CS610 Final Term MAGA File.. All Paperz Are in 1 File..Pages 1 To 42
CS610 Final Term MAGA File.. All Paperz Are in 1 File..Pages 1 To 42
com
FINALTERM EXAMINATION
Spring 2010
CS610- Computer Network
Ref No: 1578657
Time: 90 min
Marks: 60
Question No: 1 ( Marks: 1 ) - Please choose one
A ---------- relies on the hardware manufacturer to assign a unique physical address to
each network interface.
► Static addressing scheme
► Configurable addressing scheme
► Dynamic addressing scheme
► None of the given
Question No: 2 ( Marks: 1 ) - Please choose one
An interface for thin Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
Question No: 3 ( Marks: 1 ) - Please choose one
A system with redundant bridges might have a problem with_______ in the system.
► Loop
► Filters
► Spanning Trees
► All given choices
Question No: 4 ( Marks: 1 ) - Please choose one
A Bridge can ________
► Filter a frame
► Forward a frame
► Extend a LAN
► Do all the above
Question No: 5 ( Marks: 1 ) - Please choose one
________ is used for typical data applications (where the data rate may be unknown and
bursty) and allows use of whatever bandwidth is available at a given time.
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
Question No: 6 ( Marks: 1 ) - Please choose one
ATM assigns each VC a _____________ identifier that is divided two parts to produce a
hierarchy.
► 21-bit
► 22-bit
► 23-bit
► 24-bit
www.vuassassins.com
► Source port
► Destination Port
► None of the given
Question No: 13 ( Marks: 1 ) - Please choose one
________ identifies the application program that sent the data.
www.vuassassins.com
► Destination Port
► Source port
► Logical address
► None of the given
Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following are interior routing protocols?
► RIP
► OSPF
► BGP
► RIP and OSPF
Question No: 15 ( Marks: 1 ) - Please choose one
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP
► Both UDP and TCP
► None of the given
Question No: 16 ( Marks: 1 ) - Please choose one
__________measures distance in network hops, where each network between the source
and destination counts as single hop.
► BGP
► OSPF
► RIP
► None of the given
Question No: 17 ( Marks: 1 ) - Please choose one
OSPF is based on--------
► Distance vector routing
► Link state routing
► Path vector routing
► Distance vector routing and Link state routing
Question No: 18 ( Marks: 1 ) - Please choose one
_________ performs local multicast and uses IP-in-IP encapsulation to send multicast
datagrams from one site on the Internet to another.
► Distance Vector Multicast Routing Protocol (DVMRP)
► Core Based Trees (CBT)
► Protocol Independent Multicast_ Sparse Mode (PIM-SM)
► Protocol Independent Multicast _ Dense Mode (PIM-DM)
Question No: 19 ( Marks: 1 ) - Please choose one
The length of time required to send a variable length packet is variable and does not
require a complicated interrupt scheme to detect completion of transmission.
► True
► False
Question No: 20 ( Marks: 1 ) - Please choose one
NEXT HEADER field in the base header defines type of header and it appears at end of
fixed-size base header.
► True
► False
www.vuassassins.com
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
► T, C
►D
►C
► T, D
Question No: 27 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the protocol address is determined by
hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
www.vuassassins.com
►T
►D
►C
► T, C
Question No: 28 ( Marks: 1 ) - Please choose one
Reconstruction of original datagram is called reassembly.
► True
► False
Question No: 29 ( Marks: 1 ) - Please choose one
A computer needs a complete stack of protocols to run either a client or a server.
► True
► False
Question No: 30 ( Marks: 1 ) - Please choose one
TCP uses _______ mechanism to control the flow of data.
► door
► window
► acknowledgment
► retransmission
Question No: 31 ( Marks: 2 )
To solve the problem the routers and networks in the Internet are divided into groups.
How large do you think are these groups?
FINALTERM EXAMINATION
Spring 2010
CS610- Data Communication
Question No: 1 ( Marks: 1 ) - Please choose one
__________representation of links that connect nodes is called as physical topology.
► geometrical
► logical
► physical
Question No: 2 ( Marks: 1 ) - Please choose one
The internet model consists of _________ layers.
► three
► two
► five
► seven
www.vuassassins.com
► Transport
► Datalink
Question No: 27 ( Marks: 1 ) - Please choose one
Repeater works on __________ layer.
► Data Link
► Physical
► Network
► Application
Question No: 28 ( Marks: 1 ) - Please choose one
Trunks are transmission media such as _________ that handle the telephone to the
nearest end office.
► Satellite links
► Twisted-pair & Fiber-optic
► Twisted-pair
► Fiber-optic
Question No: 29 ( Marks: 1 ) - Please choose one
Which of the following ___________ uses a series of filters to decompose multiplexed
signal into its constituent signals.
MUX
► DEMUX
► Switch
► Bridge
Question No: 30 ( Marks: 1 ) - Please choose one
In Fast Ethernet, data rate can be increased by _______________ collisions.
► Increasing
► Decreasing
► Keeping Constant
► None of the given
Question No: 31 ( Marks: 2 )
What are the advantages of a multipoint connection over a point-to-point connection?
Answer:
Point-to-point connection is limited to two devices, where else more than two devices
share a single link in multipoint connection. Multipoint connection can be used for
fail-over and reliability.
Question No: 32 ( Marks: 2 )
What's the name of the telephone service in which there is no need of dialing.
Answer:
\DSS (digital data service) is the telephone service in which there is no need of
dialing.
Question No: 33 ( Marks: 2 )
Which type of frames are present in BSC frames?
Answer:
There are two types of frames that are present in BSC.
1. Control Frames and
2. Data Frames
Question No: 34 ( Marks: 2 )
www.vuassassins.com
What methods of line discipline are used for peer to peer and primary secondary
communication?
Answer:
Line discipline is done in two ways:
1. ENQ/ACK (Enquiry Acknowledgement)
This is used for peer to peer communication.
2. Poll/ Select
This method is used for primary secondary communication.
Question No: 35 ( Marks: 3 )
How does the checksum checker know that the received data unit is undamaged? [3]
Answer:
Checksum Checker or generator:
The sender subdivides data units into equal segments of ‘n’ bits(16 bits)
1. These segments are added together using one’s complement.
2. The total (sum) is then complemented and appended to the end of the original data unit
as redundancy bits called CHECKSUM.
3. The extended data unit is transmitted across the network.
4. The receiver subdivides data unit and adds all segments together and complement the
result.
5. If the intended data unit is intact, total value found by adding the data segments and the
checksum field should be zero.
6. If the result is not zero, the packet contains an error & the receiver rejects it.
Question No: 36 ( Marks: 3 )
Which one has more overhead, a repeater or a bridge? Explain your answer. [3]
Answer:
A bridge has more overhead than a repeater. A bridge processes the packet at two
layers ; a repeater processes a frame at only one layer. A bridge needs to search a
table and find the forwarding port as well as to regenerate the signal; a repeater
only regenerates the signal. In other words, a bridge is also a repeater (and more); a
repeater is not a bridge.
Question No: 37 ( Marks: 3 )
Write down disadvantages of Ring Topology.
Answer:
Disadvantages of Ring Topology
Unidirectional Traffic
A break in a ring that is a disabled station can disable the entire network
Can be solved by using:
Dual Ring or
A switch capable of closing off the Break
Question No: 38 ( Marks: 3 )
How parity bits are counted in VRC error detection method technique in case of
odd parity generator?
Answer:
For example:
We want to TX the binary data unit 1100001
Adding together the number of 1’s gives us 3, an odd number Before TX, we pass the
www.vuassassins.com
data unit through a parity generator, which counts the 1’s and appends the parity bit (1) to
the end The total number of 1’s is now 4, an even number The system now transfers the
entire expanded across the network link When it reaches its destination, the RX puts all 8
bits through an even parity checking function
If the RX sees 11100001, it counts four ones, an even number and the data unit passes
When the parity checker counts the 1’s, it gets 5 an odd number The receiver knows that
an error has occurred somewhere and therefore rejects the whole unit Some systems may
also use ODD parity checking The principal is the same as even parity
Question No: 39 ( Marks: 5 )
How are lost acknowledgment and a lost frame handled at the sender site? [5]
Although message exchange can be used to bind addresses, sending a request for each
binding is hopelessly inefficient.
► True
► False
CASHING ARP RESPONSES:
Although message exchange can be used to bind addresses, sending a request for
each binding is hopelessly inefficient
Question No: 15 ( Marks: 1 ) - Please choose one
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
► 32, 48
► 24, 32
► 32, 64
► 32, 128
ARP is almost always used to bind a 32-bit IP address to a 48-bit Ethernet address
Question No: 16 ( Marks: 1 ) - Please choose one
In the 1970s large organizations began to acquire multiple networks. Each network in the
organization formed island. Employees needed to choose a computer appropriate for each
task. So they needed multiple screens, keyboards and computers.
► False
► True
In the 1970s large organizations began to acquire multiple networks. Each
network in the organization formed island. Employees needed to choose a
computer appropriate for each task. So they needed multiple screens, keyboards
and computers.
Question No: 17 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the protocol address is determined by
hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
►T Types of
►D Features Resolution
►C
► T, C Use full with any hardware T
Address change affects all hosts T
Protocol address is determined C
by hardware address
The general form of an IP datagram is with a header followed by data. The header
contains information that controls where and how the datagram is to be sent.
► True
► False
Header contains all information needed to deliver datagram to the destination
computer. It contains:
www.vuassassins.com
• Destination address
• Source address
• Identifier
• Other delivery information
Question No: 19 ( Marks: 1 ) - Please choose one
To save traffic, an EGP does not summerize routing information from the autonomous
system before passing it to another autonomous system.
► True
► False
"It provides routing among autonomous systems (EGP).
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following is a correct representation of the IPv6?
► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255
► 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255
► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256
► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255
128-bit addresses unwidely in dotted decimal; requires 16 numbers:
105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255
Question No: 21 ( Marks: 2 )
Is there a comparison between TCP/IP reference model and OSI reference model.
Both the TCP/IP and OSI are international standards for data communication. Both use
the concept of protocol layering. These are theconceptual tools that is often used to show
how various protocols and technologies fit together to implement networks. The
functions that the model represents are much the same. This means that the TCP/IP and
the OSI models are really quite similar in nature even if they don't carve up the network
functionality pie in precisely the same way. There is a fairly natural correspondence
between the TCP/IP and OSI layers; it just isn't always a “one-to-one” relationship. Since
the OSI model is used so widely, it is common to explain the TCP/IP architecture both in
terms of the TCP/IP layers and the corresponding OSI layers
Question No: 22 ( Marks: 2 )
How can a datagram be transmitted across a physical network that does
not understand the datagram format?
Encapsulate!
The network interface layer encapsulates an entire datagram in the data area of a
hardware frame.
The network hardware ignores the datagram format.
The hardware treats a frame containing a datagram like any other frame.
The sender places a frame type in the frame header indicating that the frame
contains a datagram.
The receiver reads the frame type and knows the frame contains a datagram.
Question No: 23 ( Marks: 2 )
What is the basic concept of Twice NAT (Network Address Translation)?
Twice NAT is another variant of NAT. it is used with site that runs server. In this process
NAT box is connected to Domain Name.
Question No: 24 ( Marks: 3 )
What format is used for an internet packet?
www.vuassassins.com
• It is used in OSPF.
Question No: 30 ( Marks: 10 )
Descibe in detail what is the purpose of the following table? What sort of information can
be extracted?
First Four Bits Table index in Class of Address
Of address decimal
0000 0 A
0001 1 A
0010 2 A
0011 3 A
0100 4 A
0101 5 A
0110 6 A
0111 7 A
1000 8 B
1001 9 B
1010 10 B
1011 11 B
1100 12 C
1101 13 C
1110 14 D
1111 15 E
The table shows in the figure, how the class of address can be computed.
Question No: 31 ( Marks: 10 )
List down and describe atleast five charachteristics of Routing Information
Protocol.
ROUTING INFORMATION PROTOCOL (RIP):
It has the following characteristics:
"It is used for routing within an autonomous system (IGP).
"Hop Count Metric: RIP measures distance in network hops, where each network
between the source and destination counts as a single hop.
"It uses UDP for all message transmissions.
"RIP is used over LAN. Version 1 of RIP uses hardware broadcast and version 2 allows
delivery via multicast.
"It can be used to advertise default route propagation. An organization can use RIP to
install a default route in each router.
"It uses distance vector algorithm.
"RIP allows hosts to listen passively and update its routing table
FINALTERM EXAMINATION
Fall 2008
CS610- Computer Network
Ref No: 325624
Time: 120 min
Marks: 70
www.vuassassins.com
► True
► False
► routing metric
► routing
switching
We use the termrouting metric to refer to a measure of the path that routing software use
when choosing a route
Question No: 21 ( Marks: 2 )
Is there a comparison between TCP/IP reference model and ISO reference model.
Question No: 22 ( Marks: 2 )
Does OSPF only share information within an area or does it allow communication
between areas?
OSPF allows subdivision of Autonomous System into areas. The link-status
information is propagated within an area. The routes are summarized before being
propagated to another area. It reduces overhead (less broadcast traffic). Because it allows
a manager to partition the routers and networks in an autonomous system into multiple
areas, OSPFcan scale to handle a larger number of routers than other IGPs.
Question No: 23 ( Marks: 2 )
What are the implementations of Network Address Translation?
Question No: 24 ( Marks: 3 )
Describe the difference between static and dynamic routing?
STATIC ROUTING:
It is one of the forms of Internet routing. In Static routing, the table is initialized
when system boots and there is no further changes.
DYNAMIC ROUTING:
In dynamic routing the table is initialized when system boots. It includes routing
software which learns routes and updates table. In this way continuous changes are
possible due to routing software.
Question No: 25 ( Marks: 3 )
What is the first address in the block if one of the addresses is 140.120.84.24/20?
The first address in the block is 140.120.80.0/20
WE can use the following short cut to find the first address
1. divide the prefix length into four groups(corresponding to the four bytes in an
address) and find the number of 1s in each group
2. if the number of 1s in a group is 8 the corresponding byte in the first address is the
same (no change)
3. If the number of 1s in the group is zero (no1s), the corresponding byte in the first
address is 0
4. if the number of 1s in a group is between zero and eight, we keep the
corresponding bits in that group
Question No: 26 ( Marks: 3 )
Write three new features of IPV6.
The new features of IPV6 are as follows:
• IPV6 addresses are 128 bits.
• Header format is entirely different.
• Additional information is stored in optional extension headers, followed by data.
• Flow label and quality of service allows audio and video applications to establish
www.vuassassins.com
appropriate connections.
• New features can be added more easily. So it is extensible.
Question No: 27 ( Marks: 5 )
What is the difference between an interior gateway protocol and an exterior
gateway protocol? Name an example of each.
INTERIOR GATEWAY PROTOCOLS (IGPs):
It is used among routers within autonomous system. The destinations lie within IGP.
EXTERIOR GATEWAY PROTOCOLS (EGPs):
It is used among autonomous systems. The destinations lie throughout Internet
Question No: 28 ( Marks: 5 )
As the Internet grew, the original Classful addressing scheme became a limitation,
what is the designed solution.
TCP uses single format for all messages. TCP uses the term segment to refer to
a message. Each message sent from TCP on onemachine to TCP on another machine uses
this format including data andacknowledgement
Size
Field Name Description
(bytes)
ephemeral (client) port numberSourcePort: The 16-bit
port number of the process that originated the TCP
SourcePort 2
segment on the source device. This will normally be
an for a request sent by a client to a server
DestinationPort: The 16-bit port number of the process
DestinationPort 2 that is the ultimate intended recipient of the message on
the destination device.
Sequence Number: For normal transmissions, the
Sequence sequence number of the first byte of data in this segment.
4
Number In a connection request (SYN) message, this carries the
initial sequence number (ISN) of the source TCP.
Acknowledgment Number: When the ACK bit is set, this
segment is serving as an acknowledgment (in addition to
Acknowledgment
4 other possible duties) and this field contains the sequence
Number
number the source is next expecting the destination to
send.
Window: Indicates the number of octets of data the sender
of this segment is willing to accept from the receiver at
Window 2
one time. This normally corresponds to the current size of
the buffer allocated to accept data for this connection.
16-bit checksum for data integrity
protectionChecksum: A , computed over the entire TCP
Checksum 2 datagram plus a special “pseudo header” of fields. It is
used to protect the entire TCP segment against not just
errors in transmission, but also errors in delivery.
Urgent Pointer: Used in conjunction with
Urgent Pointer 2
the URG control bit for priority data transfer. This field
www.vuassassins.com
Note this table is also included in options column. options may vary
Subfield Size Description
name (bytes)
Option- 1 Option-kind: specifies the option type
kind
Option- 1 Option-length: the length of the entire option in
length: bytes, including the option-kind and option-
length fields.
Option-data Variable Option-data: the option data itself in at least one
oddbll case, this field is omitted(making option
length equal to 2)
FINALTERM EXAMINATION
Fall 2008
CS610- Computer Network
Question No: 1 ( Marks: 1 ) - Please choose one
In Direct point to point communication adding the Nth computer requires------------ new connections.
► None of the given
► N2
► N-1
► (N2 –N)/2
disadvantage In Direct point to point communication is that adding a new computer to the network
requires N-1 new connections .(P# 23)
Question No: 2 ( Marks: 1 ) - Please choose one
In Point-to-Point topology there are two topologies.
► Spanning Trees
► All given choices
Question No: 10 ( Marks: 1 ) - Please choose one
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
► Greedy algorithm
► Distance vector algorithm
► Dijksta’s algorithm
► Non of the given
Djikstra’s algorithm can accommodate weights on edges in graph. The shortest
path is then the path with lowest total weight (sum of the weight with all edges). It should
be noted that the shortest path is not necessarily with fewest edges (or hops).
Question No: 11 ( Marks: 1 ) - Please choose one
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
► Connectionless service paradigm
► Connection-oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given
Question No: 12 ( Marks: 1 ) - Please choose one
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer.
Question No: 13 ( Marks: 1 ) - Please choose one
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used
for all communication with host
► 48-bit
► 32-bit
► 24-bit
► None of the given
An Internet address (IP address) is a unique 32-bit binary number assigned to a
host and used for all communication with the host
Question No: 14 ( Marks: 1 ) - Please choose one
The address __________ identifies the physical network to which the computer is attached, while the
_______ identifies an individual computer on that network.
► prefix , suffix
► suffix , prefix
► suffix , suffix
► None of the given
PREFIX:
It identifies the physical network to which the computers are attached.
SUFFIX:
It identifies an individual computer on the network.
Question No: 15 ( Marks: 1 ) - Please choose one
___________ places the boundary between the first and second octets
► Class A
► Class B
www.vuassassins.com
► Class C
► Class D
Class A places the boundary between the first and second octets. Class B places the boundary between
the second and third octets, and class C places the boundary between the third and fourth octets.
Question No: 16 ( Marks: 1 ) - Please choose one
___________ places the boundary between the third and fourth octets.
► Class A
► Class B
► Class C
► Class D
Class A places the boundary between the first and second octets. Class B places the boundary between
the second and third octets, and class C places the boundary between the third and fourth octets.
Question No: 17 ( Marks: 1 ) - Please choose one
________ field of header indicates whether a datagram is a fragment or a complete datagram.
► FLAGS
► FLAGMENT OFFSET
► IDENTIFICATION
► None of the given
FRAGMENTATION:
IP uses fragmentation i.e. datagrams can be split into pieces to fit in network with small MTU. Each
fragment is an independent datagram. It includes all header fields. Bit in header indicates that the
datagram is a fragment
Question No: 18 ( Marks: 1 ) - Please choose one
______ provides connectionless service.
► TCP
► UDP
► IP
► None of the given
UDP has the following characteristics.
• It is an end-to-end protocol. It provides application-to-application communication.
• It provides connectionless service.
• It is a Message-Oriented protocol.
• It uses best-effort delivery service.
• It follows arbitrary interaction.
• It is operating system independent
Question No: 19 ( Marks: 1 ) - Please choose one
UDP and TCP are both_________ layer protocols
► Physical
► Data link
► Network
► Transport
Question No: 20 ( Marks: 1 ) - Please choose one
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream
interface, Reliable connection startup and Graceful connection shutdown are the services provided
by__________
► IP
► None of the given
► TCP
www.vuassassins.com
► UDP
SERVICE PROVIDED BY TCP:
Following are the services provided by TCP:
• Connection-oriented service
• Point-to-point
• Complete reliability
• Full-duplex communication
• Stream interface
• Reliable connection startup
• Graceful connection shutdown
Question No: 21 ( Marks: 1 ) - Please choose one
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
►Network Interface Layer
► Internet Layer
► Transport Layer
LAYER 4: ensure reliable transfer layer 4 in TCP layering model is transport layer
Question No: 22 ( Marks: 1 ) - Please choose one
________identifies which application program on receiving computer should receive the data
► Logical address
► Source port
► Destination Port
► None of the given
FieldDestinationPort identifies which application program on receiving computer should receive the
data. While field source port identifies the application programs that sent the data. (reference from E-
books)
Question No: 23 ( Marks: 1 ) - Please choose one
________ identifies the application program that sent the data.
► DestinationPort
► Source port
► Logical address
► None of the given
FieldDestinationPort identifies which application program on receiving computer should receive the
data. While field source port identifies the application programs that sent the data. (reference from E-
books)
Question No: 24 ( Marks: 1 ) - Please choose one
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP
► Both UDP and TCP
► None of the given
BORDER GATEWAY PROTOCOL:
It is most popular Exterior Gateway Protocol in Internet. It has following characteristics:
"It provides routing among autonomous systems (EGP).
"It provides policies to control routes advertised.
"It uses reliable transport (TCP).
Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following protocols allows the sender and receiver to enforce polices.
www.vuassassins.com
► RIP
► OSPF
► BGP
► RIP and OSPF
Question No: 26 ( Marks: 1 ) - Please choose one
____________ uses distance vector approach to define routing
► BGP
► OSPF
► RIP
► None of the given
ROUTING INFORMATION PROTOCOL (RIP):
It has the following characteristics:
"It is used for routing within an autonomous system (IGP).
"Hop Count Metric: RIP measures distance in network hops, where each network
between the source and destination counts as a single hop.
"It uses UDP for all message transmissions.
"RIP is used over LAN. Version 1 of RIP uses hardware broadcast and version 2 allows
delivery via multicast.
"It can be used to advertise default route propagation. An organization can use RIP to
install a default route in each router.
"It uses distance vector algorithm.
Question No: 27 ( Marks: 1 ) - Please choose one
ICMP message transport is acted upon by getting ICMP encrypted in IP.
► True
► False
ICMP message transport is acted upon by getting ICMP encapsulated in IP (P# 117)
Question No: 28 ( Marks: 1 ) - Please choose one
Protocol addresses are abstractions provided by ___________.
► hardware
► software
► operating system
► internet
Protocol addresses are abstractions provided by software
Question No: 29 ( Marks: 1 ) - Please choose one
These packets serve same purpose on ________ as frames on ______
► Intranet, LAN
► Internet, WAN
► Intranet, WAN
► Internet, LAN
VIRTUAL PACKETS:
These packets serve same purpose in Internet as frames on LAN
Question No: 30 ( Marks: 1 ) - Please choose one
Address mask defines how many bits of address are in suffix?
► True
► False
Address mask defines how many bits of address are in prefix. Prefix defines how much of address
used to identify network.
Question No: 31 ( Marks: 1 ) - Please choose one
www.vuassassins.com
► True
► False
The chief problems with multiple networks are as follows:
• A computer attached to a given network can only communicate with other
computers attached to the same network.
Question No: 33 ( Marks: 1 ) - Please choose one
The term self-identifying is used for Classful IP addresses because the class of the address can be
computed from the address__________.
► itself
► prefix
► suffix
► mask
Classful IP addresses are self-identifying because the class of the address can be computed from the
address itself
Question No: 34 ( Marks: 1 ) - Please choose one
Find the class of the address.
10100111 11011011 10001011 01101111
►A
►B
►E
►C
Reference table handouts P # 87
Question No: 35 ( Marks: 1 ) - Please choose one
Find the class of the address:
11110011 10011011 11111011 00001111
►A
►C
►E
►B
Reference table handouts P # 87
Question No: 36 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the protocol address is determined by hardware
address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
►T
►D
►C
► T, C
Reference table handouts P # 97
Question No: 37 ( Marks: 1 ) - Please choose one
www.vuassassins.com
Total Question 40
30 MCQs
70 % mcqs coming from attached file
some mcqs given below
1) When an application--------------- data, it makes a copy of the data available to all other
computers on the network.
► Broadcasting
► Multicasting
► Unicasting
2) Ethernet uses a ------ bit static addressing scheme in which each device is assigned a
unique address by the manufacturer.
► 64
► 48
► 32
►8
3) The product of delay and throughput measures the _____ of data that can be present on
the network.
► Area
www.vuassassins.com
► Volume (supposition)
► Length
► TCP
► UDP
► IP
► BGP
► OSPF
► RIP
► postfix, Infix
► non of these
► Infix, prefix
► prefix, suffix
7) ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
► 32, 48
► 24, 32
► 32, 64
www.vuassassins.com
► 32, 128
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
►T
► C (Supposition)
►D
► C, D
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
►T
►D
►C
► T, C
10 )We use the term _______ to refer to a measure of the path that routing software use
when choosing a route.
► routing path
► routing metric
► routing
► switching
► Star Topology
► Ring Topology
www.vuassassins.com
► Bus Topology
12) An interface for thin Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
13) _______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Internet Layer
► Transport Layer
► BGP
► OSPF
► RIP
4 question of 2 marks
i) question regarding Ip-multicasting (arbitrary computer to join multicast
group)
ii) CRC detect what kind of error
iii) define IPV6 NEXT HEADER
iv) question regarding the metric of routing protocol
4 question of 3 marks
i) describe three feature of closed-form computation
ii) TCP timer for retransmission
iii) Difference between forwarding and routing
www.vuassassins.com