No: 7 ( Marks: 1 )- Please choose one


.When an application--------data, it makes a copy of the data available to all
other
computers on the network.

. . . .►.Broadcasting
. . . .►.Multicasting
. . . .►.Unicasting
. . . .►.None of the given

Question No: 8 ( Marks: 1 )- Please choose one


.A ---------- provide a mechanism that a customer can use to set a physical
address.

. . . .►.Static addressing scheme


. . . .►.Configurable addressing scheme
. . . .►.Dynamic addressing scheme

. . . .►.None of the given

Question No: 9 ( Marks: 1 )- Please choose one


.FDDI can transmits data at a rate of -----100 million bits per second -----

[email protected]
. . . .►.100 million bits per second
. . . .►.100 million bits per second
. . . .►.100 million bits per second
. . . .►.None of the given

Question No: 10 ( Marks: 1 ) - Please choose one


.Computers attached to an ether use in which a computer waits for the
ether to be
idle before transmitting a frame.

. . . .►.CSMA/CD

[email protected]
. . . .►.CSMA/CA
. . . .►.TOKEN PASSING

. . . .►.None of the given


.......►.None of given
Question No: 11 ( Marks: 1 )
Question No: 12( Marks: 1 )- Please choose one
- Please choose one
.--------------
.The termis
have advantages arisen from the size and ease
used to denote the definition of a packet used with a specific type of
of
computation.
network.
. . . .►.CRC ( not sure )
. . . .►.Parity
.......►.P
. . . .►.Checksums
acket

.......►.F
rame
. . . .►.Data

. . . .►.None of the given

Question No: 13 ( Marks: 1 ) - Please choose one


.------ has no way to determine the cause of the problem.

. . . .►.Ping
. . . .►.Trace route
. . . .►.ICMP
. . . .►.Non of the given

Question No: 14 ( Marks: 1 ) - Please choose one


.------ Program sends a message to a remote computer and reports
whether the computer responds.
. . . .►.Ping
. . . .►.Traceroute
. . . .►.ICMP
. . . .►.Non of the given

Question No: 15 ( Marks: 1 ) - Please choose one


.In, network occupies the smaller area like a room a floor or a building

. . . .►.LAN
[email protected]
. . . .►.WAN
. . . .►.MAN
. . . .►.None of the given

Question No: 16 ( Marks: 1 ) - Please choose one


.No error detection scheme is perfect because transmission errors
can affect the additional information as well as the data.
. . . .►.□□□□ False
. . . .►.□□□□□
Question No: 17( Marks: 2 )Format is not clear even I try to do with cntl+A
and then change format with 12/Times new roman or ariel. But fail
.□□□□.□□.□□□□□.□□.□□□.□□□.□□□□

Question No: 18( Marks: 2 ) ???? Format nt clear


□□□□.□□□.□□□□□□.□□□□.□□□.□□□.□□□□□.□□□□□□.□□□□.□□□□□.□
□□□
Question No: 19( Marks: 3 ) ????? Format not Clear
.□□□□□□.□□□□□□.□□□□□□□.□□□□.□□□□□□

Question No: 20 ( Marks: 5 )


.Which type of information is obtained from network sniffer and in
which mode Network sniffer operates?

Solution:
A network analyzer also called network monitor or a network sniffer
is used to examine the performance of or debug a network. It can
report statistics such as capacity utilization, distribution of frame
size, collision rate or token circulation time

Most installations still use DIX Ethernet encoding in which there


is no LLC/SNAP header in the frame. A network analyzer can tell
from the values in the type field (small values are lengths, which
mean an LLC/SNAP header is located in the first octets of the data
area; large values are types, which mean no LLC/SNAP header is
included).
[email protected]
The operation of network analyzer is a computer with a network
interface that receives all frames, which is called promiscuous
mode. So many desktop computers have interface that can be
configured for promiscuous mode. When combined with software
computer can examine any frame on LAN. In this way the
communication across LAN is guaranteed to be private. Computer
receives and displays frames on the LAN.
Network analyzer can be configured to filter and process frames. It
can count frames of specific type of size. It displays only frames
from or to specific computers.

Question No: 21 ( Marks: 10 )


.□□□□.□□□.□□□.□□□□□□□□□.□.□□□.□□□□□□□□□□□□.□.□□.

[email protected]
Thick Ethernet, Thin Ethernet and Twisted pair Ethernet.
Solution:-
Thick
Ethernet:
Thick Ethernet, officially known as 10 Base-5, is the oldest form of
Ethernet.
One form of cabling supported by Ethernet is low-loss 50 Ohm
coaxial cable as shown in the figure below. This type of cable is
0.5" diameter (usually supplied with a yellow outer PVC coating)
and rather inflexible. It has become known in the communications
industry as "Thick Ethernet". The official name for this cable is 10
Baseband5 (10B5), indicating that it is specified for baseband
communications at 10 Mbps over distances up to 500m.

Thin Ethernet:

Thin Ethernet, officially called 10 Base-2, is a less expensive version


of 10 Base-5 (Thick Ethernet) technologies. It uses a lighter and
thinner coaxial cable and dispenses with the external transceivers
used with 10 Base-5.

10 Base-2 uses an RG-58A/U coaxial cable and is wired in a bus


topology. Each device on the network is connected to the bus
through a BNC "T" adapter, and each end of the bus must have a
50 Ohm terminator attached. Each node on the bus must be a
minimum of 0.5 meters (1.5 feet) apart, and the overall length of
the bus must be less than 185 meters (606 feet).

Twisted Pair Ethernet:

Twisted Pair Ethernet (10baseT), sometime also called "UTP" from


"Unshielded Twisted Pair", is based on using a cable similar to
phone-wiring. The cable is connected via RJ-45 connectors to the
[email protected]
network card installed in the PC.

[email protected]
www.virtualinspire.com

MIDTERM EXAMINATION

CS610- Computer Network

Question No: 1 ( Marks: 1 ) - Please choose one

No error detection scheme is perfect because transmission errors can affect


the additional information as well as the data.

► True

► False

Question No: 2 ( Marks: 1 ) - Please choose one

------ Program sends a message to a remote computer and reports


whether the computer responds.

► Ping

Ping

► Traceroute

► ICMP

► Non of the given


www.virtualinspire.com
Question No: 3 ( Marks: 1 ) - Please choose one

---------- was especially concerned about the lack of high powered


computers.

► ARPA

► IEEE
www.virtualinspire.com
► EIA

► Non of the given

Question No: 4 ( Marks: 1 ) - Please choose one

The term-------is used to denote the definition of a packet used with a


specific type of
network.

► Packet

► Frame

► Data

► None of the given

Question No: 5 ( Marks: 1 ) - Please choose one

Computer networks are often called----because they use packet technology.

► Ethernet
www.virtualinspire.com
► Switch networks

► Packet networks

► None of the given


www.virtualinspire.com
Question No: 6 ( Marks: 1 ) - Please choose one

-------------- have advantages arisen from the size and ease of


computation.

► CRC

► Parity

► Checksums

► None of given

Question No: 7 ( Marks: 1 ) - Please choose one

Most LANs that employ ring topology use an access mechanism known
as-------

► CSMA/CD

► CSMA/CA

► TOKEN PASSING

► None of the given


www.virtualinspire.com

Question No: 8 ( Marks: 1 ) - Please choose one

IEEE LLC/SNAP header is- , which is used to specify the type of data.

► 8 octets

► 8 bytes

► 8 bits

► None of the given


www.virtualinspire.com

Question No: 9 ( Marks: 1 ) - Please choose one

Formally named informally known as the twisted pair


Ethernet or TP Ethernet.

► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given

Question No: 10 ( Marks: 1 ) - Please choose one

An interface for twisted pair Ethernet must have an connector , and


must generate signals according to the specification.

► RJ-45, 10 Base T

► RJ-45, 10 Base 5

► BNC, 10 Base 2

► BNC, 10 Base T
www.virtualinspire.com

Question No: 11 ( Marks: 1 ) - Please choose one

A bridges function in the layers(s).

► Physical (MAC)

► Data link

► Network
www.virtualinspire.com
► Physical (MAC) and Data link

Question No: 12 ( Marks: 1 ) - Please choose one

A Bridge can

► Filter a frame

► Forward a frame

► Extend a LAN

► Do all the above

Question No: 13 ( Marks: 1 ) - Please choose one

A Bridge forwards or filters a frame by comparing the information


in its address table to the frame’s

► Layer 2 source address

► Source node’s physical address

► Layer 2 destination address

► Layer 3 destination address


www.virtualinspire.com

Question No: 14 ( Marks: 1 ) - Please choose one

computes shortest paths in a graph by using weights on edges as a


measure of distance.

► Greedy algorithm

► Distance vector algorithm


www.virtualinspire.com
► Dijksta’s algorithm

► Non of the given

Question No: 15 ( Marks: 1 ) - Please choose one

is used for audio and video, since these have predefined


maximum data rates

► Constant Bit Rate (CBR) service

► Variable Bit Rate (VBR) service

► Available Bit Rate (ABR) service

► None of the given

Question No: 16 ( Marks: 1 ) - Please choose one

Unlike Frame Relay and ATM, SMDS (Switched multi-


megabit Data service) offers .

► Connectionless service paradigm

► Connection oriented service paradigm

► Both Connectionless and Connection-oriented service paradigm


www.virtualinspire.com

► None of the given

Question No: 17 ( Marks: 1 ) - Please choose one

A network with throughput T and delay D has a total of bit in


transit at any time.
www.virtualinspire.com
►T/D

► TxD

►T+D

► None of the given

Question No: 18 ( Marks: 1 ) - Please choose one

ATM is designed to work on .

► Twisted Pair

► Coaxial

► Radio Frequency

► Fiber

Question No: 19 ( Marks: 1 ) - Please choose one

Computers attached to an ethernet use in which a computer waits for the


ether to be
Question No: 20 ( Marks: 1 ) - Please choose one
www.virtualinspire.com
idle before transmitting a frame.

► CSMA/CD

► CSMA/CA

► TOKEN PASSING

► None of the given

Question No: 20 ( Marks: 1 ) - Please choose one


www.virtualinspire.com

FDDI can transmits data at a rate of ----------

► 100 million bits per second

► 10 million bits per second

► 1000 million bits per second

► None of the given

Question No: 21 ( Marks: 2 )

What is the difference between the physical and logical topologies?

Every LAN has a topology, or the way that the devices on a network
are arranged and how they communicate with each other.
PHYSICL TOPOLOGY:
The way that the workstations are connected to the network through
the actual cables that transmit data -- the physical structure of the
network -- is called the physical topology. It depends on the
wiring scheme.

LOGICAL TOPOLOGY:
Question No: 23 ( Marks: 3 )
www.virtualinspire.com
The logical topology, in contrast, is the way that the signals act on
the network media, or the way that the data passes through the
network from one device to the next without regard to the physical
interconnection of the devices. We can say that it is defined by
the specific network technology.

Question No: 22 ( Marks: 2 )

Define Vector-Distance Algorithm.

Packet switches wait for next update message and they iterate
through entries in message. If entry has shortest path to
destination, insert source as next hop to destination and record
distance as distance from next hop to destination plus distance
from this switch to next hop.

Question No: 23 ( Marks: 3 )


www.virtualinspire.com
What is the concept of store and forward technology?

STORE AND FORWARD:

Data delivery from one computer to another is accomplished through


store and forward technology. In this technology packet switch
stores incoming packet and also forwards that packet to another
switch or computer. For this purpose packet switch has internal
memory into which it can hold packet if outgoing connection is
busy. Packets for each connection held on queue.

Question No: 24 ( Marks: 3 )

How can Switched Virtual Network be established?


SWITCHED VIRTUAL CIRCUITS:

Most networks offer dynamic connections, which last for a relatively short
time.
To handle this, ATM can dynamically establish a switched virtual
circuit (SVC), allow it last as long as necessary and then terminate
it.
The terminology comes from the Telco’s where switching system
normally refers to all switching.

ESTABLISHING AN SVC:

The computer sends a connection request to the switch to which


it is attached. Software in the switch finds a network path to
the destination and sends along the connection request.
Each pair of switches in the path communicates to choose a
VPI/VCI for their tables. Once the connection is established by
the destination, a message is sent back to the originating
computer to indicate the SVC is ready.
www.virtualinspire.com
If any switch or the destination computer does not agree to setting up
the VC, an error message is sent back and the SVC is not
established

Question No: 25 ( Marks: 5 )

How can a bridge know whether to forward frames?

The bridge builds a list of MAC addresses on either side of the


bridge. Therefore, it knows which packets should be forwarded to
the other side and which should not. Most bridges are self-
learning bridges. As soon as a frame arrives to a bridge, it
extracts a source address from its header and automatically adds
it in the list for that segment. In this way a bridge builds up
address lists.
In the example of a packet that uses a MAC address not in its table it
can err on the side of caution by forwarding the packet.
www.virtualinspire.com

Question No: 26 ( Marks: 5 )

Compare connection oriented and connectionless Service.

Connection-Oriented vs. Connectionless Service

This characteristic specifies whether conversations take place in a


more or less structured manner. When using a connection-
oriented protocol, you incur the overhead of setting up a virtual
circuit (a defined communications path) between the sender and
receiver, which is maintained until the sender and receiver have
completed their entire conversation.
When the conversation is completed, you incur the overhead of
tearing down the virtual circuit. Connection-oriented protocols
provide guaranteed delivery of messages in the order in which they
were sent.
Contrast this with Connectionless service, which does not require
establishing a session and a virtual circuit. This can be found in
the network layer or transport layer, depending on the protocol.
You can think of a connectionless protocol as being akin to
mailing a post card. You send it and hope that the receiver gets it.
Common features of a connectionless service are:
 Packets do not need to arrive in a specific order
 Reassembly of any packet broken into fragments during transmission must be
in proper order
 No time is used in creating a session
 No Acknowledgement is required.
 The largest connectionless network in use today is the Internet
www.virtualinspire.com

MIDTERM EXAMINATION

CS610- Computer Network

Question No: 1 ( Marks: 1 ) - Please choose one


A typical port on an ATM switch operates at or higher.
► OC-2 speed (155Mbps)
► OC-3 speed (100Mbps)
► OC-3 speed (155Mbps)

► OC-3 speed (155Gbps)

Question No: 2 ( Marks: 1 ) - Please choose one

The product of delay and throughput measures the of data that


can be present on the network.

► Area
► Volume

► Length
► None of the given

Question No: 3 ( Marks: 1 ) - Please choose one

is used for compressed audio and video where the data


rate depends on the level of compression that can be achieved.
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service

► Available Bit Rate (ABR) service


►None of the given

Question No: 4 ( Marks: 1 ) - Please choose one


www.virtualinspire.com
Which of the following is a connecting device?
►Bridge
► Repeater
►Hub
►All the given

Question No: 5 ( Marks: 1 ) - Please choose one


A bridges function in the layers(s).
►Physical (MAC)
►Data link

►Network
www.virtualinspire.com
Physical (MAC) and Data link

Question No: 6 ( Marks: 1 ) - Please choose one

IEEE LLC/SNAP header is- , which is used to specify the type of data.
►8 octets
►8 bytes

►8 bits
►None of the given

Question No: 7 ( Marks: 1 ) - Please choose one

The third field of the header consists of bit Ethernet frame type.
►48
►32
►16

►8

Question No: 8 ( Marks: 1 ) - Please choose one


An------------method, the network hardware designers specify how type
information is
included in the frame and the value use to identify various frame types.
► Explicit frame type
►Ideal frame type
► Implicit frame type

►None of the given

Question No: 9 ( Marks: 1 ) - Please choose one

Local Talk is a LAN technology that employs -------------

► Star topology


►Bus topology

► Ring topology


www.virtualinspire.com
► None of the given

Question No: 10 ( Marks: 1 ) - Please choose one


The Fast Ethernet hardware operates at a rate of --------
►10 Mbps
►100 Mbps

►1000 Mbps
►None of the given

Question No: 11 ( Marks: 1 ) - Please choose one

---------- scheme, which is designed to help detect


transmissions errors, send one extra bit of information with
each character
►Parity

►Checksums
www.virtualinspire.com
► CRC
►None of given

Question No: 12 ( Marks: 1 ) - Please choose one


Computer networks are often called----because they use packet technology.
►Ethernet

►Switch networks

►Packet networks

►None of the given

Question No: 13 ( Marks: 1 ) - Please choose one

------ Program sends a message to a remote computer and reports


whether the computer responds.
►Ping

Ping
► Traceroute
►ICMP
►Non of the given

Question No: 14 ( Marks: 1 ) - Please choose one


In , network occupies larger areas like cities & countries.
►LAN

► WAN
►MAN
►None of the given

Question No: 15 ( Marks: 1 ) - Please choose one


In , network occupies the smaller area like a room a floor or a building

► LAN

►WAN
www.virtualinspire.com
►MAN
►None of the given

Question No: 16 ( Marks: 1 ) - Please choose one


In Point-to-Point topology there are two topologies.

►Tree and Ring


► Star and Ring
►Star and Tree

►None of the given


www.virtualinspire.com
Question No: 17 ( Marks: 2 )

□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□

Question No: 18 ( Marks: 2 )

□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□
□□□□□
□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□

Question No: 19 ( Marks: 3 )


Why 10-base T wiring scheme is called star shaped bus wiring scheme.

Question No: 20 ( Marks: 5 )

What are the main factors due to which mechanism of error detections
schemes differ?

Question No: 21 ( Marks: 10 )

How much data can be present on an original Ethernet segment at


one time? To find out, compute the delay-throughput product. The
original Ethernet operate at 10 mega bits per second, and a
segment was limited to 500 meters. Assume the signals propagate
down the cable at 66 percent of the speed of light.
www.virtualinspire.com

MIDTERM EXAMINATION

CS610- Computer Network


Question No: 1 ( Marks: 1 ) - Please choose one

has a jitter zero

► None of the given

► Virtual Private Network


► Isochronous Network
► Asynchronous Network

Question No: 2 ( Marks: 1 ) - Please choose one


Unlike Frame Relay and ATM, SMDS (Switched multi-
megabit Data service) offers .
►Connectionless service paradigm
►Connection oriented service paradigm
► Both Connectionless and Connection-oriented service
paradigm

►None of the given

Question No: 3 ( Marks: 1 ) - Please choose one

ATM assigns each VC a identifier that is divided two parts to


produce a
hierarchy.
►21-bit
► 22-bit
►23-bit
►24-bit

Question No: 4 ( Marks: 1 ) - Please choose one


Most WAN systems include a mechanism that can be used to eliminate the
common case
of duplication routing is called
►Hierarchal address
www.virtualinspire.com
► Default route
► Shortest path
►None of the given

Question No: 5 ( Marks: 1 ) - Please choose one

The next hop to which a packet is sent depends only on


►Packet’s destination
www.virtualinspire.com
►Packet’s original source
► Path the packet has taken
►Non of the given

Question No: 6 ( Marks: 1 ) - Please choose one

An interface for twisted pair Ethernet must have an connector , and must
generate signals according to the specification.
►RJ-45, 10 Base T
►RJ-45, 10 Base 5
►BNC, 10 Base 2

►BNC, 10 Base T

Question No: 7 ( Marks: 1 ) - Please choose one

When an application --------data, it makes a copy of the data available to all


other
computers on the network.

► Broadcasting
► Multicasting
► Unicasting
►None of the given

Question No: 8 ( Marks: 1 ) - Please choose one

A ---------- provide a mechanism that a customer can use to set a physical


address.

Static addressing scheme


►Configurable addressing scheme
►Dynamic addressing scheme

►None of the given

Question No: 9 ( Marks: 1 ) - Please choose one


www.virtualinspire.com
FDDI can transmits data at a rate of -----100 millio n bit s per second -----

► 100 million bits per second


► 100 million bits per second
► 100 million bits per second
►None of the given

Question No: 10 ( Marks: 1 ) - Please choose one


Computers attached to an ether use in which a computer waits for the
ether to be
idle before transmitting a frame.

►CSMA/CD
►CSMA/CA
www.virtualinspire.com
►TOKEN PASSING

None of the given

Question No: 11 ( Marks: 1 ) - Please choose one

 have advantages arisen from the size and ease of computation.


►CRC
►Parity
► Checksums

►None of given

Question No: 12 ( Marks: 1 ) - Please choose one


The term-----is used to denote the definition of a packet used with a
specific type of
network.

►Packet

►Frame

►Data

None of the given

Question No: 13 ( Marks: 1 ) - Please choose one


 has no way to determine the cause of the problem.

Ping
► Trace route
►ICMP
►Non of the given

Question No: 14 ( Marks: 1 ) - Please choose one


 Program sends a message to a remote computer and reports whether the
computer
www.virtualinspire.com
responds.
►



Pin
g
Ping
►Traceroute
►ICMP
►Non of the given

Question No: 15 ( Marks: 1 ) - Please choose one

In----------, network occupies the smaller area like a room a floor or a


building

►LAN
www.virtualinspire.com
► WAN
►MAN
►None of the given

Question No: 16 ( Marks: 1 ) - Please choose one

No error detection scheme is perfect because transmission errors can affect
the additional
information as well as the data.
►□□□□ False
►□□□□□

Question No: 17 ( Marks: 2 ) Format is not clear even I try to do with


cntl+A and then change format with 12/Times new roman or ariel. But
fail

□□□□□□□□□□□□□□□□□□□□□□□

□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□
□□□□□□□□□□
Question No: 18 ( Marks: 2 ) ???? Format nt clear

□□□

Question No: 19 ( Marks: 3 ) ????? Format not Clear


□□□□□□□□□□□□□□□□□□□□□□□□□□□□□

Question No: 20 ( Marks: 5 )

Which type of information is obtained from network sniffer and in which


mode Network
sniffer operates?

Solution:

A network analyzer also called network monitor or a network sniffer


is used to examine the performance of or debug a network. It can
report statistics such as capacity utilization, distribution of frame
size, collision rate or token circulation time

Most installations still use DIX Ethernet encoding in which there is


www.virtualinspire.com
no LLC/SNAP header in the frame. A network analyzer can tell
from the values in the type field (small values are lengths, which
mean an LLC/SNAP header is located in the first octets of the data
area; large values are types, which mean no LLC/SNAP header is
included).

The operation of network analyzer is a computer with a network


interface that receives all frames, which is called promiscuous
mode. So many desktop computers have interface that can be
configured for promiscuous mode. When combined with software
computer can examine any frame on LAN. In this way the
communication across LAN is guaranteed to be private. Computer
receives and displays frames on the LAN.
Network analyzer can be configured to filter and process frames. It
can count frames of specific type of size. It displays only frames
from or to specific computers.

Question No: 21 ( Marks: 10 )


www.virtualinspire.com
□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□
□□□□Thick Ethernet, Thin Ethernet and Twisted pair Ethernet.

Solution:-

Thick Ethernet:

Thick Ethernet, officially known as 10 Base-5, is the oldest form of


Ethernet.
One form of cabling supported by Ethernet is low-loss 50 Ohm
coaxial cable as shown in the figure below. This type of cable is
0.5" diameter (usually supplied with a yellow outer PVC coating)
and rather inflexible. It has become known in the communications
industry as "Thick Ethernet". The official name for this cable is 10
Baseband5 (10B5), indicating that it is specified for baseband
communications at 10 Mbps over distances up to 500m.

Thin Ethernet:

Thin Ethernet, officially called 10 Base-2, is a less expensive version


of 10 Base-5 (Thick Ethernet) technologies. It uses a lighter and
thinner coaxial cable and dispenses with the external transceivers
used with 10 Base-5.

10 Base-2 uses an RG-58A/U coaxial cable and is wired in a bus


topology. Each device on the network is connected to the bus
through a BNC "T" adapter, and each end of the bus must have a
50 Ohm terminator attached. Each node on the bus must be a
minimum of 0.5 meters (1.5 feet) apart, and the overall length of
the bus must be less than 185 meters (606 feet).

Twisted Pair Ethernet:


www.virtualinspire.com
Twisted Pair Ethernet (10baseT), sometime also called "UTP" from
"Unshielded Twisted Pair", is based on using a cable similar to
phone-wiring. The cable is connected via RJ-45 connectors to the
network card installed in the PC.
CS610 Computer Networks
Mid Term Examination – Spring
Time Allowed: 90 Minutes

Please read the following instructions carefully


before attempting any of the questions:

1. Attempt all questions. All Questions carry Different Marks.


2. Do not ask any questions about the contents of this
examination from anyone.
a. If you think that there is something wrong with any of the
questions, attempt it to the best of your understanding.
b. If you believe that some essential piece of information is
missing, make an appropriate assumption and use it to solve the
problem.
3. Exam is Closed Book. No handouts or extra material is allowed in
exam hall other than rough sheet which will be provided by the
examiner.

**WARNING: Please note that Virtual University takes


serious note of unfair means. Anyone found involved
in cheating will get an `F` grade in this course.

Total Marks: 100 Total Questions: 10

Question No. 1Marks : 03

A popular LAN Technology that uses a shared Bus Topology.

o Star
o CSMA
o WAN
o Ethernet
o Multicast
Question No. 2 Marks : 03

An electronic device that connects LAN segments.

o Ethernet
o NIC
o 10Baset
o Bridge
o 10Base5

Question No. 3Marks :30

[15 + 15 Marks]
For the packet switched network below:

a. Determine the routing table.


b. Determine the collapsed routing table using default route.
.

Question No. 4Marks : 03

A form of addressing in which a set of computers is assigned one address.


.

o Broadcast
o Multicast
o Packet Switch
Question No. 2 Marks : 03
o Bandwidth
o CRC

Question No. 5Marks : 10

Draw and label all the components for a 10Base5 Network.


Question No. 6 Marks : 03

A network technology that uses Collision Avoidance.

o Bridge
o CRC
o Broadcast
o WAN
o Wireless LAN

Question No. 7Marks : 15

[15 Marks]
Assume a 10Mega Byte file must be transmitted across a network. Ignoring delays caused
by waiting for access and other overhead, how long will it take to send the file across?
a. Ethernet (10Mbps)
b. Fast Ethernet (100Mbps)
c. Token Ring (16Mbps)
d. Local Talk (230Kbps)
e. ATM (155Mbps)

Question No. 8Marks : 15

Draw an example of 'Cycle of Bridges' with the segments. (At least 6 segments)

Question No. 9Marks : 15

[15 Marks]
As discussed in the lecture, each ATM Switch rewrites or switched the Label. Assuming the
sending computer 'S' uses a VPI/VCI value of 3 and the receiving computer 'R' uses a VPI/VCI
value of 6, use a table containing the old VPI/VCI, the Interface and the new VPI/VCI to
complete the tables for each of the switches below?
Question No.10Marks : 03

Formal name for Thick Ethernet.

o Star
o TDM
o Bandwidth
o Network Analyzer
o Broadcast
www.virtualinspire.com

CS610 Solved_midterm paper

.Question No: 1 ( Marks: 1 ) - Please choose one

In Point-to-Point topology there are two topologies.

► Tree and Ring

► Star and Ring

► Star and Tree

► None of the given

Question No: 2 ( Marks: 1 ) - Please choose one

------ Program sends a message to a remote computer and reports


whether the computer responds.

► Ping

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
► Traceroute

► ICMP

► Non of the given

Question No: 3 ( Marks: 1 ) - Please choose one

------ has no way to determine the cause of the problem.

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
► ICMP

► Non of the given

► Ping

► Trace route

Question No: 4 ( Marks: 1 ) - Please choose one

The term----------refers to the general concept of a small block of data

► Packet

► Frame

► Data

► None of the given

Question No: 5 ( Marks: 1 ) - Please choose one

---------- scheme, which is designed to help detect transmissions


errors, send one extra bit of information with each character

► Parity

► Checksums
For Registration on www.virtualinspire.com u can use
Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
► CRC

► None of given

Question No: 6 ( Marks: 1 ) - Please choose one

Local Talk is a LAN technology that employs -------------

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com

► Bus topology

► Ring topology

► None of the given

► Star topology

Question No: 7 ( Marks: 1 ) - Please choose one

Most LANs that employ ring topology use an access mechanism known
as-------

► CSMA/CD

► CSMA/CA

► TOKEN PASSING

► None of the given

Question No: 8 ( Marks: 1 ) - Please choose one

Ethernet uses a----bit static addressing scheme in which each device is


assigned a
For Registration on www.virtualinspire.com u can use
Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
unique address by the manufacturer.

► 64

► 48

► 32

►8

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 9 ( Marks: 1 ) - Please choose one

Formally named informally known as the thick wire Ethernet or


Thick net.

► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given

Question No: 10 ( Marks: 1 ) - Please choose one

Formally named informally known as the twisted pair


Ethernet or TP Ethernet.

► 10 Base 2

► 10 Base 5

► 10 Base T

► None of the given

Question No: 11 ( Marks: 1 ) - Please choose one

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com

The maximum size of an Ethernet segment is

► 250 meters

► 500 meters

► 700 meters

► None of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com

Question No: 12 ( Marks: 1 ) - Please choose one

A Bridge can

► Filter a frame

► Forward a frame

► Extend a LAN

► Do all the above

Question No: 13 ( Marks: 1 ) - Please choose one

computes shortest paths in a graph by using weights on edges as a


measure of distance.

► Greedy algorithm

► Distance vector algorithm

► Dijksta’s algorithm

► Non of the given

Question No: 14 ( Marks: 1 ) - Please choose one


For Registration on www.virtualinspire.com u can use
Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com

is used for compressed audio and video where the data rate
depends on the level of compression that can be achieved.

► Constant Bit Rate (CBR) service

► Variable Bit Rate (VBR) service

► Available Bit Rate (ABR) service

► None of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com

Question No: 15 ( Marks: 1 ) - Please choose one

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a .

► Connectionless service paradigm

► Connection-oriented service paradigm

► Both Connectionless and Connection-oriented service paradigm

► None of the given

Question No: 16 ( Marks: 1 ) - Please choose one

The product of delay and throughput measures the of data that can
be present on the network.

► Area

► Volume

► Length

► None of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com

Question No: 17 ( Marks: 1 ) - Please choose one

A network with throughput T and delay D has a total of bit in


transit at any time.

►T/D

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
► TxD

►T+D

► None of the given

Question No: 18 ( Marks: 1 ) - Please choose one

One repeater , two repeaters the maximum cable length limitation.

► doubles, triple

► square roots, cude roots

► and, triple

► doubles, cancel

Question No: 19 ( Marks: 1 ) - Please choose one

A network uses a- - -if all computers attach to a central point

► Star Topology

► Ring Topology

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
► Bus Topology

► None of the given

Question No: 20 ( Marks: 1 ) - Please choose one

Computers attached to an ethernet use in which a computer waits for the


ether to be
idle before transmitting a frame.

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com

► CSMA/CD

► CSMA/CA

► TOKEN PASSING

► None of the given

CS610- Computer Network


Solved MCQS April 25,2012
From Midterm Papers
MC100401285 [email protected] [email protected] PSMD01

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com

CS610- Computer Network


MIDTERM EXAMINATION
Spring 2010
Question No: 1 ( M a r k s: 1 )
No error detection scheme is perfect because transmission errors can affect the additional information as well as
the data.

► True (Computer Networks and Internets, page82)


► False

Question No: 2 ( M a r k s: 1 )
------ Program sends a message to a remote computer and reports whether the computer responds.

► Ping (Computer Networks and Internets, page9)


► Traceroute
► ICMP
► Non of the given

Question No: 3 ( M a r k s: 1 )
---------- was especially concerned about the lack of high powered computers.

► ARPA (Computer Networks and Internets, page5)


► IEEE
► EIA
► Non of the given

Question No: 4 ( M a r k s: 1 )
The term---------is used to denote the definition of a packet used with a specific type of network.
► Packet
► Frame (Computer Networks and Internets, page 73)
► Data
► None of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 5 ( M a r k s: 1 )
Computer networks are often called----because they use packet technology.

► Ethernet
► Switch networks

► Packet networks (Computer Networks and


Internets, page 73)
► None of the given

Question No: 6 ( M a r k s: 1 )
-------------- have advantages arisen from the size and ease of computation.

► CRC

► Parity (Page 19)


► Checksums
► None of given

Question No: 7 ( M a r k s: 1 )
Most LANs that employ ring topology use an access mechanism known as-------

► CSMA/CD
► CSMA/CA

► TOKEN PASSING (Computer Networks and


Internets, page95)
► None of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
Question No: 8 (www.virtualinspire.com
M a r k s: 1 )
IEEE LLC/SNAP header is- , which is used to specify the type of data.

► 8 octets (Computer Networks and Internets,


page112)
► 8 bytes
► 8 bits
► None of the given

Question No: 9 ( M a r k s: 1 )
Formally named informally known as the twisted pair Ethernet or TP Ethernet.

► 10 Base 2
► 10 Base 5

► 10 Base T (Page 43)


► None of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 10 ( M a r k s: 1 )
An interface for twisted pair Ethernet must have an connector , and must
generate signals according to the specification.

► RJ-45, 10 Base T(Computer Networks and


Internets, page 126)
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T

Question No: 11 ( M a r k s: 1 )
A bridges function in the layers(s).

► Physical (MAC) Click here for Detail


► Data link
► Network
► Physical (MAC) and Data link

Question No: 12 ( M a r k s: 1 )
A Bridge can

► Filter a frame
► Forward a frame
► Extend a LAN

► Do all the above Click here for Detail


For Registration on www.virtualinspire.com u can use
Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 13 ( M a r k s: 1 )
A Bridge forwards or filters a frame by comparing the information in its address table to
the frame’s

► Layer 2 source address


► Source node’s physical address

► Layer 2 destination address Click here for


Detail
► Layer 3 destination address

Question No: 14 ( M a r k s: 1 )
computes shortest paths in a graph by using weights on edges as a measure of
distance.
► Greedy algorithm
► Distance vector algorithm

► Dijksta’s algorithm (Computer Networks and


Internets, page112)
► Non of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 15 ( M a r k s: 1 )
is used for audio and video, since these have predefined maximum data rates

► Constant Bit Rate (CBR) service (Page 71)


► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given

Question No: 16 ( M a r k s: 1 )
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers .

► Connectionless service paradigm (Computer


Networks and Internets, page112)
► Connection oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given

Question No: 17 ( M a r k s: 1 )
A network with throughput T and delay D has a total of bit in transit at any time.

►T/D

► T x D (Computer Networks and Internets,


page203)
►T+D
► None ofFor Registration
the given on www.virtualinspire.com u can use
Firefox or chrome or latest Internet Explorer.......
Question No: 18www.virtualinspire.com
( M a r k s: 1 )
ATM is designed to work on .

► Twisted Pair
► Coaxial
► Radio Frequency

► Fiber (Computer Networks and Internets, page


72)

Question No: 19 ( M a r k s: 1 )
Computers attached to an Ethernet use in which a computer waits for the ether to be
idle before
transmitting a frame.

► CSMA/CD (Computer Networks and Internets,


page 93)
► CSMA/CA
► TOKEN PASSING
► None of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com

Question No: 20 ( M a r k s: 1 )
FDDI can transmits data at a rate of ----------

► 100 million bits per second (Page 314)


► 10 million bits per second
► 1000 million bits per second
► None of the given

CS610- Computer Network


MIDTERM EXAMINATION
Spring 2010

Question No: 1 ( M a r k s: 1 )
In Point-to-Point topology there are two topologies.

► Star and Tree


► Tree and Ring
► Star and Ring

► Star and Tree (Page 5)


► None of the given

Question No: 2 ( M a r k s: 1 )
------ Program sends a message to a remote computer and reports whether the computer
responds.

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......

www.virtualinspire.com
Ping (Computer Networks and Internets, page9)
► Traceroute
► ICMP
► Non of the given

Question No: 3 ( M a r k s: 1 )
------ has no way to determine the cause of the problem.

► ICMP

► Ping (Computer Networks and Internets, page


11)
► Trace route
► Non of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 4 ( M a r k s: 1 )
The term----------refers to the general concept of a small block of data

► Packet (Page 16)


► Frame
► Data
► None of the given

Question No: 5 ( M a r k s: 1 )
---------- scheme, which is designed to help detect transmissions errors, send one
extra bit of information with each character

► Parity (Computer Networks and Internets, page


77)
► Checksums
► CRC
► None of given

Question No: 6 ( M a r k s: 1 )
Local Talk is a LAN technology that employs -------------

► Bus topology (Page 30)


► Ring topology
► Star topology
► None of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
Question No: 7 (www.virtualinspire.com
M a r k s: 1 )
Most LANs that employ ring topology use an access mechanism known as-------

► CSMA/CD
► CSMA/CA

► TOKEN PASSING (Computer


Networks and Internets, page95) rep
► None of the given

Question No: 8 ( M a r k s: 1 )
Ethernet uses a----bit static addressing scheme in which each device is assigned a
unique address by the
manufacturer.

► 64

► 48 (Computer Networks and Internets, page 109)


► 32
►8

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com

Question No: 9 ( M a r k s: 1 )
Formally named informally known as the thick wire Ethernet or Thick net.

► 10 Base 2

► 10 Base 5 Computer Networks and Internets, page


120)
► 10 Base T
► None of the given

Question No: 10 ( M a r k s: 1 )
Formally named informally known as the twisted pair Ethernet or TP Ethernet.

► 10 Base 2
► 10 Base 5

► 10 Base T (Page 43) rep


► None of the given

Question No: 11 ( M a r k s: 1 )
The maximum size of an Ethernet segment is

► 250 meters

► 500 meters (Page 27)


► 700 meters
► None of the given

Question No: 12 ( M a r k s: 1 )
For Registration on www.virtualinspire.com u can use
A Bridge can
Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
► Filter a frame
► Forward a frame
► Extend a LAN

► Do all the above repClick here For Detail

Question No: 13 ( M a r k s: 1 )
computes shortest paths in a graph by using weights on edges as a measure of
distance.

► Greedy algorithm
► Distance vector algorithm

► Dijksta’s algorithm (Computer


Networks and Internets, page112) rep
► Non of the given

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 14 ( M a r k s: 1 )
is used for compressed audio and video where the data rate depends on the level
of compression that can be achieved.

► Constant Bit Rate (CBR) service

► Variable Bit Rate (VBR) service (Page 71)


► Available Bit Rate (ABR) service
► None of the given

Question No: 15 ( M a r k s: 1 )
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a .

► Connectionless service paradigm (Computer


Networks and Internets, page112)
► Connection-oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given

Question No: 16 ( M a r k s: 1 )
The product of delay and throughput measures the of data that can be present on the
network.

► Area

► Volume (Page 80)


► Length
► None of the given

For Registration on www.virtualinspire.com u can use


Question No: 17 ( M a r k s: 1 )
Firefox or chrome or latest Internet Explorer.......
A network with throughputwww.virtualinspire.com
T and delay D has a total of bit in transit at any time.

►T/D

► T x D (Computer Networks and Internets,


page203) rep
►T+D
► None of the given

Question No: 18 ( M a r k s: 1 )
One repeater , two repeaters the maximum cable length limitation.

► doubles, triple (Page 49)


► square roots, cude roots
► and, triple
► doubles, cancel

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 19 ( M a r k s: 1 )
A network uses a- - -if all computers attach to a central point

► Star Topology (Page 25)


► Ring Topology
► Bus Topology
► None of the given

Question No: 20 ( M a r k s: 1 )
Computers attached to an Ethernet use in which a computer waits for the other to be
idle before
transmitting a frame.

► CSMA/CD (Computer
Networks and Internets, page 93) rep
► CSMA/CA
► TOKEN PASSING
► None of the given

CS610- Computer Network


MIDTERM EXAMINATION
Fall 2008

Question No: 1 ( Marks: 1 ) - Please choose one


A typical port on an ATM switch operates at or higher.
► OC-2 speed (155Mbps)
► OC-3 speed (100Mbps)

► OC-3 speed (155Mbps) (Page 72)


For
► OC-3 Registration
speed (155Gbps) on www.virtualinspire.com u can use
Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 2 ( Marks: 1 ) - Please choose one
The product of delay and throughput measures the of data that can be present on the
network.

► Area

► Volume (Page 80) rep


► Length
► None of the given

Question No: 3 ( Marks: 1 ) - Please choose one


is used for compressed audio and video where the data rate depends on the level
of compression that can be achieved.
►Constant Bit Rate (CBR) service
►Variable Bit Rate (VBR) service (Page 71) rep
►Available Bit Rate (ABR) service
►None of the given
9

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 4 ( Marks: 1 ) - Please choose one
Which of the following is a connecting device?
►Bridge
►Repeater
►Hub

►All the given Click here for Detail

Question No: 5 ( Marks: 1 ) - Please choose one


A bridges function in the layers(s).

► Physical (MAC) repClick here for


Detail
►Data link
►Network
►Physical (MAC) and Data link

Question No: 6 ( Marks: 1 ) - Please choose one


IEEE LLC/SNAP header is- , which is used to specify the type of data.
   ►8 octets (Computer Networks and Internets,
page112) rep
►8 bytes
►8 bits
►None of the given

Question No: 7 ( Marks: 1 ) - Please choose one


The third field of the header consists of bit Ethernet frame type.
►48 For Registration on www.virtualinspire.com u can use
►32 Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
►16 (Computer Networks and Internets, page110)
►8

Question No: 8 ( Marks: 1 ) - Please choose one


An------------method, the network hardware designers specify how type information is
included in the frame
and the value use to identify various frame types.
►Explicit frame type (Page 35)
   ►Ideal frame type
   ►Implicit frame type
►None of the given

Question No: 9 ( Marks: 1 ) - Please choose one


Local Talk is a LAN technology that employs -------------

►Star topology
►Bus topology (Page 30) rep
►Ring topology
►None of the given

10

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 10 ( Marks: 1 ) - Please choose one
The Fast Ethernet hardware operates at a rate of --------
►10 Mbps
►100 Mbps (Page 27)
►1000 Mbps
►None of the given

Question No: 11 ( Marks: 1 ) - Please choose one


---------- scheme, which is designed to help detect transmissions errors, send one
extra bit of information with each character
►Parity (Computer Networks and Internets, page
77) rep
►Checksums
►CRC
►None of given

Question No: 12 ( Marks: 1 ) - Please choose one


Computer networks are often called----because they use packet technology.
►Ethernet
►Switch networks
►Packet networks (Computer Networks and
Internets, page 73) rep
►None of the given

Question No: 13 ( Marks: 1 ) - Please choose one


For Registration on www.virtualinspire.com u can use
------ Program sends a message to a remote computer and reports whether the computer
Firefox or chrome or latest Internet Explorer.......
responds. www.virtualinspire.com
►Ping (Computer Networks and Internets, page 9)
rep
►Traceroute
   ►ICMP
►Non of the given

Question No: 14 ( Marks: 1 ) - Please choose one


In , network occupies larger areas like cities & countries.
   ►LAN
►WAN (Page 4)

►MAN
►None of the given

Question No: 15 ( Marks: 1 ) - Please choose one


In , network occupies the smaller area like a room a floor or a building

►LAN (Page 4)
►WAN
►MAN
►None of the given

11

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 16 ( Marks: 1 ) - Please choose one
In Point-to-Point topology there are two topologies.
►Tree and Ring
►Star and Ring
►Star and Tree (Page 5)
►None of the given

CS610- Computer Network


MIDTERM EXAMINATION
Fall 2008

Question No: 1 ( Marks: 1 ) - Please choose one


has a jitter zero

► None of the given


► Virtual Private Network
► Isochronous Network

► Asynchronous Network (Page 66)

Question No: 2 ( Marks: 1 ) - Please choose one


Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers .

►Connectionless service paradigm(Computer
Networks and Internets, page112)
For Registration on www.virtualinspire.com u can use
►Connection oriented service paradigm
Firefox or chrome or latest Internet Explorer.......
►Both Connectionless andwww.virtualinspire.com
Connection-oriented service paradigm
►None of the given

Question No: 3 ( Marks: 1 ) - Please choose one


ATM assigns each VC a identifier that is divided two parts to produce a
hierarchy.

►21-bit
►22-bit
►23-bit
►24-bit (Page 67)

12

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 4 ( Marks: 1 ) - Please choose one
Most WAN systems include a mechanism that can be used to eliminate the common
case of duplication routing is called

►Hierarchal address
►Default route (Computer Networks and Internets,
page172)
►Shortest path
►None of the given

Question No: 5 ( Marks: 1 ) - Please choose one


The next hop to which a packet is sent depends only on

►Packet’s destination (Computer Networks and
Internets, page169)
►Packet’s original source
►Path the packet has taken
►Non of the given

Question No: 6 ( Marks: 1 ) - Please choose one


An interface for twisted pair Ethernet must have an connector , and must
generate signals according to the specification.

►RJ-45, 10 Base T (Computer Networks and
Internets, page 126) rep
►RJ-45, 10 Base 5
►BNC, 10 For
BaseRegistration
2 on www.virtualinspire.com u can use
►BNC, 10 Base T
Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 7 ( Marks: 1 ) - Please choose one
When an application --------data, it makes a copy of the data available to all other
computers on the
network.

►Broadcasting Click here for Detail
►Multicasting
►Unicasting
►None of the given

Question No: 8 ( Marks: 1 ) - Please choose one


A provide a mechanism that a customer can use to set a physical address.

►Static addressing scheme
►Configurable addressing scheme (Page 34)
►Dynamic addressing scheme
►None of the given

13

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
Question No: 9 ( Marks: 1 ) - Please choose one
FDDI can transmits data at a rate of -----

►100 million bits per second (Page 314) rep
►100 million bits per second
►100 million bits per second
►None of the given

Question No: 10 ( Marks: 1 ) - Please choose one


Computers attached to an ether use in which a computer waits for the ether to be
idle before transmitting a
frame.

►CSMA/CD (Computer Networks and Internets,
page 93) rep
►CSMA/CA
►TOKEN PASSING
►None of the given

Question No: 11 ( Marks: 1 ) - Please choose one


 have advantages arisen from the size and ease of computation.

►CRC
►Parity (Page 19) rep
►Checksums
►None ofFor
givenRegistration on www.virtualinspire.com u can use
Firefox or chrome or latest Internet Explorer.......
Question No: 12www.virtualinspire.com
( Marks: 1 ) - Please choose one
The term----------is used to denote the definition of a packet used with a specific type of
network.

►Packet
►Frame (Computer Networks and Internets, page
73)
►Data
►None of the given

Question No: 13 ( Marks: 1 ) - Please choose one


 has no way to determine the cause of the problem.

► Ping (Computer Networks and Internets, page
11) rep
►Trace route
►ICMP
►Non of the given

14

For Registration on www.virtualinspire.com u can use


Firefox or chrome or latest Internet Explorer.......
[Type the document title] [Year]
Midterm
CS610 Computer Network

Question No: 14 ( Marks: 1 ) - Please choose


one
 Program sends a message to a remote computer and reports whether the
computer responds.

►Ping (Computer
Networks and Internets, page9)rep
►Traceroute
►ICMP
►Non of the given

Question No: 15 ( Marks: 1 ) - Please choose


one
In----------, network occupies the smaller area like a room a floor or a
building

►LAN (Page 4) rep
►WAN
►MAN
►None of the given

Question No: 16 ( Marks: 1 ) - Please choose


one
No error detection scheme is perfect because transmission errors can
affect the additional information as well as the data.

[Type text] Page 1


[Type the document title] [Year]
Midterm
CS610 Computer Network
► True (Computer Networks and Internets,
page82)
► False

1. ATM assigns each VC a identifier that is divided two parts to produce a


hierarchy.
21-
b
it
2
2
-
b
it
2
3
-
b
it
24-bit (pg 67)
2. In---------, network occupies larger areas like cities & countries.
LAN
WAN
(pg
4)
M
A
N
CAN
3. is the scheme, which is designed to help in detecting transmission errors, sends
one extra bit of information with each character.
Parity checking
[Type text] Page 2
[Type the document title] [Year]
Midterm
CS610 Computer Network
(Pg. 18)
Checksums
C
R
C

L
R
C
4. The Fast Ethernet hardware operates at a rate of --------
10 Mbps
100 Mbps (pg 27)
1000 Mbps
1 Gbps
5. When an application----------------data, it makes a copy of the data available to all other
computers on the
network.
Broadcasting
Multic
asti
ng
Uni
cast
ing
An
yca
stin
g
6. Formally named informally known as the thin wire Ethernet or Thin net. 10
Base 2
10 Base 5
10 Base T
100 Base T
7. NICs contain analogue circuitry and that allows the NIC to operate independent of
the CPU.

[Type text] Page 3


[Type the document title] [Year]
Midterm
CS610 Computer Network
DMA (Direct
Memory Access)
Multiplexer
Transcei
ver
Micro
proces
sor
8. By size there are....................classifications of networks.
2 (pg 4)
3
4
5
9. In which type of topology computers are connected to a central device?
Ring
Me
s
h
B
u
s
Star (pg 5)
10 was especially most concerned about the lack of highly powered
computers.
ARPA
IEE
E
EIA
Goverment
11. IEEE LLC/SNAP header is which is used to specify the type of data.
8 octets (Pg. 112)
10 octets
12 bytes
16 bits
12. An interface for Thin Ethernet must have connector and must generate
signals according to the specification.
RJ-45, 10 Base T (Pg. 126)
RJ-45, 10 Base 5
BNC, 10
Base
[Type text] Page 4
[Type the document title] [Year]
Midterm
CS610 Computer Network
2
BNC,
10
Base
T
13. technology can support both LAN and WAN connections.

Frame relay a

Eth

S
ATM (Pg. 66)

14. is used for ordinary data.

Available Bit Rate (ABR)


service Uniform Bit Rate
(UBR) service Constant
Bit Rate (CBR) service
(pg 71)
[Type text] Page 5
[Type the document title] [Year]
Midterm
CS610 Computer Network
Variable Bit Rate (VBR) service
15. A network which is based on packets uses a computer which may have
, memory and for switching.
Administration Rights,
Algorithm Source
address, Destination
address Interface,
Program
Input, Output
16. No error detection scheme is perfect because transmission errors can affect .

Data
Additional
Information (Pg.
82) Additional
information & data
Transmission
medium
17. In direct point to point communication adding the Nth computer requires new
connections.
N(
N

1
)

N
2
N-1
(N2 –N)/2
18. The next hop to which a packet is sent depends only on
. Packet’s destination
Packet’s original
source Path
the packet has

[Type text] Page 6


[Type the document title] [Year]
Midterm
CS610 Computer Network
taken Routed
Protocol (pg
93)

19. in which delay among packets can vary.


Virtual Private Network
Isochronous Networks
Isochronous
Networks
Asynchronous
Networks (Pg. 65)
20.A typical port on an ATM switch operates at or higher.2
OC-2 speed (155Mbps)
OC-3 speed (100Mbps)
OC-3 speed
(155Mbps) (pg
72) OC-3 speed
(155Gbps)
CS610 Computer Network

1. ATM assigns each VC a identifier that is divided two parts to produce a


hierarchy.
21-
b
it
2
2
-
b
it
2
3
-
b
it
24-bit (pg 67)
2. Hardware that calculates a CRC uses two simple components.
AND unit with XOR unit
[Type text] Page 7
[Type the document title] [Year]
Midterm
CS610 Computer Network
Shift register with XOR unit (pg 20)

[Type text] Page 8


[Type the document title] [Year]
Midterm
CS610 Computer Network
Shift register with
AND unit Shift
register with shift
XOR unit
03 have advantages arisen from the size and ease of computation.
CRC
Parity
(Pg.
19)
Chec
ksu
ms
VRC
04. The Gigabit Ethernet hardware operates at a rate of --------
10 Mbps
100 Mbps
1000 Mbps
10 Gbps
5. When an application----------------data, it makes a copy of the data available to all other
computers on the
network.
Broadcasting
Multic
asti
ng
Uni
cast
ing
An
yca
stin
g
6. A------------provides mechanism that automatically assigns a physical address to a station
when the station first
boots. Static
addressing scheme
Configurable
[Type text] Page 9
[Type the document title] [Year]
Midterm
CS610 Computer Network
addressing scheme
Dynamic addressing
scheme (Pg. 34)
Dynamic Host
Configuration
7. NICs contain analogue circuitry and that allows the NIC to operate independent of
the CPU.
DMA(Direct
Memory Access)
Multiplexer
Transceiver
Microproces
sor (pg 40)
8. Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a .
Connectionless service
paradigm Connection-
oriented service
paradigm
Both Connectionless and Connection-oriented
service paradigm Connection-oriented
service paradigm without acknowledgment
09 was especially most concerned about the lack of highly powered
computers.
AR
P
A

I
E
E
E
E
I
A
Goverment
10. "Frame type" field of the header consists of bits.

8
[Type text] Page 10
[Type the document title] [Year]
Midterm
CS610 Computer Network
10
16

[Type text] Page 11


[Type the document title] [Year]
Midterm
CS610 Computer Network
32 (Pg. 105)
11. An interface for Thin Ethernet must have connector and must generate
signals according to the specification.
RJ-45, 10 Base T (Pg. 126)
RJ-45, 10 Base 5
BNC, 10
Base
2
BNC,
10
Base
T
12. A bridge uses the to determine which computers connect to which segment
and uses the to determine whether to forward a copy of frame.
Destination address, Source
address Destination
address, MAC Address
Destination address,
Destination address
Source address,
Destination address
13. senses a signal on a cable and then transmits an amplified copy of the
signal.
Brid
g
e
H
u
b
Trans
cei
ver
Re
pea
ter
14. is used for ordinary data.
Available Bit Rate (ABR) service Uniform
Bit Rate (UBR) service Constant Bit Rate
[Type text] Page 12
[Type the document title] [Year]
Midterm
CS610 Computer Network
(CBR) service (Pg. 71) Variable Bit Rate
(VBR) service
15. is used for delay sensitive applications requiring high data rate.
Constant Bit Rate (CBR)
service (Pg. 71) Variable
Bit Rate (VBR) service
Available Bit Rate (ABR)
service Uniform Bit Rate
(UBR) service
16. The term refers to the general concept of a small block of data
Packet (Pg. 16)
Byte
in a network.
Cell
Inf
or
mat
ion
17. A network with throughput T and delay D would have a total no of _ bits in transit
at any time.
T+D
Tx
D/Unit
Time
T/D
T x D (Pg. 203)
18. A network that permits many sources to take turns accessing a shared communication
resource is providing a form of .
Phase Division
Multiplexing Time
Division
Multiplexing
Frequency Division
Multiplexing Wave
Division
Multiplexing

[Type text] Page 13


[Type the document title] [Year]
Midterm
CS610 Computer Network
19. No error detection scheme is perfect because transmission errors can affect
. Data
Additional
Information (Pg.
82) Additional
information & data
Transmission
medium
20. Formally named _ informally known as the twisted pair Ethernet or TP
Ethernet.
10 Base 2
10 Base 5
10 Base T (pg 43)
100 Base T
CS610 Computer
Network

1. In--, network occupies larger areas like cities & countries.


LAN
WAN
(pg
4)
M
A
N
CAN
2 have advantages arisen from the size and ease of computation.
CRC
Parity
(Pg.
19)
Chec
ksum
s
VRC
3. A network that uses a---------usually consist of a single long cable to which computers
attach.
Bus Topology
[Type text] Page 14
[Type the document title] [Year]
Midterm
CS610 Computer Network
(pg 26)
Tree
Topology
Star
Topol
ogy
Ring
Topol
ogy
4. A------------provides mechanism that automatically assignes a physical address to a
station when the station
first boots. Static
addressing scheme
Configurable
addressing scheme
Dynamic addressing
scheme (pg 34)
Dynamic Host
Configuration
5. In which type of topology computers are connected to a central device?
Ring
Me
s
h
B
u
s
Star (Pg. 5)
6. If the sending computer crashes before transmitting a complete frame, the will
not arrive and the receiver will know that the frame is .
soh,
compl
ete
soh,
incom
plete
eot, incomplete (Pg. 16)
[Type text] Page 15
[Type the document title] [Year]
Midterm
CS610 Computer Network
eot, complete
7 was especially most concerned about the lack of highly powered
computers.
AR
P
A

I
E
E
E
E
I
A
Goverment
8. Generally a Bridge is used to perform .

Extend a LAN, Filter and Forward a

packet (Pg. 50) Routing

Filter and Forward

a frame Filter

and Forward a

packet
9. Header of cell takes of network capacity.
5% (pg 65)
10%
12%
15%
10. senses a signal on a cable and then transmits an amplified copy of the
signal.
Brid
g
e
[Type text] Page 16
[Type the document title] [Year]
Midterm
CS610 Computer Network
H
u
b
Trans
cei
ver
Re
pea
ter
11. is used for ordinary data.
Available Bit Rate (ABR) service Uniform
Bit Rate (UBR) service Constant Bit Rate
(CBR) service (Pg. 71) Variable Bit Rate
(VBR) service
12. A Bridge forwards or filters a frame by comparing the information in its address table to
the frame’s .
Layer 2 source
address Layer 3
source address
Layer 2
destination
address Layer 3
destination
address
13. A network with throughput T and delay D would have a total no of _ bits in transit
at any time.
T+D
Tx
D/Unit
Time
T/D
T x D (Pg. 203)
14. No error detection scheme is perfect because transmission errors can affect .
Data

[Type text] Page 17


[Type the document title] [Year]
Midterm
CS610 Computer Network
Additional
Information (Pg.
82) Additional
information & data
Transmission
medium
15. Most LANs that employ ring topology use an access mechanism known as
. CSMA/CD
CSMA/CA
Token Passing
(Pg. 95)
Aloha
16. Local Talk is a LAN technology that employs .

Bus topology
(Pg. 30)
Ring
topology
Mesh
topol
ogy
Star
topol
ogy
17. Formally named _ informally known as the twisted pair Ethernet or TP
Ethernet.
10 Base 2
10 Base 5
10 Base T
100 Base T
18. Most WAN systems include a mechanism that can be used to eliminate the common
case of duplication routing is called .
Dynamic route
Hierarchal
address
Default
route (Pg.
172)
[Type text] Page 18
[Type the document title] [Year]
Midterm
CS610 Computer Network
Shortest
path
19. in which delay among packets can vary.
Virtual Private Network
Isochronous Networks
Asynchronous
Networks (Pg.65 )
Synchronous
Networks
20. The product of delay and throughput measures the of data that can be presented
on the network.
Area
Volu
me(Pg
. 80)
Lengt
h
Size

A typical port on an ATM switch operates at __________ or higher.


 
       ► OC-2 speed (155Mbps) 
       ► OC-3 speed (100Mbps)
       ► OC-3 speed (155Mbps)
       ► OC-3 speed (155Gbps)
A typical port on an ATM switch operates at OC-3 speed (155 Mbps) or higher, with the largest
and most expensive switches handling much higher capacities
 
The product of delay and throughput measures the _____ of data that can be present on the
network.
 
       ► Area
       ► Volume
       ► Length
       ► None of the given

[Type text] Page 19


[Type the document title] [Year]
Midterm
CS610 Computer Network
To summarize: The product of delay and throughput measures the volume of data that can be
present on the network. A network with throughput T and delay D can have a total ofT×D bits in
transit at any time
__________is used for compressed audio and video where the data rate depends on the
level of compression that can be achieved. 
 

 
Constant Bit Rate (CBR) service

Variable Bit Rate (VBR) service


Available Bit Rate (ABR) service

None of the given


 
VARIABLE BIT RATE (VBR):
It is used for compressed audio and video where the data rate depends on the level
of compression that can be achieved.
 
Which of the following is a connecting device?
 

Bridge

Repeater

Hub

All the given


 
A bridges function in the _________ layers(s).
 
Physical (MAC) 

Data link 

Network
 

►Physical (MAC) and Data link

http://highered.mcgraw-hill.com/sites/0072967722/student_view0/chapter_3_quiz.html

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

[Type text] Page 20


[Type the document title] [Year]
Midterm
CS610 Computer Network
8 octets
 

8 bytes

8 bits

None of the given


X Packet Type (PT), the five values of which were listed previously, in Table 7-2. The IEEE 802. lX
Packet Body Length (PBL) follows the Packet Type. Because the LLC/SNAP header is eight octets
long, and the IEEE 802
The third field of the header consists of ------ bit Ethernet frame type.
 
48 

32

16

8
(zh,vuzs,nov10)
 
An ------------method, the network hardware designers specify how type information is
included in the frame and the value use to identify various frame types.

Explicit frame type


Ideal frame type
Implicit frame type

None of the given


EXPLICIT FRAME TYPE:
In this type the identifying value is included with frame describes types of included data.
 
 
Local Talk is a LAN technology that employs _____________
 
Star topology

Bus topology

Ring topology

[Type text] Page 21


[Type the document title] [Year]
Midterm
CS610 Computer Network
None of the given   
Almost altogether network technologies use different wiring schemes. e.g., local talk uses hubs
(physical star) to simulate a bus topology.

The Fast Ethernet hardware operates at a rate of _______________


10 Mbps
100 Mbps
1000 Mbps

None of the given   


 The Ethernet speed was originally 3Mbps, and the current standard is 10Mbps
the fast Ethernet operates at 100Mbps. There are also gigabits Ethernet available now  
 
___________scheme, which is designed to help detect transmissions errors, send one extra
bit of information with each character

 Parity

Checksums

CRC

None of given    www.vuzs.info


 
Computer networks are often called -------------- because they use packet technology.

Ethernet

Switch networks

Packet networks

None of the given


Computer networks are often called packet networks or packet switching networks because
they use packet technology

 
_____________Program sends a message to a remote computer and reports whether the
computer responds.
 

Ping

Trace route

[Type text] Page 22


[Type the document title] [Year]
Midterm
CS610 Computer Network
ICMP

Non of the given   


 The ping program sends a message to a remote computer and reports whether the computer
responds; the traceroute program identifies intermediate computers along a path to a remote
destination. Ping and traceroute software is included in 
In ______________ network occupies larger areas like cities & countries.

LAN

WAN

MAN

None of the given


 
 
In -------------, network occupies the smaller area like a room a floor or a building. 

LAN
WAN

MAN

None of the given


 
In Point-to-Point topology there are two topologies.

Tree and Ring


Star and Ring

Star and Tree

None of the given


 
POINT-TO-POINT:
In Point-to-Point topology there are two topologies.
1) STAR topology
2) TREE topology

[Type text] Page 23


[Type the document title] [Year]
Midterm
CS610 Computer Network

ATM was designed for __________________ and use a ____________

Both LAN and WAN , Connection-oriented service paradigm

A bridge functions in ____________ layer.

Datalink layer
Physical layer

Generally a Bridge is used to perform _____________

Filter and forward a frame

A network which is based on packets uses a computer which may have ________, memory and
______________.

Interface, Program

If the sending computer crashes before transmitting a complete frame, the _____________ will
not arrive and the receiver will know that the frame is __________________.

Eot, incomplete

Frame type field of the header consists of _______________ bits


16 bits
.
Virtual Circuit connection identifier occupies _________ bits.
16 bits

A network that permits many ources to take turns accessing a shared communication resource
is providing a form of _____________. TDM

LAN that uses ATM technology has a ______________


Star topology (page 31) vu handouts

The working of connection-oriented service for networking is similar to the


________________________
Telephone
________________ identifies intermediate computers along a path to remote destination.

[Type text] Page 24


[Type the document title] [Year]
Midterm
CS610 Computer Network
Pring
Traceroute
ICMP
OSPF

If a bridge is unable to find ___________in its table then it just forwards frames to the other
segment.
Destination address

[Type text] Page 25

You might also like