CS610 Exam
CS610 Exam
Question No: 1 ( M a r k s: 1 )
No error detection scheme is perfect because transmission errors can affect the additional
information as well as the data.
Question No: 2 ( M a r k s: 1 )
—— Program sends a message to a remote computer and reports whether the computer
responds.
► ICMP
Question No: 3 ( M a r k s: 1 )
———- was especially concerned about the lack of high powered computers.
Question No: 4 ( M a r k s: 1 )
The term ——– is used to denote the definition of a packet used with a specific type of
network.
► Packet
► Data
► None of the given
Question No: 5 ( M a r k s: 1 )
Computer networks are often called ————– because they use packet technology.
► Ethernet
► Switch networks
► Packet networks (Computer Networks and Internets, page 73) (A network packet is a formatted unit
of data carried by a packet-switched network.)
► None of the given
Question No: 6 ( M a r k s: 1 )
————– have advantages arisen from the size and ease of computation.
► CSMA/CD
► CSMA/CA
Question No: 8 ( M a r k s: 1 )
IEEE (logical link control) LLC/SNAP (Sub Network Attachment Point) header is ——–, which
is used to specify the type of data.
► 8 bits
► None of the given
Question No: 9 ( M a r k s: 1 )
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
Question No: 10 ( M a r k s: 1 )
An interface for (TP) twisted pair Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
► BNC, 10 Base T
Question No: 11 ( M a r k s: 1 )
A bridges function in the _________ layers(s).
► Network
Question No: 12 ( M a r k s: 1 )
A Bridge can ________. (Definition: A bridge device filters data traffic at a network boundary.
Bridges reduce the amount of traffic on a local area network (LAN) by dividing it into two
segments.)
► Filter a frame
► Forward a frame
► Extend a LAN
Question No: 14 ( M a r k s: 1 )
________ computes shortest paths in a graph by using weights on edges as a measure of
distance.
► Greedy algorithm
Question No: 15 ( M a r k s: 1 )
___________ is used for audio and video, since these have predefined maximum data rates
Question No: 16 ( M a r k s: 1 )
Unlike Frame Relay and ATM(Asynchronous Transferred Mode), SMDS (Switched multi-
megabit Data service) offers_______ .
Question No: 17 ( M a r k s: 1 )
A network with throughput T and delay (Page # 79) D has a total of ________ bit in transit at any
time.
►T/D
Question No: 18 ( M a r k s: 1 )
ATM (Asynchronous Transferred Mode) is designed to work on___________.
► Twisted Pair
►Coaxial
► Radio Frequency
► CSMA/CA
► TOKEN PASSING
Question No: 20 ( M a r k s: 1 )
FDDI (Fiber distributed data interconnect) can transmits data at a rate of ———-
Question No: 21 ( M a r k s: 1 )
In Point-to-Point topology there are two topologies.
► Star and Tree
► Tree and Ring
Question No: 22 ( M a r k s: 1 )
—— Program sends a message to a remote computer and reports whether the computer
responds.
► ICMP
Question No: 23 ( M a r k s: 1 )
—— has no way to determine the cause of the problem.
Question No: 24 ( M a r k s: 1 )
The term—– ——- refers to the general concept of a small block of data.
► Data
Question No: 25 ( M a r k s: 1 )
———- scheme, which is designed to help detect transmissions errors, send one extra bit of
information with each character
Question No: 26 ( M a r k s: 1 )
Local Talk is a LAN technology that employs ————-
► Star topology
Question No: 27 ( M a r k s: 1 )
Most LANs that employ ring topology use an access mechanism known as——-
► CSMA/CD
► CSMA/CA
Question No: 28 ( M a r k s: 1 )
Ethernet uses a —— bit static addressing scheme in which each device is assigned a unique
address by the manufacturer.
► 64
►8
Question No: 29 ( M a r k s: 1 )
Formally named __________ informally known as the thick wire Ethernet or Thick net.
► 10 Base 2
► 10 Base 5 Computer Networks and Internets, page 120)
(10 BASE 5 (also known as thick ethernet or thicknet))
► 10 Base T
Question No: 30 ( M a r k s: 1 )
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
Question No: 31 ( M a r k s: 1 )
The maximum size of an Ethernet segment is___________
► 250 meters
Question No: 32 ( M a r k s: 1 )
A Bridge can ________
► Filter a frame
► Forward a frame
► Extend a LAN
► Greedy algorithm
Question No: 34 ( M a r k s: 1 )
__________is used for compressed audio and video where the data rate depends on the level
of compression that can be achieved.
Question No: 35 ( M a r k s: 1 )
Basic LAN technologies such as Ethernet, Token Ring, and FDDI (Fiber distributed data
interconnect) use a _____.
Question No: 36 ( M a r k s: 1 )
The product of delay and throughput measures the _____ of data that can be present on the
network.
► Area
DELAY:
It is an important quantitative property of networks. Delay is a measure how long
it takes for a bit of data to travel across the network from one compute to the other. It is measured in
seconds or fractions of seconds.
THROUGHPUT:
Throughput is a measure of the rate at which data can be sent through the
network. The throughput capability of the underlying hardware is called bandwidth. Because each frame
contains headers, the effective throughput is less than the hardware bandwidth. Networking professional
often use the term speed as a synonym for throughput.
Question No: 37 ( M a r k s: 1 )
A network with throughput T and delay D has a total of ________ bit in transit at any time.
►T/D
Question No: 38 ( M a r k s: 1 )
One repeater _______, two repeaters ________ the maximum cable length limitation.
► and, triple
► doubles, cancel
Question No: 39 ( M a r k s: 1 )
A network uses a —— if all computers attach to a central point
► Ring Topology
► Bus Topology
Question No: 40 ( M a r k s: 1 )
Computers attached to an Ethernet use —— in which a computer waits for the other to be idle
before transmitting a frame.
► CSMA/CA
► TOKEN PASSING
► Area
► Volume (Page 80) rep
► Length
►Bridge
►Repeater
►Hub
►All the given
►Network
►8 bits
►48
►32
►Star topology
►Ring topology
►10 Mbps
►CRC
►None of given
►Ethernet
►Switch networks
►ICMP
►LAN
►WAN (Page 4)
►MAN
►LAN (Page 4)
►WAN
►MAN
► Isochronous Network
►21-bit
►22-bit
►23-bit
►24-bit (Page 67)
Question No: 60 ( Marks: 1 )
Please choose one Most WAN (Wide area network) systems include a mechanism that can be
used to eliminate the common case of duplication routing is called___________
►Hierarchal address
►BNC, 10 Base 2
►BNC, 10 Base T
►Broadcasting
►Multicasting
►Unicasting
►CSMA/CA
►TOKEN PASSING
►Packet
►ICMP
►ICMP
►Star Topology
►Ring Topology
►64
►48 rep
►32
►8
►Data
►Additional Information
►Additional information & data (Computer Networks and Internets, page82)
►Transmission medium
►Tree topology
►Point-to-point topology (Page 5)
►Broadcast topolgy
►Ring topology
►10 Mbps
►100 Mbps
►1000 Mbps
►1000 Gbps
►Size
►Connectivity
►Medium
►Mobility (Page 6)
Question No: 79 ( Start time: 10:31:44 PM ) Total Marks: 1
A network uses _______ to arrange computers to be connected in a single closed loop. Select
correct option:
►Star Topology
►Dual Ring Topology
►Broadcasting rep
►Multicasting
►Unicasting
►Size
►Connectivity
►Medium
►Mobility rep
Question No: 83 ( Start time: 09:55:38 PM ) Total Marks: 1
——– is also called self healing network Select correct option:
►Star topology
►Ring topology
►Ethernet
►Divide the data into small block or chunks called ‘Packets’. (Page 14)
Question No: 86 ( Start time: 09:56:54 PM ) Total Marks: 1
For how much time would other computers be in wait while one computer was transferring
56MB file with packet size of 1000 bytes and transmission speed of 56Kbps Select correct
option:
►0.243 0.343
►0.343 0.343
►0.443 0.343
►10 Mbps
►100 Mbps
►1000 bps
►100 Mbps
►10 Mbps
►1000 Mbps
►Checksum
►Bus topology
►Star topology (Page 31)
►Ring topology
►Mesh Topology
option:
►CSMA/CD
►CSMA/CA
►CSMA
►Differential Manchester
►Broadcasting rep
►Multicasting
►Unicasting
►CSMA/CD
►Size (Page 4)
►Connectivity
►Medium
►Mobility
►11 Sec
►12 Sec
►13 Sec
►Star Topology
►Base-W
►Star
Question No: 103 ( Start time: 10:53:05 PM ) Total Marks: 1
ATM is also called—————- Select correct option:
►Packet switching
►Line controlling
►Noise controlling
►Asynchronous Bit Rate
►16 MHz
►150 MHz
►Fixed (Page 48)
►Unlimited
►Fixed and Unlimited in different conditions
►None of these
►Router
►Information
HomeGrand Quiz
BTemplates.com
Dear Students in this post we are providing you CS610 Solved Grand Quiz Spring 2021. We have
provided all Past CS610 Grand Quiz with 100% correct Solution. You can also visit our
website vuctn.com for the solution of CS610 Mid Term past paper and Final Term Past paper.
The satellite or radio topology in which all computers are connected to each other via satellite or
radio wave is a kind of
Broadcast network page 5
Point-to-Point network
In _________ technique, all members of the network can send data only on the specific time slot?
CDMA
FDMA
CSMA page 43
TDMA
If a sender with a 100 Megabit NIC and receiver with 10 Megabit NIC wants to communicate
with each other at which speed they can communicate?
110 Megabit
1000 Megabit
10 Megabit
100 Megabit page 40
Missing ______ in a frame format indicates receiving computer missed
beginning of the message.
eot
sot
eoh
soh page 16
The _______ of errors is easier than the ________ of errors.
correction; detection
correction; creation
detection; manipulation
detection; correction cs601 handouts
The _______ of errors is difficult than the ________ of errors.
detection; correction
correction; creation
detection; manipulation
correction; detection google
Source Independence phenomenon allows fast and efficient ____________.
Source Addressing
Routing
Packet Switching page 58
Store and forward
In distributed route computation process each packet switch computes its routing table locally and
sends messages to the __________.
Router
Graph
Neighbors page 63
WAN
The ___ layer of the OSI model takes the data from the physical layer and perform error checking.
Transport
Data link google
Application
Presentation
Star Topology
Ring Topology
Bus Topology page 26
Bus and Ring Topology
If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called
_______.
packet loss
collision page 28
delayed transmission
coordination
In __________ all computers are attached to a central hub
Ring topology
Star topology page 31
Hub topology
Bus topology
For adding a new computer in a point to point network ______new connection will be required
N
N-1 page 23
N-2
2N
1000 bps
100 Mbps page 27
10 Mbps
1000 Mbps
Which of the following the benefit to point to point communication?
Quick to configure.
Security implementation page 23
Cost
Less availability
High, High
High, low page 72
Low, low
Low, high
Thick Ethernet is known as ___________
10 Base 2
10 Base 5 google
10 Base T
10 Base 10
Both interior and exterior switches _______packet and they also need routing tables.
Create
Delay
Forward page 59
Start
______is the rate at which data can be sent through the network
Throughput page 79
Propagation delay
Access delay
Switching delay
TCP
UDP
ICMP page 11
IGMP
Many WANs use ______addressing of efficiency
Sequence
Forward
Hierarchical page 56
Sequential
LAN
WAN page 56
Bridge
None of the given option
Fixed network is a type of network which is classified with repect to the factor
Size
Connectivity
Medium
Mobility page 6
Parity bit can detect _________________error(s)
4
3
2 page 19 (even or odd)
1
When we will try to connect to the internet which of the following protocol will be used?
Telnet
TCP/IP page 84
ICMP
IPx
2 google
4
IEEE 803.16
IEEE 802.15
IEEE 802.3
IEEE 802.11 page 29
LAN interface hardware obeys ______ access rule.
CSMA/CD page 34
Round robin
First come first served
High priority
The most important task a bridge performs is _________.
Packet switching
Line controlling
Noise controlling
Frame filtering page 50
ATM uses small, fixed-sized packets called cells and each cell has _____ octets.
47
52
53 page 66
55
___________ can’t be guaranteed with variable length packets as easily as it can with fixed length cells.
Errors
Noise
Quality of Service
None of the given page 72
Which multiplexing technique transmits digital signals?
WDM
FDM
TDM page 15
GSM
Connections in Asynchronous transfer mode are called ________.
A _______ is a device that combines multiple signals and forwards into a single line.
Modem
Multiplexer page 41
Repeater
Layer 3 Switch
___________ is inflexible.
Routing
Searching
Processing
Static routing page 62
If a hub is used to connect many computers in a LAN, then only _______ computers can communicate at
a given time.
Three
Two page 54
Four
One
Friction
Segment
Checksum
Jitter page 66
________ is also called self healing network.
ATM
FDDI
Token Ring
INTERNETWORKING
ARPNET
ARPANET page 9
PACKET NETWORK
Fragmentation page 72
Management
Location
Allocation
Network
Destination page 51
IP
Source
We may use _______ to extend local area network.
Bridge, Router
Bridge, Hub, Router
Bridge, Hub, Repeater page 149
Bridge, Hub, Repeater, Router
All of the given options are the types of delay except __________.
Propagation
Access
Throughput page 79
Queuing
While computing shortest path in a graph, next hop information is inserted into _________.
DMA page 34
FDDI
Hard disk
Flash
The Gigabit Ethernet hardware operates at a rate of ___________.
10 Mbps
100 Mbps
1000 Mbps reference book page 263
1000 Gbps
In the early resource sharing era, which resources were shared among users?
Computation page 9
Floppy Drives
Hard Disk
Printers
If two buildings are located far from each other then bridge, and ________ can be used to connect two
LAN.
WAN
MAN
Fog
LAN google
A typical bridge has _______________.
1
2 page 17
0
5
Dijkstra’s algorithm can accommodate weights on _______ in graph.
Nodes page62
Edges
Path
Connections
Load
Boot page 62
Execute
One
___________ was the first automated tool required to see whether the given computer is online or not.
Probing program
PING program
status program
None of the above page 11
In which type of error detection, the arithmetic sum is calculated before and after the transmission of
data at both communication ends?
CRC
Party
Checksum page 19
Hash Function
Computer sends a connection request to the ________ to which it is attached while establishing a
switched virtual circuit
Bridge
Switch page 70
VPI
Virtual circuit
The bridges communicate with each other on the network and use ________ algorithm to decide which
bridge will not forward frames if a cycle occurs.
Djikstra
Shortest path first
Vector distance
Distributed Spanning Tree page 53
Ethernet uses a ______ bit static addressing scheme in which each device is assigned a unique address
by the manufacturer.
64
48
32
16
Nodes
Traversing edge page 63
Trending edge
Path
A ________ relies on the hardware manufacturer to assign a unique physical address to each network
interface.
In _______ topology, if the switch goes down all the computers will be disconnected.
Star
Ring
Bus
Mesh
Which type of network consists of wired computers in a university classroom?
MAN
PAN
WAN
LAN
81. If you as a network administrator want to know the traffic flow of your data while communicating
with a remote computer which of the following will be used to know about intermediate routers?
Ipconfig
Ping page 11
Traceroute
Arp
Physical address
Logical address
IP address
Port address
Thick Ethernet also requires _________ to avoid signal reflectance.
Transceivers
AUI cable
Drop cable
Terminators page 41
Which of the following network is using the TCP/IP model globally?
PAN
SAN
LAN
The Internet
VPNs connections are sometimes called ________.
Tunnels page 75
Open networking
Routing
Public network
To reduce _______ computers can be connected and distributed to a number of hubs, then the hubs can
be connected to a switch.
Costs page 54
Quality
Efficiency
Noise
If a __________ is used the communication between two computers will not affect the other pair of
computers and they can communicate at the same time
Hub
Switch page 54
Repeater
Amplifier
Network manager
Network administrator
Network monitor page 37
Network
90. No any error detection scheme is perfect because transmission errors can affect _________.
Data
o Additional Information
o Additional information & data google
o Transmission medium
The token ring network topology is a ring but wiring topology is a _________.
Star page 44
bus
tree
mesh
IP page 99
Port
Logical
МАС
AUI cable connects from NIC to ___________.
BNC Connector
o RJ-45 Connector
o Transceiver page 41
o Terminator
Local area
Link-state routing page 64
Static routing
Dynamic routing
Which layer of the OSI Model directly communicates and controls the transmission medium:
Transmission
Physical
Application
Network
In ________ technique data is treated as a sequence of integers and their arithmetic sum is computed and
the carry bits are added to the final sum.
CRC
Bit stuffing
Checksum page 19
2D Parity
A network with _______ jitter takes more time to deliver some packets than others.
Zero
High page 80
Low
Moderate
Star Topology
Mesh Topology
Ring Topology page 25
Bus Topology
Which of the following tasks is not done by the second layer of the OSI model?
Flow control
Framing
Error control
ATM is a single technology designed to meet the goals of both ________and __________.
The identifier that is used for data transfer in the virtual circuit network is called _________.
N^2
N-1
(N^2 -N)/2 page 23
N (N-1)
Size based
Mobility based
Connectivity based page 5
Medium based
IEEE LLC / SNAP header is ________which is used to specify the type of date.
8 octets google
16 octets
32 octets
64octets
IEEE LLC / SNAP header is ________which is used to specify the type of date.
CRC
Bit stuffing
Checksum
2D Parity
Jitter page 66
Loop
Deadlock
variance
Which of the following cannot be used to extend a LAN?
Repeaters
Switches
Routers
Fiber modems
Links-state algorithm is used in ___________
RIP
IGRP
RIPv2
OSPF page 64
According to size, there are ___classifications of networks
2 page 2
3
4
5
Star
Bus
Ring
Mesh
Switch simulates a _________LAN connecting segments
Single
Single shared
Bridged page 54
Complex
c. 10 base T
If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants to communicate with each
other than at which speed they can communicate
11 Megabit
100 Megabit
1 Gigabit
Gigabit
____________ is used as an alternative of packet for a specific computer network technology
Datum
Token
Ether
Frame page 14
The sharing of a medium and its link by two or more devices is called ____
Modulation
Encoding
Multiplexing
Line discipline
Ring topology
Star topology page 5
Tree topology
Mesh topology
Asynchronous transfer mode (ATM) is designed to work on fiber but can be used with _____________
Wireless
Twisted pair page 72
Wifi
Bluetooth
5 second
Variable page 72
Constant
Fix
ABR stands for ______
The Ethernet standard specifies that frames are sent using the _________ scheme.
Differential Manchester
a. Connection-oriented page 66
b. Connection-less
Quick to configure
Security implementation
Cost
Less availability
Hub
Fiber modem
Repeater
Bridge
Which types of VPNs are used for corporate connectivity across companies residing in different
geographical locations?
a. Tree topology
Ready
Steady
Final
Startup
The network occupies larger areas like cities & countries is called
LAN
WAN
MAN
All of the above
In link state routing __________ send link-state information about local connections.
Bridge
Switches
Routers
Hubs
Guided or unguided
Fixed or unfixed
Determinate or indeterminate
Metallic or nonmetallic
Even parity can be used to check for ________ bit/ bits of errors.
a. 1 page 18
b. 2
c. 3
d. 0
Collapsed
Redirected
Emerged
Guaranteed
The system administrator must coordinate to avoid the conflict in_________ hardware addressing
scheme.
Static
Dynamic
Configurable
Fixed
Ethernet
Fast Ethernet
Gigabit Ethernet
Wireless
Which of the following technologies can extend the diameter of LAN medium?
Fiber optic
Repeater
Diameter of LAN medium is not extendable
Both. Fiber optic and Repeaters
Connections are formed in Asynchronous transfer mode by starting values in________ in ATM
switches, as opposed to making actual electrical connections.
Heap
Stack
Virtual Circuit
Memory locations page 67
The _______ scheme must be reliable to prevent conflicts.
a. Static
b. Dynamic page 34
c. Configurable
d. Fixed
a. City page 55
b. Building
c. Country
d. Continent
a. IP google
b. Physical
c. Port
d. Protocol
The sharing of a _______ among the workers in an office is a goal of resource sharing.
Mouse
Printer page 9
Keyboard
Motherboard
ATM uses fixed size, small cells, 48 octet’s data and __________.
a. Octets header
The _________ field of Ethernet frame has the purpose of receiver synchronization.
a. Preamble page 36
b. Frame Type
c. Data
d. CRC
___________ was the first internet available for the first time.
ARPANAT
The ARPNET
The NET
ARPANET page 9
We need packets rather than bits because ________
When an application ________ any data, it makes a copy of the data available to all other computers on
the network.
c. Anycast
d. Unicast
1. Mouse
2. Printer
3. Keyboard
4. Motherboard
1. 5
2. 4
3. 3
4. 2
1. Switch
2. VPI
3. VCI
4. Networks
1. correction, detection
2. detection, correction
3. correction, creation
4. detection, manipulation
1. Burst error
2. Vertical error
3. Parity Error
1. 5 seconds
2. Variable
3. Constant
4. Fix
9. Hashing is the transformation of a string of characters into
a usually shorter fixed-length value or a key that
represents the original string.
1. true
2. false
1. 48
2. 32
3. 16
4. 8
1. 11 Megabit
2. 100 Megabit
3. 1 Gigabit
4. 1.1 Gigabit
1. collision
2. delayed transmission
3. packet loss
4. coordination
1. Ping
2. Trace route
3. Tracert
1. true
2. false
1. Connectionless service
1. Transmission
2. Physical
3. Application
4. Network
1. Source Address
2. Destination Address
4. Checksum
1. Sender
2. Receiver
3. Network Devices
1. Class A
2. Class B
3. Class C
4. Class D
1. DMA
2. FDDI
3. Hard disk
4. Flash
1. Connectionless service
1. LAN
2. WAN
3. MAN
1. IPV4
2. IPV6
2. No computer is attached.
1. segment transformation
2. fiber optices
3. packet switches
1. TDM
2. FDM
3. Both a and b
1. Encrypted
2. Decrypted
3. Translated
4. Non of these
1. TLT
2. BRT
3. TTL
4. RTT
1. UDP
2. TCP
3. IP
1. Star Topology
2. Bus Topology
3. Hub Topology
4. Ring Topology
34. The recent executed instruction ________ in
temporal aspect of the locality of reference.
1. 30 bit
2. 32 bit
3. 34 bit
1. 2
2. 3
3. 4
4. 5
1. 16 MHz
2. 20 MHz
3. 24 MHz
4. 30 MHz
38. Which multiplexing technique transmits analog
signals?
1. FDM
2. TDM
3. WDM
4. None of above
1. Ring topology
2. Star topology
3. Tree topology
4. Mesh topology
42. Thick Ethernet also requires ________ to avoid signal
reflectance.
1. Terminators
2. Drop cable
3. Transceivers
4. AUI cable
1. 100 %
2. 10 %
3. 20 %
4. 50 %
1. true
2. false
1. Entries
2. Destinations
3. Source
4. Packets
1. Header
2. Title
3. Frame
4. Address
1. Ping
2. Flag
3. Fragment offset
4. TCP
1. soh
2. eoh
3. eot
4. sot
1. (N^2 - N)/2
2. N^2
3. N(N - 1)
4. N - 1
1. true
2. false
1. Throughput
2. Propagation delay
3. Access delay
4. Switching delay
1. Preamble
2. Frame Type
3. Data
4. CRC
1. High
2. Low
3. Moderate
1. Differential Manchester
4. Manchester Encodind
55. ________ is standard wireless LAN that uses radio
signals at 2.4HHz.
1. IEEE 803.16
2. IEEE 802.3
3. IEEE 802.15
4. IEEE 802.11
2. Connectionless service
1. true
2. false
1. Djikstra
3. Vector distance
1. 56kbps to 512kbps
2. 512kbps to 1gbps
3. 56kbps to 1gbps
1. Routing
2. Searching
3. Processing
4. Static routing
1. 10 Mbps
2. 1000 Mbps
3. 1000 bps
4. 100 Mbps
1. ARPANET
2. PACKET NETWORK
3. ARPNET
4. INTERNETWORKING
1. Repeaters
2. Switches
3. Routers
4. Fiber Modems
1. Destination address
2. Source address
3. Rectifier
1. 5 Base T
2. 10 Base T
3. 100 Base T
4. 1000 Base T
1. Size Based
2. Mobility Based
3. Connectivity Based
4. Medium Based
1. Low, High
2. High, Low
3. High, High
4. Low, Low
1. Radio waves
3. Micro waves
4. Infrared waves
1. Computers
2. Network
3. Frames
4. Cable wires
1. 1
2. 2
3. 3
4. 0
1. Router
2. Bridge
3. Switch
1. Fixed
2. Unlimited
4. None of these
1. WAN
2. LAN
3. MAN
4. LED
1. Router
2. Switch
1. Exterior
2. Interior
3. Packet
4. Front
1. Broadcasting
2. Multicasting
3. Unicasting
1. Probing program
2. PING program
3. status program
1. WAN
2. LAN
3. MAN
4. PAN
1. Twisted-pair cable
2. Fiber-optic cable
3. Atmosphere
4. Coaxial cable
1. Host Suffix
2. Host prefix
3. Source Prefix
1. 28
2. 8
3. 7
4. 26
1. Fiber optic
2. Repeaters
2. Datalink Layer
3. Network Layer
4. None of the given
1. 8-bit
2. 16-bit
3. 32-bit
4. 64-bit
1. Connection in VCI
2. Connection in ATM
1. TCP
2. UDP
3. IP
1. Bus
2. Ring
3. Mesh
4. Star
94. Solution is provided by vuZs Solution Team.You are free to distribute and use it. In
case you wanted to host or re-distribute it. Please don’t remove the links of group
and website
95. Question No: 1 ( M - 1 ) .
► N2
► N-1
► (N2 –N)/2
POINT-TO-POINT:
96.
97. www.vuzs.info/
http://groups.google.com/group/vuZs
98.
99.
100. In Point-to-Point topology there are two topologies.
101. 1) STAR topology
102. 2) TREE topology
In -------------, network occupies the smaller area like a room a floor or a building
► LAN
► WAN
► MAN
In LAN network occupies the smaller area like a room a floor or a building.(P# 4)
103. www.vuzs.info/
104. http://groups.google.com/group/vuZs
105.
Question No: 4 ( M - 1 ) .
► false
► 10 Mbps
► 100 Mbps
► 1000 Mbps
Gigabit Ethernet that operates at 1 Gbps (1000 Mbps) over fiber optics and twisted
pair Ethernet cables.
► 10 Base 2
► 10 Base 5
► 10 Base T
10BASE-T:
108. This is another standard of wiring scheme. It is commonly called 10Base-T,
Twisted Pair or TP Ethernet. (P# 43)
An interface for thin Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
► Loop
► Filters
► Spanning Trees
► Greedy algorithm
► Dijksta’s algorithm
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Transport Layer
LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer.
111. www.vuzs.info/
112. http://groups.google.com/group/vuZs
113.
Question No: 13 ( M - 1 ) .
► 48-bit
► 32-bit
► 24-bit
The address __________ identifies the physical network to which the computer is
attached, while the _______ identifies an individual computer on that network.
► prefix , suffix
► suffix , prefix
► suffix , suffix
PREFIX:
115. It identifies the physical network to which the computers are attached.
116. SUFFIX:
117. It identifies an individual computer on the network.
___________ places the boundary between the first and second octets
► Class A
► Class B
► Class C
► Class D
Class A places the boundary between the first and second octets. Class B places the
boundary between the second and third octets, and class C places the boundary
between the third and fourth octets.
118.
___________ places the boundary between the third and fourth octets.
► Class A
► Class B
► Class C
► Class D
Class A places the boundary between the first and second octets. Class B places the
boundary between the second and third octets, and class C places the boundary
between the third and fourth octets.
119.
► FLAGS
► FLAGMENT OFFSET
► IDENTIFICATION
FRAGMENTATION:
IP uses fragmentation i.e. datagrams can be split into pieces to fit in network with
small MTU. Each fragment is an independent datagram. It includes all header fields.
Bit in header indicates that the datagram is a fragment
120. Question No: 18 ( M - 1 ) .
► UDP
► IP
► Physical
► Data link
► Network
► Transport
► IP
► TCP
► UDP
SERVICE PROVIDED BY TCP:
128. Following are the services provided by TCP:
129. • Connection-oriented service
130. • Point-to-point
131. • Complete reliability
132. • Full-duplex communication
133. • Stream interface
134. • Reliable connection startup
135. • Graceful connection shutdown
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Internet Layer
► Transport Layer
LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer
136.
137. www.vuzs.info/
138.
139. http://groups.google.com/group/vuZs
140.
Question No: 22 ( M - 1 ) .
► Logical address
► Source port
► Destination Port
► DestinationPort
► Source port
► Logical address
► UDP
► TCP
Which of the following protocols allows the sender and receiver to enforce polices.
► RIP
► OSPF
► BGP
► BGP
► OSPF
► RIP
► True
► False
ICMP message transport is acted upon by getting ICMP encapsulated in IP (P# 117)
► hardware
► software
► operating system
► internet
► Intranet, LAN
► Internet, WAN
► Intranet, WAN
► Internet, LAN
VIRTUAL PACKETS:
157. These packets serve same purpose in Internet as frames on LAN
158. www.vuzs.info/
159. http://groups.google.com/group/vuZs
160.
Question No: 30 ( M - 1 ) .
► True
► False
Address mask defines how many bits of address are in prefix. Prefix defines how
much of address used to identify network.
► True
► False
► True
► False
The term self-identifying is used for Classful IP addresses because the class of the
address can be computed from the address__________.
► itself
► prefix
► suffix
► mask
163. Classful IP addresses are self-identifying because the class of the address
can be computed from the address itself
►A
►B
►E
►C
Reference table handouts P # 87
164. Question No: 35 ( M - 1 ) .
►A
►C
►E
►B
►T
►D
►C
► T, C
165.
166. Reference table handouts P # 97
►D
►T
►C
► T, D
168. http://groups.google.com/group/vuZs
169.
Question No: 38 ( M - 1 ) .
► T, D
►c
►T
► T, C
► T, C
►T
►C
►D
► Consistency
► inconsistency
► stability
► dynamic addressing
► True
► False
► One or more
► only one
► no
► many
171.
Question No: 43 ( M - 1 ) .
To save traffic, an EGP does not summerize routing information from the
autonomous system before passing it to another autonomous system.
► True
► False
In IPv6 the type of address used for collection of computers with same prefix. Are
known as_________.
► Anycast
► Unicast
► Multicast
Special types of addresses in IPv6 used for multiple destinations; possibly not at
same site. Are known as_________.
► Unicast
► Anycast
► Multicast
► True
► False
► Network
► Datalink
► Transport
► Application
► door
► window
► acknowledgment
► retransmission
► Distance to destination
► non of these
------ Program sends a message to a remote computer and reports whether the computer
responds.
Ping
Ping
Traceroute
ICMP
Non of the given
---------- was especially concerned about the lack of high powered computers.
ARPA
IEEE
EIA
Non of the given
The term -------- is used to denote the definition of a packet used with a specific type of
network.
Packet
Frame
Data
None of the given
Computer networks are often called -------------- because they use packet technology.
Ethernet
Switch networks
Packet networks
None of the given
-------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given
Most LANs that employ ring topology use an access mechanism known as-------
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
8 octets
8 bytes
8 bits
None of the given
An interface for twisted pair Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T
A Bridge forwards or filters a frame by comparing the information in its address table to
the frame’s__________
Layer 2 source address
Source node’s physical address
Layer 2 destination address
Layer 3 destination address
___________ is used for audio and video, since these have predefined maximum data
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given
LAN interface may use ---------- to copy frame data directly from main memory.
DMA
FDDI
CSMA/CD
None of the given
The routing table in interior and exterior switches has which one of the following?
Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Destination
Medium of transmission
Connectionless service
It is typically ranges from 5Mbps to 1000Mbps.
Twisted-pair
cable Fiber-optic
cable Atmosphere
Coaxial cable
PVC last as long as the customer pay the periodic fee for its use.
ATM is a single technology that is designed to meet the goals of both LANs and WANs.
BGP
IGP
EGP
none of the given
Due to revolutionalization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Select correct option:
True
False
_____________identifies which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given
The process of using a routing table to select a next hop for a given datagram is called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given
The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was
being exhausted because all networks had to choose one of ________ possible sizes.
Select correct option:
three
two
four
five
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that
represents the original string.
Select correct option:
True
False
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware
addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:
True
False
packet
message
both (a) and (b)
None of the given
both a and b?
______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
The amount of buffer space available at any time is called the window.
Select correct option:
True
False
UDP
TCP
IP
none of the given
Question # 14 of 20
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given
The routers within an autonomous system use a _____________ to exchange routing information.
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of
Internet Routing Protocol.
Select correct option:
True
False
Most LANs that employ ring topology use an access mechanism known
as_______
ring topology use token passing for
synchronized access to the ring
Computers attached to an ether use ------ in which a computer waits for the
ether to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
As a result of ARPA research the first network was established which was named as Select correct
option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWORK
A ---------- provides mechanism that automatically assignes a physical address to a station when the
station first boots. Select correct option:
Static ad Configurable
addressing scheme
polygons are basically concave polygons that may have self-intersecting edges.
Complex
Hybrid
Convex
Convex and Hybrid
Dynamic addressing scheme
Point-to-point topology is
Size Based
Mobility Based
Connectivity Based
Medium Based
As a result of ARPA research the first network was established which was named as Select correct
option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWOR
---------- performs the matching between destination address and MAC address of machine.
Select correct option:
Hardware address
LAN interface
DMA
None of above
The demand of sharing is very high because many computers need to use the shared networks.
Select correct option:
WAN networks
Shared networks
Unshared networks
LAN networks
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the
CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given
The satellite or radio topology in which all computers are connected to each other via satellite or
radio wave is a kind of Select correct option:
broadcast network
The first automated tool required to see whether the given computer is online or not was
Select correct option:
Probing program
PING program
status program
None of the above
-------------- has advantages arisen from the size and ease of computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing
The third field of the header consists of ------ bit Ethernet frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the
CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given
Fixed network is a type of networks which is classified with respect to the...........factor
Select correct option:
Size
Connectivity
Medium
Mobility
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
---------- which is designed to help detect transmissions errors, send one extra bit of information
with each character.
Select correct option:
Checksum
CRC
Parity
VRC
The satellite or radio topology in which all computers are connected to each other via satellite or
radio wave is a kind of
Select correct option:
Broadcast network
Point-to-Point network
The demand of sharing is very high because many computers need to use the
shared networks.
Select correct option:
WAN networks
Shared networks
Unshared networks
LAN networks
Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given
The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
broadcast network
Thick Ethernet is known as------------------ Select correct option:
10 base 5
10 base T
10 base 100
10 base 1
The first automated tool required to see whether the given computer is online or not
was
Select correct option:
Probing program
PING program
status program
None of the above
-------------- has advantages arisen from the size and ease of computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing
The third field of the header consists of ------ bit Ethernet frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology
Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
---------- which is designed to help detect transmissions errors, send one extra bit of
information with each character.
Select correct option:
Checksum
CRC
Parity
VRC
---------- was especially concerned about the lack of high powered computers.
ARPA
IEEE
EIA
Non of the given
The term -------- is used to denote the definition of a packet used with a specific type
of
network.
Packet
Frame
Data
None of the given
Computer networks are often called -------------- because they use packet
technology.
Ethernet
Switch networks
Packet networks
None of the given
-------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given
Most LANs that employ ring topology use an access mechanism known as-------
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
8 octets
8 bytes
8 bits
None of the given
An interface for twisted pair Ethernet must have an ____________ connector , and
must
generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T
___________ is used for audio and video, since these have predefined maximum
data
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
LAN interface may use ---------- to copy frame data directly from main memory.
DMA
FDDI
CSMA/CD
None of the given
The routing table in interior and exterior switches has which one of the following?
It should have next hop for each possible destination
The next hop in table must be on shortest path to destination
Both (a) and (b)
None of the above
Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Boot time routing
None of the above
BGP
IGP
EGP
none of the given
The process of using a routing table to select a next hop for a given datagram is
called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given
The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False
As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of ________ possible sizes.
Select correct option:
three
two
four
five
Although the ARP message format is sufficiently general to allow arbitrary protocol
and hardware addresses. ARP is almost always used to bind a 32-bit IP address to
a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
NAT software does not allow a PC to connect with the Internet and act as a NAT
device at the same time.
Select correct option:
True
False
packet
message
both (a) and (b)
None of the given
both a and b?
The amount of buffer space available at any time is called the window.
Select correct option:
True
False
UDP
TCP
IP
none of the given
Typical internet routing uses uses a combination of two
metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count
Question # 14 of 20
Network Address and Port Translation (NAPT) is by far the most popular form of
_______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two
broad classes of Internet Routing Protocol.
Select correct option:
True
False
Most LANs that employ ring topology use an access mechanism known
as_______
ring topology use token passing for
synchronized access to the ring
Computers attached to an ether use ------ in which a computer waits for the
ether to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
polygons are basically concave polygons that may have self-intersecting edges.
Complex
Hybrid
Convex
Convex and Hybrid
Dynamic addressing scheme
Point-to-point topology is
Size Based
Mobility Based
Connectivity Based
Medium Based
As a result of ARPA research the first network was established which was named
as Select correct option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWOR
---------- performs the matching between destination address and MAC address of
machine.
Select correct option:
Hardware address
LAN interface
DMA
None of above
The demand of sharing is very high because many computers need to use the
shared networks.
Select correct option:
WAN networks
Shared networks
Unshared networks
LAN networks
Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given
The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
broadcast network
The first automated tool required to see whether the given computer is online or not
was
Select correct option:
Probing program
PING program
status program
None of the above
-------------- has advantages arisen from the size and ease of computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing
The third field of the header consists of ------ bit Ethernet frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology
Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
---------- which is designed to help detect transmissions errors, send one extra bit of
information with each character.
Select correct option:
Checksum
CRC
Parity
VRC
The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of
Select correct option:
Broadcast network
Point-to-Point network
2_Which one of the following is a property of dynamic routing?
It is inflexible
3_All destinations on same switch have same
Router
Information
Next hop
new
similar
separate
old
5_Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of
----------- octets.
55
53
52
51
true
false
7_The Internet service providers coordinate with the Internet assigned number
authority to obtain their network numbers.
True
False
8_Dotted decimal represents each octet in ________ and uses a dot to separate
octets.
binary
decimal lec25
hexadecimal
Octal
Destination
Medium of transmission
Fixed
Unlimited
None of these
Voice
Video
Data
All of above
destination
Connection in VCI
Connection in ATM
If a bridge builds up address list for each segment that consists of physical
addresses of the computer attached to that segment. So, when the bridge boots,
the size of list will be__ for each segment.
Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of
----------- octets.
55
53
52
51
ATM is a single technology that is designed to meet the goals of both LANs and
WANs.
Routing
Switching
Communication
It is inflexible
According to a bridges
Performance, if both the sauces and destination are on the same segment
What will be the bandwidth rate for future (possibly 10 Gigabyte) Ethernet?
500 MHz
550 MHz
600 MHz
650 MHz
Connection-less network
Connection-oriented network
The fiber-modem converts data into _________ then transmits cover the optional
fiber
Pulses of light
Electrons
Electromagnetic signals
None of these
To span long distance or many computers, networks must replace shared medium
with ………..
Segment transformation
Fiber optics
Packet switches
It is used in RIP
100 MHz
150 MHz
200 MHz
250 MHz
The routing table in interior and exterior switches has which one of the following?
Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Destination
Medium of transmission
Connectionless service
Twisted-pair
Atmosphere
Coaxial cable
PVC last as long as the customer pay the periodic fee for its use.
ATM is a single technology that is designed to meet the goals of both LANs and
WANs.
If a link or a packet switch fails then which one of the following would possibly be
happened?
Destination
SMDS is ……………………
Connectionless service
Routing
Switching
Communication
The sharing of a medium and its link by two or more devices is called
modulation
encoding
line discipline
multiplexing
Which multiplexing technique transmits analog signals?
FDM
TDM
WDM
FDM
TDM
WDM
None of above
FDM
TDM
None of above
In synchronous TDM, for n signal sources of the same data rate, each frame
contains _______ slots.
n+1
N-1
O to n
FDM
TDM
WDM
None of above
Frequency
Bandwidth
Amplitude
1; n
1:1
n;1
n;n
The word ______ refers to the portion of a _______ that carries a transmission.
channel; link
link; channel
line; channel
line; link
______ can be applied when the bandwidth of a link (in hertz) is greater than the
combined bandwidths of the signals to be transmitted.
TDM
FDM
FSM is an _________technique.
Analog
Digital
Either (a) or b)
FDM
TDM
WDM
FDM
TDM
WDM
FDM
TDM
WDM
FDM
TDM
WDM
_____ is a digital process that allows several connections to share the high
bandwidth of a link.
FDM
TDM
WDM
FDM
TDM
WDM
None of the above
The routing table in interior and exterior switches has which one of the following?
None of the above
None of above
16mhz
20mhz
100mhz
150mhz
What will be the bandwidth rate for older, low-speed network, and analog
telephones
16
20
24
30
Source
Destination
port@
none
Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Router
Information
Next hop
Voice
Video
Data
All of above
destination
It is inflexible
No computer is attached
True
False
new
similar
separate
old
True
False
Static routing
Dynamic routing
Static routing
Address resolution
True
False
Efficiency
Security
Accuracy
Anomalies
IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
96
100
120
IGMP
SNMP
ICMP
True
False
is a ____ protocol.
Select correct option:
Point-to-Point
Multi-Point
Both (a) and (b)
None of the given
CP
As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of______ possible sizes.
Least
Maximum
Fragment
Frame
3000 octets
2000 octets
1000 octets
none of the given
Dotted decimal represents each octet in ______ and uses a dot to separate octets.
binary
decimal
hexadecimal
Octal
The amount of buffer space available at any time is called the window.
Select correct option:
True
False
The IP class scheme does not divide the______ address space into equal size
class and the classes do not contain the same number of networks.
Select correct option:
16-bit
32-bit
48-bit
64-bit
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two
broad classes of Internet Routing Protocol.
Select correct option:
True
False
window mechanism
Network having short intervals has a large timeout and the network having large
interval has short timeout.
Select correct option:
True
False
True
False
As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of three possible sizes.
True
False
True
False
Preliminary version of IP was called _________.
As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of two possible sizes.
True
False
IP
UDP
TCP
The Internet service providers coordinate with the Internet assigned number
authority to obtain their network numbers.
True
False
ICMP
IGMP
TCP/IP
Source port
Logical address
Segmentation
Defragmentation
Fragmentation
Distance to destination
Both a and b
Source quench
Time exceeded
Destination unreachable
False
True
TYPE
SERVICE TYPE
SERVICE PRIORITY
As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of two possible sizes.
True
False
FRAGMENT OFFSET
IDENTIFICATIONNo.3
Address Resolution
Table Lookup
Message Exchange
True
False
FLAGSNo.4
FRAGMENT OFFSET
IDENTIFICATION
34
32 Page 105
30
that computer's hardware address can be computed from the protocol address
using basic Boolean and _________ operations.
arithmetic
XOR
Shift
XNORNo.5
Efficiency
Security
Accuracy
Anomalies
End to End delivery Service of IP datagram is _____
Connection oriented
both a and b
Header
Identifier
32
64
128
256
_____ is a technique used to Limit datagram size to small MTU of any network
Select correct option:
Segmentation
Fragmentation
Encapsulation
none of the given
As the Internet grew, the original Classful addressing scheme became a limitation.
The IP address space was being exhausted because all networks had to choose
one of ______ possible sizes.
three
two
four
five
Connection oriented
Connectionless
Both a and b
FLAGS
FRAGMENT OFFSET
IDENTIFICATION
None of the given
True
False
Least
Maximum
Fragment
Frame
A routing table contains_______
True
False
Efficiency
Accuracy
Reliability
Destination Port
Source port
Logical address
IGMP
SNMP
ICMP
transmission
propagation
communication
Network
Transport
Datalink
Connection oriented
Connectionless
both a and b
True
False
A. Arithmetic Page 94
B. XOR
C. Shift
C. Three Page 90
A. 32-bit Page 87
B. 16-bit
C. 8-bit
C. Transport Layer
B. Suffix
C. Mux
Question No:10 (Marks:1) Vu-Topper
RM
Internet protocol (IP) address version 4 is comprised of --- bits.
A. 48
B. 32
C. 24
Question No:11 (Marks:1) Vu-Topper
RM
A separate table is used for each physical network.bit-binding
A. Checksum
B. Address-binding
A.32 Page 91
B. 48
C. 36
A. Decimal Page 87
B. Octal
C. Internet Layer
A. Physical Layer
B. Data Link Layer
C. Internet Layer
B. 48-bit
C. 64-bit
A. PREFIX Page 85
B. SUFFIX
C. Mux
A. Routing Page 58
B. Processing
C. Hierarchical Addressing
D. Source Addressing
D. All Page 40
C. CSMA Page 43
D. TDMA
D. soh Page 16
D. Detection; correction
Google
D. Correction; detection
Google
C. Neighbors Page 63
D. WAN
B. collision Page 28
C. delayed transmission
D. coordination
B. Star topologyPage 31
C. Hub topology
D. Bus topology
B. N-1Page 23
C. N-2
D. 2N
C. Forward Page 59
D. Start
A. Throughput Page 79
B. Propagation delay
C. Access delay
D. Switching delay
C. ICMP Page 11
D. IGMP
B. WAN Page 56
C. Bridge
D. None
D. Mobility Page 6
C. 2 Page 19
D. 1
B. TCP/IP Page 84
C. ICMP
D. IPx
C. TDM Page 15
D. GSM
B. Multiplexer Page 41
C. Repeater
D. Layer 3 Switch
B. Two Page 54
C. Four
D. One
D. Jitter Page 66
C. ARPANET Page 9
D. PACKET NETWORK
Question No:75 (Marks:1) Vu-Topper
RM
Asynchronous transfer mode (ATM) can dynamically establish a .
B. Destination Page 51
C. IP
D. Source
Question No:81 (Marks:1) Vu-Topper
RM
We may use to extend local area network.
A. Bridge, Router
B. Bridge, Hub, Router
C. Bridge, Hub, Repeater Page 149
D. Bridge, Hub, Repeater, Router
C. Throughput Page 79
D. Queuing
A. Routing tablePage 62
B. Trailer
C. Header
D. Register
A. DMA Page 34
B. FDDI
C. Hard disk
D. Flash
D. LAN Google
A. Nodes Page 62
B. Edges
C. Path
D. Connections
C. VPN Conceptual
D. Incognito mode
B. Boot Page 62
C. Execute
D. One
Question No:95 (Marks:1) Vu-Topper
RM
was the first automated tool required to see whether
the given computer is online or not.
A. Probing program
B. PING program
C. status program
D. None Page 11
C. Checksum Page 19
D. Hash Function
B. Switch Page 70
C. VPI
D. Virtual circuit
B. 48 Page 109
C. 32
D. 16
A. Star Google
B. Ring
C. Bus
D. Mesh
B. Ping Page 11
C. Traceroute
D. Arp
D. Terminators Page 41
Question No:107 (Marks:1) Vu-Topper RM
Which of the following network is using the TCP/IP model globally?
A. PAN
B. SAN
C. LAN
D. The InternetGoogle
A. Costs Page 54
B. Quality
C. Efficiency
D. Noise
B. Switch Page 54
C. Repeater
D. Amplifier
A. Star Page 44
B. bus
C. tree
D. mesh
A. IP Page 99
B. Port
C. Logical
D. МАС
Question No:116 (Marks:1) Vu-Topper
RM
AUI cable connects from NIC to .
A. BNC Connector
B. RJ-45 Connector
C. Transceiver Page 41
D. Terminator
B. Physical Google
C. Application
D. Network
C. Checksum Page 19
D. 2D Parity
B. High Page 80
C. Low
D. Moderate
C. Checksum Google
D. 2D Parity
A. Jitter Page 66
B. Loop
C. Deadlock
D. Variance
D. OSPF Page 64
C. Bridged Page 54
D. Complex
D. Frame Page 14
C. Multiplexing Google
D. Line discipline
B. Variable Page 72
C. Constant
D. Fix
B. Switches Page 64
C. Routers
D. Hubs
A. Guided or unguidedGoogle
B. Fixed or unfixed
C. Determinate or indeterminate
D. Metallic or non-metallic
A. Page 18
B. 2
C. 3
D. 0
A. Ethernet Google
B. Fast Ethernet
C. Gigabit Ethernet
D. Wireless
B. Dynamic Page 34
C. Configurable
D. Fixed
A. City Page 55
B. Building
C. Country
D. Continent
A. IP Google
B. Physical
C. Port
D. Protocol
B. Printer Page 9
C. Keyboard
D. Motherboard
A. Preamble Page 36
B. Frame Type
C. Data
D. CRC
A. A BRIDGES Page 50
B. FRAME FILTERING
C. REPEATERS
D. LAN EXTENSIONS
A. Exterior Page 59
B. Interior
C. Packet
D. Front
Question No:183 (Marks:1) Vu-Topper
RM
standard includes logical link control (LLC) sub
network attachment point (SNAP) header.
B. Four Page 49
C. Six
D. Eight
B. 10% Page 66
C. 15%
D. 20%
A. SwitchesPage 59
B. Interior
C. Packet
D. Front
A. Ping Google
A. RTT Google
B. TRL
C. TTL
Question No:196 (Marks:1) Vu-Topper RM
The number of connections needed for 8 computers in direct point to
point communication is equal to .
A. 28 Google
B. 20
C. 14
A. Server Google
B. Client
C. Mainframe
C. Physical
B. Packet switched
Question No:203 (Marks:1) Vu-Topper RM
allows LAN users to share computer programs and data.
Communication server
A. Print server
B. File serverGoogle
B. Spool
C. Node
B. Security management
C. Performance management
Question No:207 (Marks:1) Vu-Topper
RM
What is the max cable length of STP?
A. 100 ft
B. 200 ft
C. 200 m
Question No:208 (Marks:1) Vu-Topper RM
What is the max data capacity of STP?
A. 10 mbps
B. 100 mbps
C. 1000 mbps
D. 10000 mbps
B. Hub/switch Google
C. PDC
D. Router
A. Connectivity Page5
TEAM
CS610 130+ Mcqs
Quiz 1 Lec 1-9
Spring 2022 #Mid-Term
WITH PROVE ANSWER
ORANGE MONKEY TEAM
Important NOTE:-
Like share and comment too ..ager koi
mistake hogaye ho to sorry and comment
main lazmi mention krdijiye ga takey main
correction krlon file main …. And like
zaroor krein is hamein or bhe apsab keyliye
files makes krny ke himat milti hey
…JAZAKALLAH
TEAM
ORANGE MONKEY Page 3
TEAM
1. When an application any data, it makes a copy of the data available to all other computers
on the network.
Multicast…..confirm
2….confirm
Security implementation…..confirm
4. If you as a network administrator want to know the traffic flow of your data while
communicating with a remote computer which of the following will be used to know about
intermediate routers?
TEAM
Ping…..confirm
TEAM
5. Which of the following network is using the TCP/IP model globally?
The internet….confirm
6. In which type of error detection the arithmetic sum is calculated before and after the
transmission of data at both communication ends?
Checksum…..confrim
TEAM
7. Hardware address is also called .
Physical address……confirm
TEAM
8. The sharing of a among the workers in an office is a goal of resource sharing
Printer….confirm
10. The Field of Ethernet frame has the purpose of frame payload.
Data….confirm
TEAM
ORANGE MONKEY Page 9
TEAM
11. In each station is allocated time slot during which it can send data. Each station
transmits its data in its assigned time slot.
TDMA…confirm
Star topology…..confirm
13. In which topology terminators are used at the end of the cable?
Bus….confirm
TEAM
Ring topology…confirm
15. LAN interface uses to copy frame data directly from main memory
TEAM
DMA….confirm
16. In direct point to point communication adding the NTH computer requires new
connections
N-1….confirm
17. uses counter rotating rings in which data flows in opposite directions
FDDI….confirm
18. We need pockets rather than bits because .
TEAM
1000 Mbps…..confirm
20. Each computer in LAN is identified by a Physical address usually imprinted on the
.
TEAM
21. network does not depend on CSMA/CD.
Ethernet….confirm
CSMA/CD….confirm
TEAM
24. Parity check is usually used to detect bit error(s).
1….confirm
25. is a tool that sends a message to a remote computer and reports whether the
computer responsibility
Ping…confirm
TEAM
26. LAN and WAN are classified according to their .
Size….confirm
RTT….confirm
TEAM
29. In technique data is treated as a sequence of integers and their arithmetic sum is
computed and the carry bits are added to the final sum
Checksum….confirm
TEAM
30. In taken ring, if all computers are ready to transmit it enforces access.
Round-robin access…..confirm
31. Fixed network is a type of networks which is classified with respect to the factor.
Mobility….confirm
TEAM
Suffix….confirm
34. In the IP address identifies the physical network to which the computers are
attached.
Prefix….confirm
TEAM
35. Serve same purpose in internet as frames on LAN.
Packets…..confirm
1-65.535…confirm
37. TCP/IP defines the term to refer any computer system that connects to a network
and runs applications for users.
Host computer….confirm
38. protocols of TCP/IP layering model specify how to organize data into frame and
how a computer transmits frames over a network.
TEAM
39. of TCP/IP protocol suit specifies the format of packets sent across internet as well
as the mechanisms used to forward packets.
Internet….confirm
TEAM
40. As the internet grew the original Glassful addressing scheme became a limitation. The IP
address space was being exhausted because all networks had to choose one of _
possible sizes.
Three….confirm
41. Dotted decimal notation is a syntactic form the IP software uses to express _
binary values when interacting with humans.
32-bit….confirm
42. Header contains all information needed to deliver datagram to the destination computer.
But which one of the following is not included.
Rectfer…..confirm
TEAM
43. For information about forwarding is stored in a routing table which is
initialized at system initialization and must be updated as network topology changes.
Efficiency…..confirm
TEAM
44. MTU stands for .
45. In closed-form computation the protocol address assigned to a computer is chosen carefully
so that computer’s hardware address can be computed from the protocol address using
basic Boolean and operations.
Arithemetic….confirm
32…confirm
20….confirm
TEAM
Header…confirm
48….confirm
TEAM
50. The protocol address of the most hop must be to an equivalent hardware before
a packet can be sent.
Translated….confrim
True….confirm
Subnetting….confirm
128 bits….confirm
True….confirm
TEAM
55. HLEN shows the header length in units of bits.
32 bits…confirm
56. VERS shows the version of .
IP…..confirm
TEAM
57. TOTAL LENGTH shows total octets in .
Datagram…confirm
MTU…confirm
59. Every hardware technology specification includes the definition of the maximum size of
the frame data area which is called the transmission Unit.
Maximum…..confirm
60. The IP class scheme does not divide the address space into equal size class and
the classes do not contain the same number of networks.
32-bit….confirm
TEAM
61. shows senders preference for low latency high reliability.
Service type….confrim
62. NEXT HEADER field in the base header defines type of header if appears at the end of
fixed-size base header.
TEAM
True…..confirm
63. uses counter rotating rings in which data flows in opposite directions.
FDDI….confirm
Star topology….confirm
65. In a all computers are attached to a single cable and any computer can send data to
any other computer.
Bus topology….confirm
IEEE 802.11…..confirm
TEAM
67. Star topology is the kind of .
TEAM
69. In FDDI, in case of a station failure, remaining stations loop back and
71. In topology if the switch goes down all the computers will be disconnected.
Star….confirm
LAN….confirm
TEAM
73. The basic idea behind the operation of network analyzer is a computer with a network
interface that receives all frames, which is called
Promiscuous mode…..confirm
TEAM
74. WE need packets rather than bits because .
75. As a result of ARPA research, the first network was established which was named as
.
ARPANET…..confirm
76. While transmitting data from source destination B, 4 bits are changed during the
transmission then the error is a .
Brust error….confirm
77. Each computer in LAN is identified by a physical address, usually imprinted on the
.
TEAM
78. Which type of network consists of wired computers in a university classroom?
LAN….confirm
TEAM
79. Bluetooth uses shared medium and instead of coaxial cable.
Radio waves….confirm
80. The Ethernet standard specifies that frames are sent using the scheme.
Manchester Encoding…..confirm
81. In technique, all members of the network can send data on the specific time
slot?
CSMA….confirm
TEAM
82. A network uses to arrange computers in a single closed loop
Ring topology….confrim
TEAM
83. NICs can provide all three-connection technologies.
RJ-45 connector for 10 base-T, AUI connector for thicknet and BNC
connector for
Thinnet…..confirm
4…confirm
FDDI….confirm
TEAM
86. was the first automated tool required to see whether the given computer is
online or not.
PING program….confirm
TEAM
87. Ethernet uses a bit static addressing scheme in which device is assigned a unique
address by the manufacturer.
48….confirm
88. is designed to detect transmission errors, send one extra bit of information with
each character.
Parity….confirm
Unique….confirm
TEAM
90. The Fast Ethernet hardware operates at a rate of .
100 Mbps…..confirm
TEAM
91. Inside a computer each address mask is stored as a bit value.
32…..confirm
92. The protocol address of the next hop must be ------ to an equivalent hardware address
before a packet can be sent.
Translated….confirm
93. protocols of TCP/IP layering model specify how to ensure reliable transfer.
Transport layer….confirm
TEAM
Hashing and direct indexing….confirm
TEAM
95. of TCP/IP protocol suit defines the basic characteristics of network hardware.
Physical layer….confirm
96. Dotted decimal represents each octet in and uses a dot to separate octets.
Decimal…confirm
Arithmetic…confirm
TEAM
98. Address Resolution Protocol is mostly used to bind a 32-bit IP address to a _
Ethernet address.
48-bit…confirm
TEAM
Address-binding…confirm
3MBps…..confirm
10Mbps….confirm
a. IPV6……confirm
103. Which of the following statement is true regarding ATM?
a. ARPANET…..confrim
a. TCP……confirm
TEAM
106. NAT device stores state information in translation table.
TEAM
False…confirm
108. The number of connections needed for 8 computers in direct point to point communication
is equal to .
28….confirm
109. The bridges communicate with each other on the network and use algorithm to
decide which bridge will not forward frames if a cycle occurs.
110. places the boundary between the second and third octets.
Class B….confirm
TEAM
LAN…..confirm
TEAM
112. encapsulates IP datagram as data area in hardware frame.
IEEE 802.11…..confirm
114. Missing in a frame format indicates receiving computer missed beginning of the
message.
Soh…….confirm
Eot….confirm
TEAM
116. An interior switch is one with wich ..
No computer is attached…..confirm
TEAM
Variable Bit Rate….confirm
120. If simultaneous transmission occurs, the frames interfere with each other and this
phenomenon is called .
Collision…..confirm
121. The first automated tool required to see whether the given computer is online or not was
PING program…..confirm
TEAM
122. The recent executed instruction in temporal aspect of the locality of reference.
TEAM
123. The of errors is easier than the of errors.
correction, detection
10 %
TEAM
126. is inflexible.
Static routing….confirm
TEAM
Sender and Receiver…confirm
128. Fragmentation when using ICMP for path MTU should be avoided.
True…confirm
129. The frame format of any LAN technology must consists of and .
Atmosphere
132. are more frequently being designed to allow specification of the quality of
service required by users.
Networks….confirm
TEAM
values for each end of the connection.
True….confirm
TEAM
136. A is a special-purpose computer dedicated to the task of
interconnecting networks.
Router….confirm
137. The third field of the header consists of bit Ethernet frame type.
16
10 Base T….confirm
139. To span long distances or many computers, networks must replace shared medium
with
.
packet switches….confirm
a. FDM
b. TDM
c. WDM
d. Both (a) and (c)….confirm
142. Which of the following is not a benefit of Source Independence?
CS610-COMPUTER NETWORK
WAN
CSMA
Ethernet
Multicast
Ethernet
10Baset
Bridge
10Base5
.Broadcast
Multicast
Packet Switch
CRC
Bandwidth
Bridge
Broadcast
WAN
Wireless LAN
TDM
Bandwidth
Network Analyzer
Broadcast
► Isochronous Network
► Asynchronous Network
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______.
►Connectionless
service paradigm
►21-bit
►22-bit
►23-bit
►24-bit
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication
routing is called___________
►Hierarchal address
►Default route
►Shortest path
►Packet’s
destination
An interface for twisted pair Ethernet must have a ____________ connector, and must generate signals
according to the_____________ specification.
►RJ-45, 10 Base T
►RJ-45, 10 Base 5
►BNC, 10 Base 2
►BNC, 10 Base T
When an application___________ data, it makes a copy of the data available to all other computers on
the network.
►Broadcasting
►Multicasting
►Unicasting
A ____________ provide a mechanism that a customer can use to set a physical address.
►100
million bits per second
Computers attached to an ether use ------ in which a computer waits for the ether to be idle before
transmitting a frame.
►CSMA/CD
►CSMA/CA
►TOKEN PASSING
________________ has advantages arisen from the size and ease of computation.
►CRC
►Parity
►Checksums
►None of given
The term ___________ is used to denote the definition of a packet used with a specific type of network.
►Packet
►Frame
►Data
►Trace route
►ICMP
_____________ Program sends a message to a remote computer and reports whether the computer
responds.
►Ping
►Trace route
►ICMP
In ____________, network occupies the smaller area like a room a floor or a building.
►LAN
►WAN
►MAN
No error detection scheme is perfect because transmission errors can affect the additional information
as well as the data.
► False
►True
The product of delay and throughput measures the _____ of data that can be present on the network.
► Area
► Volume
► Length
__________is used for compressed audio and video where the data rate depends on the level of
compression that can be achieved.
►Variable
Bit Rate (VBR) service
►Bridge
►Repeater
►Hub
►Physical (MAC)
►Data link
►Network
►Physical
(MAC) and Data link
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
►8 octets
►8 bytes
►8
bits
The third field of the header consists of ------ bit Ethernet frame type.
►48
►32
►16
►8
An ------------method, the network hardware designers specify how type information is included in the
frame and the value use to identify various frame types.
►Explicit
frame type
►Bus
topology
►Ring topology
►10 Mbps
►100
Mbps
►1000 Mbps
___________scheme, which is designed to help detect transmissions errors, send one extra bit of
information with each character
►Parity
►Checksums
►CRC
►None of given
Computer networks are often called -------------- because they use packet technology.
►Ethernet
►Switch
networks
►Packet networks
_____________Program sends a message to a remote computer and reports whether the computer
responds.
►Ping
►Trace route
►ICMP
►Non of the given
►LAN
►WAN
►MAN
In -------------, network occupies the smaller area like a room a floor or a building.
►LAN
►WAN
►MAN
►Tree
and Ring
Computer networks are often called -------------- because they use packet technology.
► Ethernet
► Switch networks
► Packet networks
► Ring Topology
► Bus Topology
An ------------method, the network hardware designers specify how type information is included in the
frame and the value use to identify various frame types.
An interface for thin Ethernet must have a ____________ connector, and must generate signals
according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
A Bridge forwards or filters a frame by comparing the information in its address table to the
frame’s__________
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication
routing is called___________
► Hierarchal address
► Default route
► Shortest path
► Physical Layer
► Internet Layer
► Transport Layer
_______ Protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Internet Layer
► Transport Layer
________is called an end-to-end protocol because it provides a connection directly from an application
on one computer to an application on a remote computer.
► IP
► UDP
► TCP
► BGP
► OSPF
► RIP
_______ is ideal in a situation where the group is small and all members are attached to contiguous
Local Area Networks.
► Flood-and -Prune
► Configuration-and -Tunneling
► Core-Based Discovery
Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source
address
►3
►2
►1
►0
► Hardware
► Software
► Operating system
► Internet
Although message exchange can be used to bind addresses, sending a request for each binding is
hopelessly inefficient.
► True
► False
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
► 32, 48
► 24, 32
► 32, 64
► 32, 128
In the 1970s large organizations began to acquire multiple networks. Each network in the organization
formed island. Employees needed to choose a computer appropriate for each task. So they needed
multiple screens, keyboards and computers.
► False
► True
In which method of Address Resolution Protocol the protocol address is determined by hardware
address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
►T
►D
►C
► T, C
The general form of an IP datagram is with a header followed by data. The header contains
information that controls where and how the datagram is to be sent.
► True
► False
To save traffic, an EGP does not summarize routing information from the autonomous
system before passing it to another autonomous system.
► True
► False
Which of the following is a correct representation of the IPv6?
► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255
► 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255
► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256
► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255
A ________relies on the hardware manufacturer to assign a unique physical address to each network
interface is called.
A system with redundant bridges might have a problem with_______ in the system.
► Loop
► Filters
► Spanning Trees
A Bridge can________
► Filter a frame
► Forward a frame
► Extend a LAN
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
► 21-bit
► 22-bit
► 23-bit
► 24-bit
► Physical Layer
► Internet Layer
► Transport Layer
___________ places the boundary between the second and third octets
► Class A
► Class B
► Class C
► Class D
► Data link
► Network
► Transport
► IP
► TCP
► UDP
► Physical Layer
► Internet Layer
► Transport Layer
________identifies which application program on receiving computer should receive the data
Destination port
Source port
Logical address
► Destination Port
► Source port
► Logical address
► RIP
► OSPF
► BGP
► UDP
► TCP
__________measures distance in network hops, where each network between the source and
destination counts as single hop.
► BGP
► OSPF
► RIP
The length of time required to send a variable length packet is variable and does not require a
complicated interrupt scheme to detect completion of transmission.
► True
► False
NEXT HEADER field in the base header defines type of header and it appears at end of fixed-size base
header.
► True
► False
Although message exchange can be used to bind addresses, sending a request for each binding is
hopelessly inefficient.
► True
► False
► True
► False
A computer attached to a given network can only communicate with other computers attached to the
same network. Is this a problem with multiple networks?
► True
► False
The term self-identifying is used for Classful IP addresses because the class of the address can be
computed from the address__________.
► itsel
► prefix
► suffix
► mask
In which method of Address Resolution Protocol the protocol address independent of hardware
address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, C
►D
►C
► T, D
► True
► False
► True
► False
► Door
► Window
► Acknowledgment
► Retransmission
To solve the problem the routers and networks in the Internet are divided into groups. How large do
you think are these groups?
Trace route continues to increment the Time To Live until the value is large enough for the datagram to
reach its final destination. What happens when the TTL is sufficiently large for the datagram to reach its
destination?
What is the meaning of Facilities For Transit Routing as a characteristic of the Border Gateway Protocol?
Describe how NAT can be useful for residence with cable modem or DSL?
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
The address field of a frame in HDLC protocol contains the address of the ________ station.
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
A portion of the path that carries TX b/w a given pair of devices is known as __________.
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
True False
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
Asynchronous TDM is efficient only when the size of the time slot is kept relatively ________
------------------------------------------------------------------------------------------------------------
Telephone system Cable System Telephone and Cable System Non of the above
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
A prism can deflect the light depending upon the angle of ____________ and the frequency.
------------------------------------------------------------------------------------------------------------
Simple parity check Two-dimensional parity check CRC All of the given
------------------------------------------------------------------------------------------------------------
Which of the following techniques takes data from one high speed line and breaks it into portions?
------------------------------------------------------------------------------------------------------------
fiber to the center fiber to the cable fiber to the curb flexible to the curb
------------------------------------------------------------------------------------------------------------
Cable that connects the subscriber telephone to the nearest end office in a local loop is called
------------------------------------------------------------------------------------------------------------
In Synchronous TDM, Time slots are not same in number as input devices
True False
------------------------------------------------------------------------------------------------------------
In Synchronous TDM, Time slots are not same in number as input devices.
True False
------------------------------------------------------------------------------------------------------------
At the CRC checker, ________ means that the data unit is damaged
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
Multiplexing is the set of techniques that allows simultaneous TX of multiple signals across a
___________ data link
------------------------------------------------------------------------------------------------------------
If the ASCII character G is sent and the character D is received, what type of error is this?
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
2 3 4 5
------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
BGP
IGP
EGP
UDP
TCP
MAC address
routing table
Question # 4 of 10 ( Start time: 09:50:37 PM ) Total Marks: 1
PIM-DM
PIM-SM
PIM-AM
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:
True
False
Question # 6 of 10 ( Start time: 09:51:42 PM ) Total Marks: 1
Each autonomous system used to communicate among autonomous systems by chooses an IGP.
True
False
Question # 7 of 10 ( Start time: 09:52:50 PM ) Total Marks: 1
Which of the following protocols provide the routing information at the autonomous system level?
BGP
OSPF
RIP
Question # 8 of 10 ( Start time: 09:54:16 PM ) Total Marks: 1
Which of the following protocols allows the sender and receiver to enforce polices.
Select correct option:
RIP
OSPF
BGP
Question # 9 of 10 ( Start time: 09:55:47 PM ) Total Marks: 1
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet
Routing Protocol.
True
False
Question # 10 of 10 ( Start time: 09:56:52 PM ) Total Marks: 1
The computer uses _________ to inform Local router about the last application when it leaves.
ICMP
IGMP
SNMP
Question # 1 of 10 ( Start time: 05:14:11 PM ) Total Marks: 1
We use the term _______ to refer to a measure of the path that routing software use when choosing a route.
routing path
routing metric
routing
switching
5 . OSPF is based
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
True
False
In _______ routing, the table is initialized when system boots and there is no further changes.
Select correct option: 2
Dynamic
Static
OSPF does'nt allows a router to introduce routes learned from another means.
True
False
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
True
False
A one-to-many communication between a source and a specific group of hosts is classified as a_______ communication.
Unicast
Multicast
Broadcast
Destination Port
Source port
Logical address
Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.
False
True
Which of the following protocols allows the sender and receiver to enforce polices.
RIP
OSPF
BGP
BGP and RIP
30Bit
32Bit
34Bit
True
False
OSPF has designed as an Exterior Gateway Protocol used to pass routing information among routers within an autonomous system.
Select correct option: F
True
False
In _______ routing, the table is initialized when system boots and there is no further changes.
Dynamic
Static
packet
datagram
message
multiple , multiple
multiple , single
single , single
False
Datalink Layer
Network Layer
CS610-Computer network
Question # 2 of 10 ( Start time: 04:35:26 PM ) Total Marks: 1
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
96
100
120
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost
always used to bind a 32-bit IP address to a ____ Ethernet address.
Answer(48bit)
Select correct option:
For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must
be updated as network topology changes.
Efficiency
Security
Accuracy
Anomalies
Question # 6 of 10 ( Start time: 04:41:15 PM ) Total Marks: 1
_______ is a technique used to Limit datagram size to small MTU of any network
Segmentation
Fragmentation
Encapsulation
Question # 7 of 10 ( Start time: 04:42:37 PM ) Total Marks: 1
Unicasting
Multicasting
Subnetting
When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a
message inside a frame for transport is not called encapsulation.
True
False
Question # 9 of 10 ( Start time: 04:45:12 PM ) Total Marks: 1
Which one of these is not a main feature of connectionless service:
It has universal addressing and the data is delivered in packets frames), each with a header.
Question # 10 of 10 ( Start time: 04:46:42 PM ) Total Marks: 1
ICMP
IGMP
TCP/IP
TCP/IP
IGMP
ICMP
none of the given
Question # 2 of 10 ( Start time: 04:50:45 PM ) Total Marks: 1
Traceability
Reach ability
Both a and b
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
96
100
120
MTU
Size
IP header
Segmentation
Defragmentation
Fragmentation
It has universal addressing and the data is delivered in packets frames), each with a header.
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the
____________ Transmission Unit.
Least
Maximum
Fragment
Frame
IGMP
SNMP
ICMP
IPV4
IPV6
Question # 10 of 10 ( Start time: 04:58:56 PM ) Total Marks: 1
Time to Learn
Time to Leave
Time to Live
none of the given
---------------------------------------
H.LEN shows the header length in units of ____ Bits
34
32
30
None of the given
---------------------------------------------------
There are _______ possibilities to detect the destination using Trace-route
1
2
3
None of the given
----------------------------------------------------
_______ Source is responsible for fragmentation.
IPV4
IPV6
------------------------------------------------
________ encapsulates IP datagram as data area in hardware frame.
32 Bits
64 Bits
128 Bits
none of the given
--------------------------------------------------
_______ shows senders preference for low latency, high Reliability.
:
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
-------------------------------------------------------------
Unicasting
Multicasting
Subnetting
All of the given
-------------------------------------------------------
_____ Protocol provides error reporting mechanism.
IGMP
SNMP
ICMP
none of the given
---------------------------------------------------------
ICMP message transport is acted upon by getting ICMP _________ in IP.
De-encapsulated
Encapsulated
Segmented
none of the given
------------------------------------------------------------
ICMP
IGMP
TCP/IP
none of the given
----------------------------------------------------------------------
When one computer sends an ARP message to another the message travels inside the hardware frame.
Technically, placing a message inside a frame for transport is not called encapsulation.
True
False
---------------------------------------------------
Header contains all information needed to deliver datagram to the destination computer. But which one
of the following is not included:
Destination address
Source address
Rectifier
Other delivery information
IPV4
IPV6
------------------------------------------------------
Network
Transport
Data link
none of the given
-----------------------------------------------------------------
Which one of these is not a main feature of connectionless service:
The process of learning the path MTU is known as path MTU discovery.
True
False
------------------------------------------------------------------
IPv6 ______________ is responsible for fragmentation. Routers simply drop datagram’s larger than
network
Destination
Intermediate routers
Source
Medium
-----------------------------------------------------
IP datagram can contains ________ octets.
0-65,535
1-65,535
1-65,536
none of the given
------------------------------------------------
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
------------------------------------------------
Computer networks are often called -------------- because they use packet technology.
► Ethernet
► Switch networks
► Packet networks
► Star Topology
► Ring Topology
► Bus Topology
An ------------method, the network hardware designers specify how type information is included in the
frame and the value use to identify various frame types.
► Explicit frame type
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication
routing is called___________
► Hierarchal address
► Default route
► Shortest path
► Physical Layer
► Internet Layer
► Transport Layer
► Physical Layer
► Internet Layer
► Transport Layer
________is called an end-to-end protocol because it provides a connection directly from an application
on one computer to an application on a remote computer.
► IP
► UDP
► TCP
► BGP
► OSPF
► RIP
_______ is ideal in a situation where the group is small and all members are attached to contiguous
Local Area Networks.
► Flood-and -Prune
► Configuration-and -Tunneling
► Core-Based Discovery
Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source
address
►3
►2
►1
►0
Protocol addresses are abstractions provided by ___________.
► Hardware
► Software
► Operating system
► Internet
Although message exchange can be used to bind addresses, sending a request for each binding is
hopelessly inefficient.
► True
► False
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
► 32, 48
► 24, 32
► 32, 64
► 32, 128
To save traffic, an EGP does not summarize routing information from the autonomous system before
passing it to another autonomous system.
► True
► False
When an application_______data, it makes a copy of the data available to all other computers on the
network.
► Broadcasting
► Multicasting
► Unicasting
► None of the given
Ethernet uses a _________ bit static addressing scheme in which each device is assigned a unique
address by the manufacturer.
► 64
► 48
► 32
►8
The product of delay and throughput measures the _____ of data that can be present on the network.
► Area
► Volume
► Length
Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary interaction
and operating system independent are the characteristics of _____________
► TCP
► UDP
► IP
► TCP
► UDP
► IP
The process of using a routing table to select a next hop for a given datagram is called_________
► Encapsulation
► Reassembling
► Routing or forwarding
► BGP
► OSPF
► RIP
A multicast routing scheme in which the protocol software builds a delivery tree from a central point is
called__________
One repeater _______two repeaters ________ the maximum cable length limitation.
► doubles, cancel
► doubles, triple
► and, triple
Whenever it handles a packet, IP software needs to separate the destination address into a _________
and ___________.
► postfix, Infix
► non of these
► Infix, prefix
► prefix, suffix
► True
► False
► True
► False
We use the term _______ to refer to a measure of the path that routing software use when
choosing a route.
► routing path
► routing metric
► routing
► switching
------ Program sends a message to a remote computer and reports whether the computer responds.
► Ping
► Ping
Ping
► Traceroute
► ICMP
► Ping
► Trace route
The term----- ------- refers to the general concept of a small block of data
► Packet
► Packet
► Frame
► Data
► Parity
► Parity
► Checksums
► CRC
► None of given
► Bus topology
► Bus topology
► Ring topology
► Star topology
► TOKEN PASSING
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the
manufacturer.
► 64
► 64
► 48
► 32
►8
Question No: 9 ( Marks: 1 ) - Please choose one
Formally named __________ informally known as the thick wire Ethernet or Thick net.
► 10 Base T
► 10 Base 2
► 10 Base 5
► 10 Base T
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 2
► 10 Base 5
► 10 Base T
► 500 meters
► 250 meters
► 500 meters
► 700 meters
► Forward a frame
► Extend a LAN
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
► Dijksta’s algorithm
► Greedy algorithm
► Dijksta’s algorithm
__________is used for compressed audio and video where the data rate depends on the level of
compression that can be achieved.
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
The product of delay and throughput measures the _____ of data that can be present on the network.
► Volume
► Length
► None of the given
A network with throughput T and delay D has a total of ________ bit in transit at any time.
►TxD
►T/D
►TxD
►T+D
One repeater _______, two repeaters ________ the maximum cable length limitation.
► doubles, triple
► doubles, triple
► doubles, cancel
► Star Topology
► Star Topology
► Ring Topology
► Bus Topology
Computers attached to an ethernet use ------ in which a computer waits for the ether to be idle before
transmitting a frame.
► TOKEN PASSING
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
No error detection scheme is perfect because transmission errors can affect the additional information as
well as the data.
► True
► False
------ Program sends a message to a remote computer and reports whether the computer responds.
► Ping
Ping
► Traceroute
► ICMP
► Non of the given
---------- was especially concerned about the lack of high powered computers.
► ARPA
► IEEE
► EIA
The term -------- is used to denote the definition of a packet used with a specific type of network.
► Packet
► Frame
► Data
► None of the given
Computer networks are often called -------------- because they use packet technology.
► Ethernet
► Switch networks
► Packet networks
-------------- have advantages arisen from the size and ease of computation.
► CRC
► Parity
► Checksums
► None of given
Most LANs that employ ring topology use an access mechanism known as-------
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
► 8 octets
► 8 bytes
► 8 bits
► None of the given
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
► 10 Base T
An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals
according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
► Physical (MAC)
► Data link
► Network
► Filter a frame
► Forward a frame
► Extend a LAN
A Bridge forwards or filters a frame by comparing the information in its address table to the
frame’s__________
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
► Greedy algorithm
► Dijksta’s algorithm
___________ is used for audio and video, since these have predefined maximum data rates
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .
►T/D
►TxD
►T+D
► Twisted Pair
► Coaxial
► Radio Frequency
► Fiber
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
Ethernet uses a__________________ static addressing scheme in which each device is assigned a unique
address by the manufacturer.
x 64 x 48
x 32 x 8
The -----------bit preamble in the Ethernet frame format that precedes the frame contains alternating 1s and
0s that allow the receiver’s hardware to synchronize with the incoming signal.
x 64
x 32
16 x
8
The third field of the header consists of -------bit Ethernet frame type.
x 48 x 32
x 16 x 8
x BNC- t base 10
x RJ 45- t base 10
x BNC-t base 5
x RJ 45-t base 2
A bridge uses the_____________to determine which computers connect to which segment, and uses the to
determine whether to forward a copy of frame.
x Source , destination
x Source , source
x Destination, source
x 10 Base 2 x 10
Base 5 x 10
Base T
x 10 Base 2 x 10
Base 5 x 10
Base T
circuitry that allows the NIC to operate independent of the CPU.
x None of the given
x Multiplexer
x Transceiver
A system with redundant bridges might have a problem with________in the system.
x Loop
x Filters
x Spamming
x All above
ABridgecan
x Filter a frame
x Forward a frame x
Extend a LAN
Private Network
Isochronous Network
Asynchronous Network
ATM assigns each VC a_______________identifier that is divided two parts to produce a hierarchy.
x 21-bit
x 22-bit
x 23-bit
x 24-bit
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication
routing is called________________________________________________________________________
x Hierarchal address
x Default route
x Shortest path
x Packet’s destination
When an application-------------------data, it makes a copy of the data available to all other computers on the
network?
x Broadcasting
x Multicasting
x Unicasting
sense a signal on one cable and then transmits an amplified copy on the other cable.
x Repeater
x Bridge
x Hub
ThemaximumsizeofanEthernetsegmentis
x 250 meters x 500
meters x 700
meters
Computers attached to an ether use ------------------in which a computer waits for the ether to be idle before
transmitting a frame.
x CSMA/CD x CSMA/CA
x TOKEN PASSING
x CRC
x Parity
x Checksums
x None of given
The term ---------is used to denote the definition of a packet used with a specific type of network.
x Packet
x Frame
x Data
x Ping
x Trace route
x ICMP
In --------------, network occupies the smaller area like a room a floor or a building
x LAN
x WAN
x MAN
x None of the given
x LAN
x WAN
x MAN
No error detection scheme is perfect because transmission errors can affect the additional information as
well as the data.
x False
x True
The product of delay and throughput measures the --------of data that can be present on the network.
x Area
x Volume
x Length
is used for compressed audio and video where the data rate depends on the level of
compression that can be achieved.
x Bridge
x Repeater
x Hub
x Data link
x Network
by comparing the information in its address table to the
x Physical (MAC) and Data link
IEEE LLC/SNAP header is ---------, which is used to specify the type of data.
x 8 octets
x 8 bytes
x 8 bits
An --------------method, the network hardware designers specify how type information is included in the
frame and the value use to identify various frame types.
x Star topology
x Bus topology
x Ring topology
x 10 Mbps
x 100 Mbps
x 1000 Mbps
-----------scheme, which is designed to help detect transmissions errors, send one extra bit of information
with each character
x Parity
x Checksums
x CRC
x None of given
Computer networks are often called ---------------because they use packet technology.
x Ethernet
x Switch networks
x Packet networks
-------Program sends a message to a remote computer and reports whether the computer responds.
x Ping
x Traceroute
x ICMP
x Star Topology
x Ring Topology
x Bus Topology
An interface for thin Ethernet must have an__________________ connector, and must generate signals
according to the______________specification.
x RJ-45, 10 Base T x
RJ-45, 10 Base 5 x
BNC, 10 Base 2 x BNC,
10 Base T
x Physical Layer
x Internet Layer
x Transport Layer
protocols of TCP/IP layering model specify how to ensure reliable transfer.
x Physical Layer
x Internet Layer
x Transport Layer
x IP
x UDP x TCP
x BGP
x OSPF
x RIP
is ideal in a situation where the group is small and all members are attached to contiguous Local
Area Networks.
x Flood-and -Prune
x Configuration-and -Tunneling
x Core-Based Discovery
Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source
address
x 3 x 2 x
1 x0
x hardware
x software
x operating system
x internet
Although message exchange can be used to bind addresses, sending a request for each binding is
hopelessly inefficient.
x True
x False
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
x 32, 48 x 24,
32 x 32, 64 x
32, 128
In the 1970s large organizations began to acquire multiple networks. Each network in the organization
formed island. Employees needed to choose a computer appropriate for each task. So they needed
x False
x True
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
xT xD x
C
x T, C
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange? x T
xC xD
x C, D
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
x T, C
x T x C x
D
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
x T, D x c
xT
x T, C
The general form of an IP datagram is with a header followed by data. The header contains information that
controls where and how the datagram is to be sent.
x True
x False
To save traffic, an EGP does not summerize routing information from the autonomous system before
passing it to another autonomous system.
x True x False
x IEEE
x APRA
x EIA
x None
x True x False
x Packets
x Data x Fram
x None of given
x True x False
The network that uses a -------------, usually consist of a single long cable to which computer attach.
x Ring topology
x Star topology
x Bus topology
x Ring topology
A bridge uses ----------------to determine which computer is connected to which segment, and uses the -----
x Isochronous Network
x Asynchronous Network
The network with Throughput T and Delay D has a total ----------------bits in transit at a time.
xD + T xD –
T xD X T xD
/T
One repeater -----------------, two repeaters --------------the maximum cable length limitation.
x half, triple
x Double, half
x True
x False
x True
x False
x True
x False
x Hub
x Switch
x Router
Aroutingtablecontains
x Dynamic routing x
Static routing
x Address resolution x
None of the given
x OSPF
x MEOSPF
x MOSPF
NAPTstandsfor
x True
x False
x 30Bit x
32Bit x
34Bit
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
x True
x False
x IP
x UDP x TCP
x door
x window
x acknowledgment
x retransmission
IGPs stand for
x IGP x
BGP x RIP
measures distance in network hops, where each network between the source and destination
counts as single hop.
x BGP
x OSPF
x RIP
x Non of these
x True
x False
We use the term____________to refer to a measure of the path that routing software use when choosing a
route.
x routing path
x routing metric
x routing
x switching
x 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255
x 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255
x 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256
x 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255
Part of the 3-way handshake used to create a connection, requires each end to generate a random ---------
sequence number.
x 32 bit
x 16 bit
x 8 bit
x 64 bit
x True x False
x Transport x
Network x
Physical
x Internet
is ideal in a situation where the group is small and all members are attached to contiguous
Local Area Networks.
x Flood-and -Prune
x Configuration-and -Tunneling
x Core-Based Discovery
In Direct point to point communication adding the Nth computer requires-------------new connections.
xN 2
x N-1
x (N2 –N)/2
The number of connections needed for N computer in direct point to point communication is equal to:
x (N2-N)/2
x N(N-1)
xN 2
x 10 Mbps
x 100 Mbps
x 1000 Mbps
x Greedy algorithm
x Dijksta’s algorithm
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a ---------.
An Internet Address (IP address) is a unique____________binary number assigned to a host and used for
all communication with host
x 48-bit
x 32-bit
x 24-bit
The address_____________ identifies the physical network to which the computer is attached, while the
identifies an individual computer on that network.
x prefix , suffix
x suffix , prefix
x suffix , suffix
x Class A x
Class B x
Class C x
Class D
x Class A x
Class B x
Class C x
Class D
x Class A x
Class B x
Class C x
Class D
x FLAGS
x FLAGMENT OFFSET
x IDENTIFICATION
x TCP x
UDP x
IP
x Physical
x Data link
x Network
x Transport
identifies which application program on receiving computer should receive the data
Logical address
§ Source port
§ Source port
§ Destination Port
§ None of the given identifies the application program that
sent the data.
§ Destination Port
§ Source port
§ Logical address
x None of the given
x UDP x TCP
Which of the following protocols allows the sender and receiver to enforce polices.
x RIP
x OSPF
x BGP
x True x False
Thesepacketsservesamepurposeon____________________as frames on
x Intranet, LAN x
Internet, WAN x
Intranet, WAN x
Internet, LAN
x True
x False
A computer attached to a given network can only communicate with other computers attached to the same
network. Is this a problem with multiple networks?
x True
x False
The term self-identifying is used for Classful IP addresses because the class of the address can be
computed from the address__________.
x itself
x prefix
x suffix x mask
x A x C x
E xB
Find the class of the address.
xA xB
xE
xC
x consistency
x inconsistency
x stability
x dynamic addressing
Propagation multicast routing information differs dramatically from unicast route propagation?
x True
x False
The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast
group at any time. While_______________application on a computer remain a member of a group.
x one or more
x only one
x no Å
x many
In IPv6 the type of address used for collection of computers with same prefix. Are known as__________.
x Anycast
x Unicast
x Multicast
Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as .
x Unicast
x Anycast
x Multicast
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to
preserve data boundaries.
x True
x False
x Distance to destination
x non of these
Cost, effort, risks, and resources are the factors included in--------
x Estimation x
Testing
x Development x
Maintenance
Quiz_12_07_2010
§ 1
§ 2
§ 3
§ None of the given
is used for single destination computer.
§ Multicast
§ Broadcast
§ unicast
x none of the given
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware
addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
x 16-bit x 48-bit
x 64-bit
x 128-bit
x Source quench
x Time exceeded
x Destination unreachable
x Cluster
x unicast
x Multicast
IPv6_________________ is responsible for fragmentation. Routers simply drop datagram’s larger than
network
x Destination
x Intermediate routers
x Source x Medium
x IPV4 x IPV6
x TCP/IP x
IGMP x ICMP
x FLOW LABEL
x TRAFFIC CLASS x
Both a and b
Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction &
operating system independent are the characteristics of_________________________________________
x TCP x
UDP x
IP
The process of using a routing table to select a next hop for a given datagram is called
x Encapsulation x Reassembling
x Routing or forwarding
x None of the given
A multicast routing scheme in which the protocol software builds a delivery tree from a central point is
called________________________________________________________________________________
Whenever it handles a packet, IP software needs to separate the destination address into a____________
and_____________.
x Infix, prefix
x prefix, suffix
x TCP x
UDP x
IP
x IGMP x
SNMP x
ICMP
§ Time to Learn
§ Time to Leave
§ Time to Live
§ none of the given
layer Provides reliable delivery of datagram.
x Network
x Transport x
Datalink
x ICMP x IGMP
x TCP/IP
x Traffic class
x Flow label
x Destination address
NEXT HEADER field in the base header defines type of header it appears at the end of fixed-size base
header.
x TRUE
x FALSE
Every hardware technology specification includes the definition of the maximum size of the frame data
area, which is called the______________Transmission Unit.
x Least
x Maximum
x Fragment
x Frame
x TRUE
x FALSE Æ Prefix
x Header
x Segmentation
x Defragmentation x
Fragmentation
x 22 years
x none of given
x TRUE
x FALSE
x TYPE
x SERVICE TYPE
x SERVICE PRIORITY
TheNetworkLayerProtocolICMPstandsfor
x 32 Bits x 64
Bits x 128 Bits
x Segmentation x
Fragmentation x
Encapsulation
x De-encapsulated x
Encapsulated x
Segmented
IETFstandsfor
Which of the following protocols provide the routing information at the autonomous system level?
x BGP
x OSPF
x RIP
Aone-to-manycommunicationbetweenasourceandaspecificgroupofhostsisclassifiedasa communication.
x Unicast
x Multicast
x Broadcast
includes a 32-bits address mask with each address, which allows the address to be classful,
classless, or subnetted.
x RIP
x OSPF
x BGP
x BGP x
IGP x EGP
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
x True
x False
Each autonomous system used to communicate among autonomous systems by chooses an IGP.
x True
x False
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet
Routing Protocol.
x True x False
The computer uses___________to inform Local router about the last application when it leaves.
x ICMP x
IGMP x
SNMP
x 96 x 100
x 120
For_______________, information about forwarding is stored in a routing table, which is initialized at system
initialization and must be updated as network topology changes.
x Efficiency x
Security x
Accuracy x
Anomalies
x Unicasting
x Multicasting
x Subnetting
When one computer sends an ARP message to another the message travels inside the hardware frame.
Technically, placing a message inside a frame for transport is not called encapsulation.
x True
x False
x It has universal addressing and the data is delivered in packets frames), each with a header. x
It combines collection of physical networks into a single virtual network.
x It has universal addressing and the data is delivered in packets frames), without a header.
Which one is NOT the function of ping program
x Traceability
x Reach ability
x Both a and b
x MTU
x Size
x IP header
x True x False
x False x True
The process of learning the path MTU is known as path MTU discovery.
x True
x False
x TCP x
UDP x
IP
x Host sufix
x Host prefix
x source Prefix
x True x
False
The routers within an autonomous system use a______________to exchange routing information.
datagram
TCP
propagation
True
A one-to-many communication between a source and a specific group of hosts is classified as a_______communication
identifies the application program that sent the data.
None
Unicasting
multi cast
routing table
The computer uses___________to inform Local router about the last application when it leaves.
IGMP
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of
Internet Routing Protocol
True
sec(s)
A one-to-many communication between a source and a specific group of hosts is classified as a_______communication
Multicasting
Su bnetting
Question # 1 of
10 ( Start time:
04:33:55 PM )
encap
sulates IP
datagram as
data area in
hardware frame.
Select correct
option:
Network Layer
FLOW LABEL
TRAFFIC CLASS
Both a and b
96
100
120
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware
addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Answer
(48bit)
Efficiency
Security
Accuracy
Anomalies
Segmentation
Fragmentation
Encapsulation
correct option:
Unicasting
Multicasting
Su bnetting
When one computer sends an ARP message to another the message travels inside the
hardware frame. Technically, placing a message inside a frame for transport is not called
encapsulation.
False
correct option:
It has universal addressing and the data is delivered in packets frames), each with a header.
It has universal addressing and the data is delivered in packets frames), without a header.
IGMP
TCP/IP
TCP/IP
IGMP
ICMP
Traceability
Reach ability
Both a and b
96
100
120
Question # 4 of 10 ( Start time: 04:52:32 PM ) Total Marks: 1
MTU
Size
IP header
Segmentation
Defrag mentation
Fragmentation
None of the given
correct option:
It has universal addressing and the data is delivered in packets frames), each with a header.
It has universal addressing and the data is delivered in packets frames), without a header.
Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the_____________Transmission Unit.
Least
Maximum
Fragment
Frame
correct option:
IGMP
SNMP
ICMP
I PV4
www.virtualinspire.com
I PV6
Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the____________Transmission Unit.
Least
Maximum Fragment
www.virtualinspire.com
Frame
IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
Cluster
unicast
Multicast
FLOW LABEL
TRAFFIC CLASS
Both a and b
TCP/IP
IGMP ICMP
IGMP
SNMP
www.virtualinspire.com
ICMP
One of the parameters, which motivated IP for change is address space. The____________
address space allows for over a million networks. But most networks are class C and too small
for many organizations.
32-bit
128-bit
16-bit
64-bit
De-encapsulated
Encapsulated
Segmented
Unicasting
Multicasting
Su bnetting
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
ICMP
IGMP
TCP/IP
www.virtualinspire.com
none of the given
Traffic class
Flow label
Destination address
I PV4 I PV6
correct option:
Unicasting
Multicasting
Su bnetting
www.virtualinspire.com
All of the given
Efficiency
Security
Accuracy
Anomalies
Header contains all information needed to deliver datagram to the destination computer. But
which one of the following is not included:
Destination address
Source address
Rectifier
Encapsulated
Segmented
correct option:
Connection oriented
Connectionless
both a and b
One of the parameters, which motivated IP for change is address space. The____________
address space allows for over a million networks. But most networks are class C and too small
for many organizations.
Select correct option:
32-bit
128-bit
16-bit
64-bit
Question # 10 of 10 ( Start time: 10:37:07 PM ) Total Marks: 1
True
False
Unicasting
Multicasting
Subnetting
Time Left 83
sec(s)
Question # 2 of
10 ( Start time:
09:23:54 PM )
Select correct
option:
Time Left
3
9
www.virtualinspire.com
s
e
c
(
s
)
Question # 3 of
10 ( Start time:
09:24:23 PM )
ICMP message
transport is acted
upon by getting
ICMP_________________________
in IP.
Select correct
option:
www.virtualinspire.com
De-encapsulated
Encapsulated
Segmented
Time Left 6
s
e
c
(
s
)
Question # 5 of 10
Total Marks: 1
( Start time:
09:27:02 PM )
Routers use________
to forward
datagrams along
prearranged path.
www.virtualinspire.com
Select correct
option:
Traffic class
Flow label
Destination
address
“doubt”
none of the
given
www.virtualinspire.com
Header
Data Area
Identifier
www.virtualinspire.com
field tells the receiver how to order fragments within a given datagram.
FLAGS
FLAGMENT OFFSET
Time Left 19
sec(s)
www.virtualinspire.com
Quiz Start Time: 09:22 PM
Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the______________Transmission Unit.
Least
Click here to Save A n sw e r & Move to Next Question
Maximum
Fragment
Frame
96
www.virtualinspire.com
sec(s)
Encapsulated
Segmented
a
www.virtualinspire.com
r
L
www.virtualinspire.com
e
Question # 5 of 10
( Start time:
09:27:02 PM )
Total Marks: 1
Routers use_________
to forward
datagrams along
prearranged path.
Select correct
option:
www.virtualinspire.com
Traffic class
Flow label
sec(s)
Header
Data Area
Identifier
field tells the receiver how to order fragments within a given datagram.
FLAGS
FLAGMENT OFFSET
Every hardware technology specification includes the definition of the maximum size of the
frame data area, which is called the______________Transmission Unit.
Least
Maximum
Fragment
Frame
BGP
RIP
Efficiency
Accuracy
Reliability
Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.
False
True
Time Left 49
sec(s)
Quiz Start Time: 07:18 PM
TCP provides___________communication.
Half-duplex
transmission
propagation
communication
True
False
A standard protocol exits that allows a host to inform a nearby router whenever the host needs to join or leave a particular
multicast group is known as__________.
IGMP
OSPF
BGP
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct opti on:
True
False
TTLstandsfor Select
correct option:
Time to Learn
Time to Leave
Time to Live
none of the given
---------------------------------------
34
32
30
None of the given
---------------------------------------------------
1
2
3
----------------------------------------------------
None of the given
----------------------------------------------------
www.virtualinspire.com
I PV4 I PV6
------------------------------------------------
----------------------------------------------
32 Bits 64
Bits 128
Bits
none of the given
--------------------------------------------------
TYPE
SERVICE TYPE
www.virtualinspire.com
SERVICE PRIORITY
None of the given
www.virtualinspire.com
------------------------------------------------------------ -
Unicasting
Multicasting
Su bnetting
-------------------------------------------------------
IGMP
SNMP
ICMP
---------------------------------------------------------
De-encapsulated
Encapsulated
Segmented
------------------------------------------------------------
www.virtualinspire.com
Question # 5 of 10 ( Start time: 06:19:01 PM ) Total Marks: 1
Which protocol is used to test different tools.
ICMP
IGMP
TCP/IP
--------------
When one computer sends an ARP message to another the message travels inside the
hardware frame. Technically, placing a message inside a frame for transport is not called
encapsulation.
True
False
---------------------------------------------------
---------------------------------------------- -
Header contains all information needed to deliver datagram to the destination computer. But
which one of the following is not included:
www.virtualinspire.com
Select correct
option:
www.virtualinspire.com
Destination address
Source address
Rectifier
Other delivery information
--------------------------------------------------------------
I PV4 I PV6
------------------------------------------------------
Question # 10 of 10 ( Start time: 06:23:29 PM ) Total Marks: 1 layer Provides reliable delivery
of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
-----------------------------------------------------------------
-----------------------------------------------------------------
True False
------------------------------------------------------------------
Destination
Intermediate routers
Source
Medium
-----------------------------------------------------
------------------------------------------------
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
------------------------------------------------
32
Segmentation
Defrag mentation
Fragmentation
---------------------------------------------
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
Question # 1 of 10 ( Start time: 09:22:58 PM ) Total Marks: 1 Class A mask is 255.0.0.0 which is
used for___________________________________ Select correct option:
www.virtualinspire.com
Unicasting
Multicasting
Su bnetting
De-encapsulated
Encapsulated
Segmented
Traffic class
Flow label
Header
Data Area
Identifier
FLAGMENT OFFSET
Least
Maximum
Fragment
www.virtualinspire.com
Frame
www.virtualinspire.com
Question # 1 of 10 ( Start time: 04:33:55 PM )
Datalink Layer
Network Layer
correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
96
100
120
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware
addresses. ARP is almost always used to bind a 32-bit IP address to a____________________Ethernet
address.
Answer
(48bit)
Efficiency
Security
is a technique used to Limit datagram size to small MTU of any network Select
correct option:
Segmentation
Fragmentation
Encapsulation
correct option:
www.virtualinspire.com
Unicasting
Multicasting
Subnetting
When one computer sends an ARP message to another the message travels inside the hardware frame.
Technically, placing a message inside a frame for transport is not called encapsulation.
True
www.virtualinspire.com
option:
It has universal addressing and the data is delivered in packets frames), each with a header.
It has universal addressing and the data is delivered in packets frames), without a header.
IGMP
correct option:
TCP/IP
IGMP
ICMP
Traceability
Reach ability
Both a and b
correct option:
96
www.virtualinspire.com
MTU
Size
IP header
Segmentation
Defragmentation
Fragmentation
option:
It has universal addressing and the data is delivered in packets frames), each with a header.
Every hardware technology specification includes the definition of the maximum size of the frame
data area, which is called the______________________Transmission Unit.
Least
Maximum
Fragment
Frame
SNMP
IPV4
IPV6
Stands for_______________
Every hardware technology specification includes the definition of the maximum size of the frame
data area, which is called the___________________Transmission Unit.
Least
Maximum
Fragment
Frame
correct option:
96
100 120
is a type of address used for collection of computers with same prefix. Select
correct option:
Cluster
unicast
Multicast
correct option:
correct option:
TCP/IP
IGMP
ICMP
ICMP
One of the parameters, which motivated IP for change is address space. The__________________
address space allows for over a million networks. But most networks are class C and too small for many
organizations.
32-bit
128-bit
16-bit 64-
bit
De-encapsulated
Encapsulated
Unicasting
Multicasting
Subnetting
option:
56kbps to 5 12kbps 5
12kbps to 1gbps
56kbps to 1gbps
ICMP
IGMP
TCP/IP
Traffic class
Flow label
Destination address
IPV4
IPV6
correct option:
Unicasting
Multicasting
Subnetting
Efficiency
Security
Accuracy
Anomalies
www.virtualinspire.com
Header contains all information needed to deliver datagram to the destination computer. But which
one of the following is not included:
Destination address
Source address
Rectifier
De-encapsulated
Encapsulated
Segmented
Connectionless
both a and b
One of the parameters, which motivated IP for change is address space. The_________________
address space allows for over a million networks. But most networks are class C and too small for many
organizations.
32-bit
128-bit
16-bit 64-
bit
True
False
www.virtualinspire.com
Time Left
84
sec(s)
Question # 1 of 10 (
Start time:
09:22:58 PM Total Marks: 1
)
Subnetting
Q
u
i
z
S
t
a
r
t
T
i
m
e
:
0
www.virtualinspire.com
9
:
2
2
P
M
Time Left
83
sec(s)
Question # 2 of 10 (
Start time:
09:23:54 PM
T
otal
Ma
rks:
1
IPV6
addr
ess
with
lea
din
g
zer
os
is
int
erp
ret
ed
to
www.virtualinspire.com
hol
d
an
IPV
4
add
res
s.
Select
correct
option:
www.virtualinspire.com
96
100
120
Time Left
39
sec(s)
www.virtualinspire.com
Question # 3 of 10 (
Start time:
09:24:23 PM
Total Marks: 1
ICMPmessagetransportisacteduponbygettingICMP in IP.
De-encapsulated
Encapsulated
Segmented
Time Left
6
sec(s)
Question # 5 of 10 (
Start time:
09:27:02 PM
Total Marks: 1
Routers use__________
to forward
datagrams along
prearranged path.
Select
correct
option:
www.virtualinspire.com
Traffic
class
Flow label
Destination address “doubt”
Question # 6 of 10 (
Start time:
09:28:29 PM
)
Total Marks: 1
Time Left
62
sec(s)
Question # 7 of 10 (
Start time:
09:28:57 PM
)
Total Marks:
1.
Preliminary version of IP was called______________
Time Left
49
sec(s)
Question # 8 of 10 (
Start time:
09:29:50 PM
T
otal Marks: 1 containsall
informationneededtodeliver
datagramtothedestination.
Sele
ct
corr
ect
opti
on:
Header
www.virtualinspire.com
Data
Area
Identifie
r
www.virtualinspire.com
Q
u
i
z
S
t
a
r
t
T
i
m
e
:
0
9
:
2
2
P
M
www.virtualinspire.com
Time Left
39
sec(s)
Question # 9 of 10 (
Start time:
09:31:17 PM
T
otal
Marks: 1
fieldtellsthe
receiverhowto
order
fragments
withinagiven
datagram.
Select
correct
option:
www.virtualinspire.com
FLAGMENT OFFSET
IDENTIFICATION
“not confirm”
Time Left
19
sec(s)
www.virtualinspire.com
Question # 10 of 10 (
Start time:
09:32:47 PM
www.virtualinspire.com
Total Marks:
1
Every hardware technology specification includes the definition of the maximum size of the
Least
Maximum
Fragment
Frame
0-65,535
1-65,535
1-65,536
Total Marks: 1
Question # 3 of 10 ( Start time: 10:31:42 PM )
Traffic class
Flow label
Destination address
IPV4
IPV6
The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False
Size
IP header
Network
Transport
Datalink
None ofall
contains the given
information needed to Total Marks: 1
deliver datagram to the destination.
Question # 9 of 10 ( Start time: 10:34:21 PM )
Select correct option:
Header
Data Area
Identifier
IPv6___________is responsible for fragmentation. Routers simply drop datagram’s larger than network
Select correct option:
Destination ►21-bit
► Asynchronous Network
►None of given
FDDI can transmits data at a rate of -----100 million bits per
second -----
[email protected]
Question No: 12 ( Marks: 1 ) - Please choose one Question No: 15 ( Marks: 1 ) -
Please choose one
►LAN
►Frame
►WAN
►MAN
►Data
►None of the given
Question No: 16 ( Marks: 1 ) -
►None of the given Please choose one
►Ping ►
[email protected]
Question No: 3 Question No: 8
Ethernet uses a ------ bit static addressing scheme in which The process of using a routing table
each device is assigned a unique address by the manufacturer. to select a next hop for a given
► 64 ► 48 ► 32 datagram is called_________ ►
Encapsulation ► Reassembling ►
►8 Routing or forwarding ► None of the
given
Question No: 4
Question No: 9
( Marks: 1 ) - Please choose one
( Marks: 1 ) - Please choose one
A system with redundant bridges might have a problem
with_______ in the system. ► Loop ► Filters ► Spanning ____________ uses distance vector
Trees ► All given choices approach to define routing ► BGP
► postfix, Infix ► non of these ► Infix, prefix ► prefix, ( Marks: 1 ) - Please choose one
suffix
Which method of Address Resolution
Question No: 13 Protocol is useful with any hardware?
Were "T" stands for Table lookup,
( Marks: 1 ) - Please choose one "C" for Closed-form Computation
and "D" for Data Exchange?
Although message exchange can be used to bind addresses,
sending a request for each binding is hopelessly inefficient. ► ►T ►C ►D ► C, D
True ► False
Question No: 19
Question No: 14
( Marks: 1 ) - Please choose one
( Marks: 1 ) - Please choose one
In which method of Address
ARP is almost always used to bind a ___-bit IP address to a Resolution Protocol the protocol
___-bit Ethernet address. ► 32, 48 ► 24, 32 ► 32, 64 ► 32, address is determined by hardware
128 address? Were "T" stands for Table
lookup, "C" for Closed-form
Question No: 15 Computation and "D" for Data
Exchange? ►T ►D ►C ► T, C
( Marks: 1 ) - Please choose one
Question No: 20
End-to-end delivery service is connection oriented. ►
True ► False ( Marks: 1 ) - Please choose one
Although message exchange can be used to bind addresses, ( Marks: 1 ) - Please choose one
sending a request for each binding is hopelessly inefficient. ►
True ► False To save traffic, an EGP does not
summerize routing information from
Question No: 15 the autonomous system before
passing it to another autonomous
( Marks: 1 ) - Please choose one system. ► True ► False
[email protected]
Question No: 1 ( Marks: 1 ) - Please choose one ►Bridge
►Repeater
A typical port on an ATM switch operates at __________ or higher.
►Hub
► OC-2 speed (155Mbps)
►All the given
► OC-3 speed (100Mbps)
► OC-3 speed (155Mbps)
Question No: 5 ( Marks: 1 ) -
► OC-3 speed (155Gbps) Please choose one
__________is used for compressed audio and video where the data ►8 bytes
rate depends on the level of compression that can be achieved. ►8 bits
►Constant Bit Rate (CBR) service ►None of the given
►Variable Bit Rate (VBR) service
►Available Bit Rate (ABR) service
Question No: 7 ( Marks: 1 ) -
►None of the given Please choose one
►Switch networks
►Star topology
►Bus topology
►Packet networks
►Ring topology
►None of the given
►None of the given
The Fast Ethernet hardware operates at a rate of -------- ------ Program sends a message to a
remote computer and reports whether the
►10 Mbps computer responds.
►100 Mbps ►Ping
►1000 Mbps Ping
►None of the given ►Traceroute
►ICMP
Question No: 11 ( Marks: 1 ) - Please choose one ►Non of the given
[email protected]
Question No: 14 ( Marks: 1 ) - Please choose one ► None of the given
[email protected]
Question No: 4 ( Marks: 1 ) - Please choose one available to all other computers on the
network.
[email protected]
►100 million bits per second ►Data
►None of the given
►None of the given
►Checksums ►Ping
Ping
The term -------- is used to denote the definition of a packet used Question No: 15 ( Marks: 1 ) -
with a specific type of network. Please choose one
[email protected]
►LAN It is computed as delay time
multiplied by effective throughput. It
►WAN
measures amount of data that can be
►MAN present in the network.
►None of the given Question No: 3 ( Marks: 1 ) -
Please choose one
__________is used for compressed
Question No: 16 ( Marks: 1 ) - Please choose one audio and video where the data rate
depends on the level of compression
that can be achieved.
No error detection scheme is perfect because transmission errors
Constant Bit Rate (CBR)
can affect the additional information as well as the data.
service►
► False Variable Bit Rate (VBR)
service►
►
Available Bit Rate (ABR)
service►
None of the given►
MIDTERM EXAMINATION
Fall 2008 VARIABLE BIT RATE (VBR):
CS610- Computer Network It is used for compressed audio and
video where the data rate depends on
the level
Question No: 1 ( Marks: 1 ) - Please choose one of compression that can be achieved.
A typical port on an ATM switch operates at __________ or Question No: 4 ( Marks: 1 ) -
higher. Please choose one
► OC-2 speed (155Mbps) Which of the following is a
► OC-3 speed (100Mbps) connecting device?
► OC-3 speed (155Mbps)
Bridge►
► OC-3 speed (155Gbps)
Repeater►
ATM DETAILS: Hub►
· It transmits data at over 100Mbps. All the given►
• It uses fiber optics to connect computer to switch.
• Each connection includes two fibers. Question No: 5 ( Marks: 1 ) -
• It is also shown in figure. Please choose one
Question No: 2 ( Marks: 1 ) - Please choose one A bridges function in the _________
The product of delay and throughput measures the _____ of layers(s).
data that can be present on the network. Physical (MAC)►
Data link►
► Area
Network►
► Volume
► Length Physical (M►AC) and Data link
► None of the given
Switches and bridges use MAC
DELAY THROUPUT PRODUCT: addressing to make networking
[email protected]
decisions and therefore these types of equipment function on Question No: 10 ( Marks: 1 ) -
the data link layer. Please choose one
The Fast Ethernet hardware operates
Question No: 6 ( Marks: 1 ) - Please choose one at a rate of --------
IEEE LLC/SNAP header is --------, which is used to specify 10 Mbps►
the type of data. 100 Mbps►
8 octets► 1000 Mbps►
8 bytes► None of the given►
8 bits►
None of the given► The Ethernet speed was originally
3Mbps, and the current standard is
Question No: 7 ( Marks: 1 ) - Please choose one 10Mbps
the fast Ethernet operates at
The third field of the header consists of ------ bit Ethernet 100Mbps. There are also gigabits
frame type. Ethernet available now
48► Question No: 11 ( Marks: 1 ) -
32► Please choose one
16► ---------- scheme, which is designed
8► to help detect transmissions errors,
send one extra bit of information with
Question No: 8 ( Marks: 1 ) - Please choose one each character
►Parity
An ------------method, the network hardware designers specify Checksums►
how type information is included in the frame and the value CRC►
use to identify various frame types. None of given►
Explicit frame type►
Ideal frame type► Question No: 12 ( Marks: 1 ) -
Implicit frame type► Please choose one
None of the given► Computer networks are often called
-------------- because they use packet
EXPLICIT FRAME TYPE: technology.
In this type the identifying value is included with frame
describes types of included data. ►Ethernet
Question No: 9 ( Marks: 1 ) - Please choose one ►Switch networks
Local Talk is a LAN technology that employs -------------
►Packet networks
Star topology►
Bus topology► ►None of the given
Ring topology►
None of the given► Question No: 13 ( Marks: 1 ) -
Please choose one
Almost altogether network technologies use different wiring -----Program sends a message to a
schemes. e.g., local talk uses hubs remote computer and reports whether
(physical star) to simulate a bus topology. the computer responds.
►Ping
[email protected]
►Traceroute Connectionless service
►ICMP paradigm►
►Non of the given ►Connection oriented service
Ping program tests reachability. It sends datagram from B to paradigm
A, that echoes back to B. it uses ICMP echorequest and echo Both Connectionless and Connection-
reply messages. oriented service paradigm►
Question No: 14 ( Marks: 1 ) - Please choose one
In ---------, network occupies larger areas like cities & None of the given►
countries.
►LAN Question No: 3 ( Marks: 1 ) -
Please choose one
►WAN ATM assigns each VC a
►MAN _____________ identifier that is
►None of the given divided two parts to produce a
hierarchy.
WIDE AREA NETWORK (WAN): 21-bit►
It is used for a country level networking and even for 22-bit►
continents. 23-bit►
Question No: 15 ( Marks: 1 ) - Please choose one 24-bit►
In -------------, network occupies the smaller area like a room
a floor or a building Question No: 4 ( Marks: 1 ) -
Please choose one
►LAN Most WAN systems include a
►WAN mechanism that can be used to
►MAN eliminate the common case of
►None of the given duplication routing is
LOCAL AREA NETWORK (LAN): called___________
It is used for a single building. Hierarchal address►
Question No: 16 ( Marks: 1 ) - Please choose one Default route►
In Point-to-Point topology there are two topologies. Shortest path►
►Tree and Ring None of the given►
►Star and Ring
►Star and Tree
Question No: 5 ( Marks: 1 ) -
►None of the given Please choose one
Question No: 1 ( Marks: 1 ) - Please choose one
The next hop to which a packet is
________ has a jitter zero
sent depends only on
►Packet’s destination
► None of the given
Packet’s original source►
► Virtual Private Network Path the packet has taken►
► Isochronous Network Non of the given►
► Asynchronous Network
Question No: 6 ( Marks: 1 ) -
Question No: 2 ( Marks: 1 ) - Please choose one Please choose one
Unlike Frame Relay and ATM, SMDS (Switched multi- An interface for twisted pair Ethernet
megabit Data service) offers_______ . must have an
[email protected]
____________ connector , and must generate signals
according to the_____________ specification. Question No: 11 ( Marks: 1 ) -
RJ-45, 10 Base T► Please choose one
RJ-45, 10 Base 5► -------------- have advantages arisen
BNC, 10 Base 2► from the size and ease of
computation.
BNC, 10 Base T► ►CRC
Parity►
Question No: 7 ( Marks: 1 ) - Please choose one Checksums►
When an application--------------- data, it makes a copy of the
data available to all other computers on the network. None of given►
Broadcasting► Question No: 12 ( Marks: 1 ) -
Multicasting► Please choose one
Unicasting► The term -------- is used to denote the
None of the given► definition of a packet used with a
specific type of network.
Question No: 8 ( Marks: 1 ) - Please choose one
A ---------- provide a mechanism that a customer can use to ►Packet
set a physical address.
►Frame
Static addressing scheme►
Configurable addressing scheme► ►Data
Dynamic addressing scheme►
►None of the given
None of the given►
Question No: 13 ( Marks: 1 ) -
Question No: 9 ( Marks: 1 ) - Please choose one Please choose one
FDDI can transmits data at a rate of -----100 million bits per ------ has no way to determine the
second ----- cause of the problem.
100 million bits per second► ►Ping
100 million bits per second► ►Trace route
100 million bits per second► ►ICMP
None of the given► ►Non of the given
Question No: 10 ( Marks: 1 ) - Please choose one Question No: 14 ( Marks: 1 ) -
Computers attached to an ether use ------ in which a computer Please choose one
waits for the ether to be idle before transmitting a frame. ------ Program sends a message to a
remote computer and reports whether
►CSMA/CD the computer responds.
CSMA/CA► ►Ping
TOKEN PASSING► Ping
►Traceroute
None of the given► ►ICMP
[email protected]
►Non of the given
Question No: 15 ( Marks: 1 ) - Please choose one Question No: 3 ( Marks: 1 ) -
Please choose one
In -------------, network occupies the smaller area like a room
------ has no way to determine
a floor or a building
the cause of the problem.
►LAN ► ICMP
►WAN ► Ping
►MAN ► Trace route
►None of the given ► Non of the given
Question No: 16 ( Marks: 1 ) - Please choose one Ping has no way to determine the
cause of the problem. Tracing A
No error detection scheme is perfect because transmission
Route Network administrators use
errors can affect the additional information as well as the another tool, trace route.
data.
► False Question No: 4 ( Marks: 1 ) -
► Please choose one
The term----- ------- refers to
the general concept of a small
block of data
Question No: 1 ( Marks: 1 ) - Please choose one
In Point-to-Point topology there are two
► Packet
topologies.
► Frame
► Star and Tree ► Data
► Tree and Ring ► None of the given
► Star and Ring
Packet is a generic term that
► Star and Tree
refers to small block of data.
► None of the given
Packet have different format.
Each hardware uses different
In Point-to-Point topology there are two topologies.
packet format.
1) STAR topology
2) TREE topology
Question No: 5 ( Marks: 1 ) -
Please choose one
---------- scheme, which is
Question No: 2 ( Marks: 1 ) - Please choose one
designed to help detect
------ Program sends a message to a remote
transmissions errors, send
computer and reports whether the computer
one extra bit of information
responds.
with each character
► Ping (Not Sure)
► Parity
► Traceroute
► Checksums
► ICMP
► CRC
► Non of the given
► None of given
Ping program tests reach ability. It sends datagram
from B to A, that echoes back to B. it uses ICMP echo A parity scheme, which is
request and echo reply messages. designed to help detect
[email protected]
transmission errors, sends one extra hit of information Question No: 9 ( Marks: 1 ) -
with each character. Although it allows receiver to Please choose one
determine if a single bit has been changed parity can Formally named __________
not detect transmission errors that change an even informally known as the thick
number of bits. wire Ethernet or Thick net.
LOCAL TALK:
Apple invented the LAN technology that uses bus Question No: 10 ( Marks: 1 ) -
topology. Its interface is included with all Macintosh Please choose one
computers. Formally named __________
informally known as the
Question No: 7 ( Marks: 1 ) - Please choose one twisted pair Ethernet or TP
Most LANs that employ ring topology use an Ethernet.
access mechanism known as-------
► 10 Base 2
► CSMA/CD ► 10 Base 5
► CSMA/CA ► 10 Base T
► TOKEN PASSING ► None of the given
► None of the given
twisted pair ethernet
Most LANs that employ ring technology use an access Formally called 10 Base –T
mechanism known as token passing. A token ring Also twisted pair Ethernet
operates as a single, shared medium. When a computer or simply TP Ethernet
wants to send data, it must wait until it obtains the
token, when it is in control of the ring
Question No: 11 ( Marks: 1 ) -
Please choose one
Question No: 8 ( Marks: 1 ) - Please choose one The maximum size of an
Ethernet uses a ------ bit static addressing scheme Ethernet segment
in which each device is assigned a unique address is___________
by the manufacturer.
► 250 meters
► 500 meters
► 64 ► 700 meters
► 48 ► None of the given
► 32
►8 One Ethernet cable is sometimes
called a segment. This segment is
Ethernet uses a 48-bit static addressing scheme limited to 500 meters in length.
[email protected]
The minimum separation between connections is 3
meters. (P# 27) Question No: 15 ( Marks: 1 ) -
Please choose one
Question No: 12 ( Marks: 1 ) - Please choose one Basic LAN technologies such
A Bridge can ________ as Ethernet, Token Ring, and
FDDI use a _____.
► Filter a frame ► Connectionless service
► Forward a frame paradigm
► Extend a LAN ► Connection-oriented service
► Do all the above paradigm
► Both Connectionless and
A bridge is a hardware device also used to connect two Connection-oriented service
LAN segments to extend a LAN. It listens to all traffic paradigm
and recognizes frame format. It also forwards only ► None of the given
correct complete frames and discards the collided and
error frames.
The most important task a bridge performs is frame
filtering. Question No: 16 ( Marks: 1 ) -
Please choose one
Question No: 13 ( Marks: 1 ) - Please choose one The product of delay and
_______ computes shortest paths in a graph by throughput measures the
using weights on edges as a measure of distance. _____ of data that can be
present on the network.
► Greedy algorithm ► Area
► Distance vector algorithm ► Volume
► Dijksta’s algorithm ► Length
► Non of the given ► None of the given
[email protected]
transit at ------ Program sends a message
any time. (e-books) to a remote computer and reports
whether the computer responds.
Question No: 18 ( Marks: 1 ) - Please choose one ► Ping
One repeater _______, two repeaters ________ ► Traceroute
the maximum cable length limitation. ► ICMP
► Non of the given
► doubles, triple Question No: 3 ( Marks: 1 ) -
► square roots, cude roots Please choose one
► and, triple ---------- was especially
► doubles, cancel concerned about the lack of high
powered computers.
One repeater doubles, two repeaters triple the ► ARPA
maximum cable length limitation. (P# 49) ► IEEE
► EIA
Question No: 19 ( Marks: 1 ) - Please choose one ► Non of the given
A network uses a ------ if all computers attach to a The US Department of Defense
central point Advanced Research Projects
Agency (ARPA) was especially
concerned about the lack of high-
powered computers. Many of the
► Star Topology ARPA research projects needed
► Ring Topology access to the latest equipment
► Bus Topology
► None of the given Question No: 4 ( Marks: 1 ) -
Please choose one
Question No: 20 ( Marks: 1 ) - Please choose one The term -------- is used to
Computers attached to an ethernet use ------ in denote the definition of a packet
which a computer waits for the other to be idle used with a specific type of
before transmitting a frame. network.
► Packet
► CSMA/CD ► Frame
► CSMA/CA ► Data
► TOKEN PASSING ► None of the given
► None of the given To help distinguish between the
general idea of packet
Question No: 1 ( Marks: 1 ) - Please choose one transmission and the specific
No error detection scheme is perfect because definition of packets for a given
transmission errors can affect the additional information hardware technology, we use the
as well as the data. term frame to denote the
► True definition of a packet used with a
► False specific type of network. Thus one
No error detection scheme is perfect because might refer the maximum amount
transmission errors can affect the additional information of data a frame can hold or the
as well as the data. A cyclicly redunduncy chcek, which order in which bits of a frame are
is slightly more difficult to computer can detect more sent across a network.
errors then a Parity or Check sum mechnasim.
Question No: 5 ( Marks: 1 ) -
Question No: 2 ( Marks: 1 ) - Please choose one Please choose one
[email protected]
Computer networks are often called --------------
because they use packet technology.
► Ethernet
► Switch networks
► Packet networks
► None of the given
Question No: 6 ( Marks: 1 ) - Please choose one
-------------- have advantages arisen from the size and
ease of computation.
► CRC
► Parity
► Checksums
► None of given
Question No: 7 ( Marks: 1 ) - Please choose one
Most LANs that employ ring topology use an access
mechanism known as-------
Question No: 9 ( Marks: 1 ) -
► CSMA/CD
Please choose one
► CSMA/CA
Formally named __________
► TOKEN PASSING
informally known as the twisted
► None of the given
pair Ethernet or TP Ethernet.
Most LANs that employ ring technology use an access
► 10 Base 2
mechanism known as token passing. A token ring
► 10 Base 5
operates as a single, shared medium. When a computer
► 10 Base T
wants to send data, it must wait until it obtains the
► None of the given
token, when it is in control of the ring
Question No: 8 ( Marks: 1 ) - Please choose one twisted pair ethernet
IEEE LLC/SNAP header is --------, which is used to Formally called 10 Base –T
specify the type of data. Also twisted pair Ethernet or
► 8 octets simply TP Ethernet
► 8 bytes
► 8 bits Question No: 10 ( Marks: 1 ) -
► None of the given Please choose one
An interface for twisted pair
Ethernet must have an
____________ connector , and
must generate signals according
to the_____________
specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
an interface for twisted pair
Ethernet must have an RJ-45
connector, and must generate
signals according to the 10BaseT
specification. (P# 683 E-books)
[email protected]
Question No: 11 ( Marks: 1 ) - Please choose one It is used for audio and video,
A bridges function in the _________ layers(s). since these have predefined
► Physical (MAC) maximum data rates. (P# 71)
► Data link
► Network Question No: 16 ( Marks: 1 ) -
► Physical (MAC) and Data link Please choose one
Unlike Frame Relay and ATM,
Question No: 12 ( Marks: 1 ) - Please choose one SMDS (Switched multi-megabit
A Bridge can ________ Data service) offers_______ .
► Filter a frame ► Connectionless service
► Forward a frame paradigm
► Extend a LAN ► Connection oriented service
► Do all the above paradigm
A bridge is a hardware device also used to connect two ► Both Connectionless and
LAN segments to extend a LAN. It listens to all traffic Connection-oriented service
and recognizes frame format. It also forwards only paradigm
correct complete frames and discards the collided and ► None of the given
error frames. Switched Multi megabit Data
The most important task a bridge performs is frame Service (SMDS) is also a Telco
filtering. service. It is a connection less
service.
Question No: 13 ( Marks: 1 ) - Please choose one FRAME RELAY:
A Bridge forwards or filters a frame by comparing the It is used for Telco service for
information in its address table to the delivering blocks of data. It is
frame’s__________ connection based
► Layer 2 source address Service
► Source node’s physical address ATM uses the concept of
► Layer 2 destination address connection-oriented networking
► Layer 3 destination address
Question No: 17 ( Marks: 1 ) -
Question No: 14 ( Marks: 1 ) - Please choose one Please choose one
________ computes shortest paths in a graph by using A network with throughput T and
weights on edges as a measure of distance. delay D has a total of ________
► Greedy algorithm bit in transit at any time.
► Distance vector algorithm ►T/D
► Dijksta’s algorithm ►TxD
► Non of the given ►T+D
Dijkstras algorithm computes shortest paths in a graph ► None of the given
by using weights on edg as a measure of distance. A A network with throughput T and
path with the fewest number of edges may not be the delay D has a total of T x D bits in
path with least weight. (P# 173 e-books) transit at
any time. (e-books)
Question No: 15 ( Marks: 1 ) - Please choose one
___________ is used for audio and video, since these Question No: 18 ( Marks: 1 ) -
have predefined maximum data rates Please choose one
► Constant Bit Rate (CBR) service ATM is designed to work
► Variable Bit Rate (VBR) service on___________.
► Available Bit Rate (ABR) service ► Twisted Pair
► None of the given ► Coaxial
CONSTANT BIT RATE (CBR): ► Radio Frequency
► Fiber
[email protected]
ATM is designed to work on fiber (but can be used with
twisted pair). (P# 72)
Question No: 19 ( Marks: 1 ) - Please choose one
Computers attached to an ethernet use ------ in which a
computer waits for the ether to be idle before Ref No:
transmitting a frame. 1143600
► CSMA/CD
► CSMA/CA Time: 60 min
► TOKEN PASSING
► None of the given
All computers attached to the Ethernet use CSMA/CD to
co-ordinate their activities. A computer wishing to
transmit checks for electrical activity on the cable,
informally called a carrier. If there is no carrier, the
computer can transmit. If a carrier is present, the
computer waits for the sender to finish before
proceeding
Question No: 20 ( Marks: 1 ) - Please choose one
FDDI can transmits data at a rate of ----------
► 100 million bits per second
► 10 million bits per second
► 1000 million bits per second
► None of the given
FDDI: Fiber distributed data interconnect (FDDI) is
another ring technology. Its most important features
are: It uses fiber optics between stations and transmits
data at 100Mbps.
MIDTERM
EXAMINATION
Spring 2010
CS610- Computer
Network
[email protected]
[email protected]
Question No: 1 ( Marks: 1 ) - Please choose one
► Ping
► Traceroute
► ICMP
► Ping
► Trace route
[email protected]
Question No: 4 ( Marks: 1 ) - Please choose one
► Packet
► Frame
► Data
► Checksums
► CRC
► None of given
► Ring topology
► Star topology
[email protected]
Question No: 7 ( Marks: 1 ) - Please choose one
Most LANs that employ ring topology use an access mechanism known
as-------
► TOKEN PASSING
► CSMA/CA
► TOKEN PASSING
► 64
► 48
► 32
►8
[email protected]
Formally named informally known as the thick wire Ethernet or
Thick net.
► 10 Base 5
► 10 Base T
[email protected]
Question No: 10 ( Marks: 1 ) - Please choose one
► 10 Base 2
► 10 Base 2
► 10 Base 5
► 10 Base T
► 500 meters
► 250 meters
► 500 meters
► 700 meters
[email protected]
Question No: 12 ( Marks: 1 ) - Please choose one
A Bridge can
[email protected]
► Forward a frame
► Extend a LAN
► Dijksta’s algorithm
► Greedy algorithm
► Dijksta’s algorithm
is used for compressed audio and video where the data rate
depends on the level of compression that can be achieved.
[email protected]
Question No: 15 ( Marks: 1 ) - Please choose one
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a .
[email protected]
► Connection-oriented service paradigm ( not sure )
► Connectionless service paradigm
The product of delay and throughput measures the of data that can
be present on the network.
► Volume
► Length
[email protected]
►TxD
►T/D
►TxD
►T+D
[email protected]
Question No: 18 ( Marks: 1 ) - Please choose one
► doubles, triple
► and, triple
► doubles, cancel
► Star Topology
► Ring Topology
► Bus Topology
[email protected]
Computers attached to an ethernet use in which a computer waits for the
ether to be
idle before transmitting a frame.
► TOKEN PASSING
► CSMA/CD
► CSMA/CA
[email protected]
► None of the given
[email protected]
How can Switched Virtual Network be established?
ATM can provide the virtual circuits that look like traditional leased
digital circuits. The permanent virtual circuits PVC works as long
as the customer pays the periodic fee for its use. The forwarding
table enter configured the terms used by Telco Provisioning
requires two steps.
[email protected]
MIDTERM EXAMINATION
Spring 2010
CS610- Computer Network
Time: 60 min
Marks: 40
► True
► False
► Ping
Ping
► Traceroute
► ICMP
[email protected]
Question No: 3 ( Marks: 1 ) - Please choose one
► ARPA
► IEEE
[email protected]
► EIA
► Packet
► Frame
► Data
► Ethernet
► Switch networks
[email protected]
► Packet networks
[email protected]
-------------- have advantages arisen from the size and ease of
computation.
► CRC
► Parity
► Checksums
► None of given
Most LANs that employ ring topology use an access mechanism known
as-------
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
[email protected]
IEEE LLC/SNAP header is- , which is used to specify the type of data.
► 8 octets
► 8 bytes
► 8 bits
[email protected]
Question No: 9 ( Marks: 1 ) - Please choose one
► 10 Base 2
► 10 Base 5
► 10 Base T
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
► Data link
► Network
[email protected]
Question No: 12 ( Marks: 1 ) - Please choose one
A Bridge can
► Filter a frame
► Forward a frame
► Extend a LAN
[email protected]
Question No: 12 ( Marks: 1 ) - Please choose one
computes shortest paths in a graph by using weights on edges as a
measure of distance.
► Greedy algorithm
► Dijksta’s algorithm
[email protected]
► Non of the given
[email protected]
Question No: 17 ( Marks: 1 ) - Please choose one
►T/D
[email protected]
►TxD
►T+D
► Twisted Pair
► Coaxial
► Radio Frequency
► Fiber
► CSMA/CD
► CSMA/CA
[email protected]
► TOKEN PASSING
[email protected]
FDDI can transmits data at a rate of ----------
Every LAN has a topology, or the way that the devices on a network
are arranged and how they communicate with each other.
PHYSICL TOPOLOGY:
The way that the workstations are connected to the network through
the actual cables that transmit data -- the physical structure of the
network -- is called the physical topology. It depends on the
wiring scheme.
LOGICAL TOPOLOGY:
The logical topology, in contrast, is the way that the signals act on
the network media, or the way that the data passes through the
network from one device to the next without regard to the physical
interconnection of the devices. We can say that it is defined by the
specific network technology.
[email protected]
Define Vector-Distance Algorithm.
Packet switches wait for next update message and they iterate
through entries in message. If entry has shortest path to
destination, insert source as next hop to destination and record
distance as distance from next hop to destination plus distance
from this switch to next hop.
[email protected]
STORE AND FORWARD:
Data delivery from one computer to another is accomplished
through store and forward technology. In this technology packet
switch stores incoming packet and also forwards that packet to
another switch or computer. For this purpose packet switch has
internal memory into which it can hold packet if outgoing
connection is busy. Packets for each connection held on queue.
Most networks offer dynamic connections, which last for a relatively short
time.
To handle this, ATM can dynamically establish a switched virtual
circuit (SVC), allow it last as long as necessary and then terminate
it.
The terminology comes from the Telco’s where switching system
normally refers to all switching.
ESTABLISHING AN SVC:
[email protected]
Question No: 26 ( Marks: 5 )
MIDTERM EXAMINATION
Fall 2008
CS610- Computer Network
(Session - 2)
Time: 60 min
Marks: 38
[email protected]
Question No: 1 ( Marks: 1 ) -
Please choose one
A typical port on an ATM switch operates at or higher.
► OC-2 speed (155Mbps)
► OC-3 speed (100Mbps)
► OC-3 speed (155Mbps)
► OC-3 speed (155Gbps)
► Area
[email protected]
► Volume
► Length
► None of the given
[email protected]
. . . .►.Ideal frame type
. . . .►.Implicit frame type
. . . .►.Star topology
. . . .►.Bus topology
. . . .►.Ring topology
---------- scheme,
. . . .►.None which
of the is designed to help detect transmissions errors, send one extra bit of
given
information with each character
.......►.Parity
Question No: 10 ( Marks: 1 )
.......►.Checksums
-
Please choose one
.......►.CRC
The Fast Ethernet
.......►.None of given hardware operates at a rate of --------
. . . .►.10 Mbps
. . . .►.100 No:
Question Mbps12( Marks: 1 )- Please choose one
. . . .►.1000networks
Computer Mbps are often calledbecause they use packet technology.
. . . .►.None of the given
.......►.Ethernet
Question No:
.......►.Switch 11 (
networks Marks: 1 ) - Please choose one
.......►.Packet networks
[email protected]
. . . .►.Non of the given
. . . .►.WAN
. . . .►.MAN
. . . .►.None of the given
.Question
. . .►.TreeNo:
and19(Ring
Marks: 3 )
.Why
. . .►.Star andT wiring
10-base Ringscheme is called star shaped bus wiring scheme.
The main feature of twisted pair Ethernet is that it forms a classic star topology however
functions like a bus. 10Base-T Ethernet is often called a star shaped bus.
Question No: 20 ( Marks: 5 )
What are the main factors due to which mechanism of error detections
schemes differ?
[email protected]
One Ethernet cable is sometimes called a segment. This
segment is limited to 500 meters in length. The minimum
separation between connections is 3 meters.
MIDTERM EXAMINATION
Fall 2008
CS610- Computer Network
(Session - 2)
Ref No: 109816
Time: 60 min
Marks: 38
Question No: 1 ( Marks: 1 ) -
Please choose one
has a jitter zero
[email protected]
Question No: 4 ( Marks: 1 )- Please choose one
.Most WAN systems include a mechanism that can be used to
eliminate the common case of duplication routing is called
. . . .►.Hierarchal address
. . . .►.Default route
. . . .►.Shortest path
. . . .►.None of the given
[email protected]
. . . .►.Packet’s destination
. . . .►.Packet’s original source
. . . .►.Path the packet has taken
. . . .►.Non of the given
. . . .►.BNC, 10 Base T
. . . .►.Broadcasting
. . . .►.Multicasting
. . . .►.Unicasting
. . . .►.None of the given
[email protected]
. . . .►.100 million bits per second
. . . .►.100 million bits per second
. . . .►.100 million bits per second
. . . .►.None of the given
. . . .►.CSMA/CD
[email protected]
. . . .►.CSMA/CA
. . . .►.TOKEN PASSING
.......►.F
rame
. . . .►.Data
. . . .►.Ping
. . . .►.Trace route
. . . .►.ICMP
. . . .►.Non of the given
. . . .►.LAN
[email protected]
. . . .►.WAN
. . . .►.MAN
. . . .►.None of the given
Solution:
A network analyzer also called network monitor or a network sniffer
is used to examine the performance of or debug a network. It can
report statistics such as capacity utilization, distribution of frame
size, collision rate or token circulation time
[email protected]
Thick Ethernet, Thin Ethernet and Twisted pair Ethernet.
Solution:-
Thick
Ethernet:
Thick Ethernet, officially known as 10 Base-5, is the oldest form of
Ethernet.
One form of cabling supported by Ethernet is low-loss 50 Ohm
coaxial cable as shown in the figure below. This type of cable is
0.5" diameter (usually supplied with a yellow outer PVC coating)
and rather inflexible. It has become known in the communications
industry as "Thick Ethernet". The official name for this cable is 10
Baseband5 (10B5), indicating that it is specified for baseband
communications at 10 Mbps over distances up to 500m.
Thin Ethernet:
[email protected]
www.virtualinspire.com
MIDTERM EXAMINATION
► True
► False
► Ping
Ping
► Traceroute
► ICMP
► ARPA
► IEEE
www.virtualinspire.com
► EIA
► Packet
► Frame
► Data
► Ethernet
www.virtualinspire.com
► Switch networks
► Packet networks
► CRC
► Parity
► Checksums
► None of given
Most LANs that employ ring topology use an access mechanism known
as-------
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
IEEE LLC/SNAP header is- , which is used to specify the type of data.
► 8 octets
► 8 bytes
► 8 bits
► 10 Base 2
► 10 Base 5
► 10 Base T
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
www.virtualinspire.com
► Physical (MAC)
► Data link
► Network
www.virtualinspire.com
► Physical (MAC) and Data link
A Bridge can
► Filter a frame
► Forward a frame
► Extend a LAN
► Greedy algorithm
► TxD
►T+D
► Twisted Pair
► Coaxial
► Radio Frequency
► Fiber
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
Every LAN has a topology, or the way that the devices on a network
are arranged and how they communicate with each other.
PHYSICL TOPOLOGY:
The way that the workstations are connected to the network through
the actual cables that transmit data -- the physical structure of the
network -- is called the physical topology. It depends on the
wiring scheme.
LOGICAL TOPOLOGY:
Question No: 23 ( Marks: 3 )
www.virtualinspire.com
The logical topology, in contrast, is the way that the signals act on
the network media, or the way that the data passes through the
network from one device to the next without regard to the physical
interconnection of the devices. We can say that it is defined by
the specific network technology.
Packet switches wait for next update message and they iterate
through entries in message. If entry has shortest path to
destination, insert source as next hop to destination and record
distance as distance from next hop to destination plus distance
from this switch to next hop.
Most networks offer dynamic connections, which last for a relatively short
time.
To handle this, ATM can dynamically establish a switched virtual
circuit (SVC), allow it last as long as necessary and then terminate
it.
The terminology comes from the Telco’s where switching system
normally refers to all switching.
ESTABLISHING AN SVC:
MIDTERM EXAMINATION
► Area
► Volume
► Length
► None of the given
►Network
www.virtualinspire.com
Physical (MAC) and Data link
IEEE LLC/SNAP header is- , which is used to specify the type of data.
►8 octets
►8 bytes
►8 bits
►None of the given
The third field of the header consists of bit Ethernet frame type.
►48
►32
►16
►8
►1000 Mbps
►None of the given
►Checksums
www.virtualinspire.com
► CRC
►None of given
►Switch networks
►Packet networks
Ping
► Traceroute
►ICMP
►Non of the given
► WAN
►MAN
►None of the given
► LAN
►WAN
www.virtualinspire.com
►MAN
►None of the given
□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□
□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□
□□□□□
□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□
What are the main factors due to which mechanism of error detections
schemes differ?
MIDTERM EXAMINATION
An interface for twisted pair Ethernet must have an connector , and must
generate signals according to the specification.
►RJ-45, 10 Base T
►RJ-45, 10 Base 5
►BNC, 10 Base 2
►BNC, 10 Base T
► Broadcasting
► Multicasting
► Unicasting
►None of the given
►CSMA/CD
►CSMA/CA
www.virtualinspire.com
►TOKEN PASSING
►None of given
►Packet
►Frame
►Data
Ping
► Trace route
►ICMP
►Non of the given
Pin
g
Ping
►Traceroute
►ICMP
►Non of the given
►LAN
www.virtualinspire.com
► WAN
►MAN
►None of the given
No error detection scheme is perfect because transmission errors can affect
the additional
information as well as the data.
►□□□□ False
►□□□□□
□□□□□□□□□□□□□□□□□□□□□□□
□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□
□□□□□□□□□□
Question No: 18 ( Marks: 2 ) ???? Format nt clear
□□□
Solution:
Solution:-
Thick Ethernet:
Thin Ethernet:
o Star
o CSMA
o WAN
o Ethernet
o Multicast
Question No. 2 Marks : 03
o Ethernet
o NIC
o 10Baset
o Bridge
o 10Base5
[15 + 15 Marks]
For the packet switched network below:
o Broadcast
o Multicast
o Packet Switch
Question No. 2 Marks : 03
o Bandwidth
o CRC
o Bridge
o CRC
o Broadcast
o WAN
o Wireless LAN
[15 Marks]
Assume a 10Mega Byte file must be transmitted across a network. Ignoring delays caused
by waiting for access and other overhead, how long will it take to send the file across?
a. Ethernet (10Mbps)
b. Fast Ethernet (100Mbps)
c. Token Ring (16Mbps)
d. Local Talk (230Kbps)
e. ATM (155Mbps)
Draw an example of 'Cycle of Bridges' with the segments. (At least 6 segments)
[15 Marks]
As discussed in the lecture, each ATM Switch rewrites or switched the Label. Assuming the
sending computer 'S' uses a VPI/VCI value of 3 and the receiving computer 'R' uses a VPI/VCI
value of 6, use a table containing the old VPI/VCI, the Interface and the new VPI/VCI to
complete the tables for each of the switches below?
Question No.10Marks : 03
o Star
o TDM
o Bandwidth
o Network Analyzer
o Broadcast
www.virtualinspire.com
► Ping
► ICMP
► Ping
► Trace route
► Packet
► Frame
► Data
► Parity
► Checksums
For Registration on www.virtualinspire.com u can use
Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
► CRC
► None of given
► Bus topology
► Ring topology
► Star topology
Most LANs that employ ring topology use an access mechanism known
as-------
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
► 64
► 48
► 32
►8
► 10 Base 2
► 10 Base 5
► 10 Base T
► 10 Base 2
► 10 Base 5
► 10 Base T
► 250 meters
► 500 meters
► 700 meters
A Bridge can
► Filter a frame
► Forward a frame
► Extend a LAN
► Greedy algorithm
► Dijksta’s algorithm
is used for compressed audio and video where the data rate
depends on the level of compression that can be achieved.
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a .
The product of delay and throughput measures the of data that can
be present on the network.
► Area
► Volume
► Length
►T/D
►T+D
► doubles, triple
► and, triple
► doubles, cancel
► Star Topology
► Ring Topology
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
Question No: 2 ( M a r k s: 1 )
------ Program sends a message to a remote computer and reports whether the computer responds.
Question No: 3 ( M a r k s: 1 )
---------- was especially concerned about the lack of high powered computers.
Question No: 4 ( M a r k s: 1 )
The term---------is used to denote the definition of a packet used with a specific type of network.
► Packet
► Frame (Computer Networks and Internets, page 73)
► Data
► None of the given
► Ethernet
► Switch networks
Question No: 6 ( M a r k s: 1 )
-------------- have advantages arisen from the size and ease of computation.
► CRC
Question No: 7 ( M a r k s: 1 )
Most LANs that employ ring topology use an access mechanism known as-------
► CSMA/CD
► CSMA/CA
Question No: 9 ( M a r k s: 1 )
Formally named informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
Question No: 11 ( M a r k s: 1 )
A bridges function in the layers(s).
Question No: 12 ( M a r k s: 1 )
A Bridge can
► Filter a frame
► Forward a frame
► Extend a LAN
Question No: 14 ( M a r k s: 1 )
computes shortest paths in a graph by using weights on edges as a measure of
distance.
► Greedy algorithm
► Distance vector algorithm
Question No: 16 ( M a r k s: 1 )
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers .
Question No: 17 ( M a r k s: 1 )
A network with throughput T and delay D has a total of bit in transit at any time.
►T/D
► Twisted Pair
► Coaxial
► Radio Frequency
Question No: 19 ( M a r k s: 1 )
Computers attached to an Ethernet use in which a computer waits for the ether to be
idle before
transmitting a frame.
Question No: 20 ( M a r k s: 1 )
FDDI can transmits data at a rate of ----------
Question No: 1 ( M a r k s: 1 )
In Point-to-Point topology there are two topologies.
Question No: 2 ( M a r k s: 1 )
------ Program sends a message to a remote computer and reports whether the computer
responds.
Question No: 3 ( M a r k s: 1 )
------ has no way to determine the cause of the problem.
► ICMP
Question No: 5 ( M a r k s: 1 )
---------- scheme, which is designed to help detect transmissions errors, send one
extra bit of information with each character
Question No: 6 ( M a r k s: 1 )
Local Talk is a LAN technology that employs -------------
► CSMA/CD
► CSMA/CA
Question No: 8 ( M a r k s: 1 )
Ethernet uses a----bit static addressing scheme in which each device is assigned a
unique address by the
manufacturer.
► 64
Question No: 9 ( M a r k s: 1 )
Formally named informally known as the thick wire Ethernet or Thick net.
► 10 Base 2
Question No: 10 ( M a r k s: 1 )
Formally named informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
Question No: 11 ( M a r k s: 1 )
The maximum size of an Ethernet segment is
► 250 meters
Question No: 12 ( M a r k s: 1 )
For Registration on www.virtualinspire.com u can use
A Bridge can
Firefox or chrome or latest Internet Explorer.......
www.virtualinspire.com
► Filter a frame
► Forward a frame
► Extend a LAN
Question No: 13 ( M a r k s: 1 )
computes shortest paths in a graph by using weights on edges as a measure of
distance.
► Greedy algorithm
► Distance vector algorithm
Question No: 15 ( M a r k s: 1 )
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a .
Question No: 16 ( M a r k s: 1 )
The product of delay and throughput measures the of data that can be present on the
network.
► Area
►T/D
Question No: 18 ( M a r k s: 1 )
One repeater , two repeaters the maximum cable length limitation.
Question No: 20 ( M a r k s: 1 )
Computers attached to an Ethernet use in which a computer waits for the other to be
idle before
transmitting a frame.
► CSMA/CD (Computer
Networks and Internets, page 93) rep
► CSMA/CA
► TOKEN PASSING
► None of the given
► Area
►Star topology
►Bus topology (Page 30) rep
►Ring topology
►None of the given
10
►MAN
►None of the given
►LAN (Page 4)
►WAN
►MAN
►None of the given
11
12
13
14
L
R
C
4. The Fast Ethernet hardware operates at a rate of --------
10 Mbps
100 Mbps (pg 27)
1000 Mbps
1 Gbps
5. When an application----------------data, it makes a copy of the data available to all other
computers on the
network.
Broadcasting
Multic
asti
ng
Uni
cast
ing
An
yca
stin
g
6. Formally named informally known as the thin wire Ethernet or Thin net. 10
Base 2
10 Base 5
10 Base T
100 Base T
7. NICs contain analogue circuitry and that allows the NIC to operate independent of
the CPU.
Frame relay a
Eth
S
ATM (Pg. 66)
Data
Additional
Information (Pg.
82) Additional
information & data
Transmission
medium
17. In direct point to point communication adding the Nth computer requires new
connections.
N(
N
1
)
N
2
N-1
(N2 –N)/2
18. The next hop to which a packet is sent depends only on
. Packet’s destination
Packet’s original
source Path
the packet has
I
E
E
E
E
I
A
Goverment
10. "Frame type" field of the header consists of bits.
8
[Type text] Page 10
[Type the document title] [Year]
Midterm
CS610 Computer Network
10
16
I
E
E
E
E
I
A
Goverment
8. Generally a Bridge is used to perform .
a frame Filter
and Forward a
packet
9. Header of cell takes of network capacity.
5% (pg 65)
10%
12%
15%
10. senses a signal on a cable and then transmits an amplified copy of the
signal.
Brid
g
e
[Type text] Page 16
[Type the document title] [Year]
Midterm
CS610 Computer Network
H
u
b
Trans
cei
ver
Re
pea
ter
11. is used for ordinary data.
Available Bit Rate (ABR) service Uniform
Bit Rate (UBR) service Constant Bit Rate
(CBR) service (Pg. 71) Variable Bit Rate
(VBR) service
12. A Bridge forwards or filters a frame by comparing the information in its address table to
the frame’s .
Layer 2 source
address Layer 3
source address
Layer 2
destination
address Layer 3
destination
address
13. A network with throughput T and delay D would have a total no of _ bits in transit
at any time.
T+D
Tx
D/Unit
Time
T/D
T x D (Pg. 203)
14. No error detection scheme is perfect because transmission errors can affect .
Data
Bus topology
(Pg. 30)
Ring
topology
Mesh
topol
ogy
Star
topol
ogy
17. Formally named _ informally known as the twisted pair Ethernet or TP
Ethernet.
10 Base 2
10 Base 5
10 Base T
100 Base T
18. Most WAN systems include a mechanism that can be used to eliminate the common
case of duplication routing is called .
Dynamic route
Hierarchal
address
Default
route (Pg.
172)
[Type text] Page 18
[Type the document title] [Year]
Midterm
CS610 Computer Network
Shortest
path
19. in which delay among packets can vary.
Virtual Private Network
Isochronous Networks
Asynchronous
Networks (Pg.65 )
Synchronous
Networks
20. The product of delay and throughput measures the of data that can be presented
on the network.
Area
Volu
me(Pg
. 80)
Lengt
h
Size
Constant Bit Rate (CBR) service
Bridge
Repeater
Hub
Data link
Network
http://highered.mcgraw-hill.com/sites/0072967722/student_view0/chapter_3_quiz.html
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
8 bytes
8 bits
32
16
8
(zh,vuzs,nov10)
An ------------method, the network hardware designers specify how type information is
included in the frame and the value use to identify various frame types.
Bus topology
Ring topology
Parity
Checksums
CRC
Ethernet
Switch networks
Packet networks
_____________Program sends a message to a remote computer and reports whether the
computer responds.
Ping
Trace route
LAN
WAN
MAN
LAN
WAN
MAN
Datalink layer
Physical layer
A network which is based on packets uses a computer which may have ________, memory and
______________.
Interface, Program
If the sending computer crashes before transmitting a complete frame, the _____________ will
not arrive and the receiver will know that the frame is __________________.
Eot, incomplete
A network that permits many ources to take turns accessing a shared communication resource
is providing a form of _____________. TDM
If a bridge is unable to find ___________in its table then it just forwards frames to the other
segment.
Destination address