0% found this document useful (0 votes)
27 views13 pages

Assignment Week 1-12 Solution Jan-April 2020

The document contains a series of assignments and questions related to computer networks, covering topics such as atomic actions, critical section problems, thread and process characteristics, network devices, and protocols. It includes multiple-choice questions with correct answers indicated for various networking concepts, assignments due dates, and course outlines. The content appears to be part of an educational course on computer networks, specifically structured for assessments and learning objectives.

Uploaded by

Priyanshu Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
27 views13 pages

Assignment Week 1-12 Solution Jan-April 2020

The document contains a series of assignments and questions related to computer networks, covering topics such as atomic actions, critical section problems, thread and process characteristics, network devices, and protocols. It includes multiple-choice questions with correct answers indicated for various networking concepts, assignments due dates, and course outlines. The content appears to be part of an educational course on computer networks, specifically structured for assessments and learning objectives.

Uploaded by

Priyanshu Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 13
revewwd@rcliinacin NPTEL » Computer Networks and ‘About the Course Ask a Q. Unit 2 - Week 0 Assignment 0 Cours oxting Assignment 0 eae ee Te de doe or suiting thi asgnment hs posse Due on 2020-01-27, 23:58 IST. cornet 'As per ourrecores you have not submtoa ths assent ous pctrrsento +) What is an atomic action? 1 point ar 42) sequence of instructions te be executed without any interruption. a] ) A sequence of instructions can be interrupted during the execution =» Iti a synonym of the single threaded process. weeks 4) None of the above. » Wook 6 A Week 7 a wee ‘Accent Anewers: Wook 8 0 ap 2 Amongithe three given inthe following, what are the requirements of acritical section problem? ome was 1) Mutual exclusion Weck 12 1 Progress. Text Tarezrte Bounded waiting. Det Station Select the correct option. Ue tnteactive Seaton 2) 0nWyi bon al a)only tt » a ‘Accepteg Aree: e ) Which statements are true for thread and a process? ome 1) Both execute a series of instructions TVA process is easy to create while thread requires duplication ofthe parent thread. i Communication between processes requires IPC. However, communication between threads inthe same process does not require any IPC. hv) Processes are independent, hile threads are dependent. Select cored option: 2) Only Bi bjonlym &w ) Only land i aa » a a to, america Sear Accenteg Aree: @ ©) What true fora ueer-sace program? pom 8} Auser space program dlrectly interacts with the hardware. 1b) A userspace program manages all the system resources. ©) Auser-space program has limited access tothe system resources, 4) Device divers are examples of a user program. » a ‘Accent Answers: e 8) What isnot true far a system call? ome 2) System calls are an interface to contact with the kernel ‘yA program has to wait untila system cal irishes its work. System call generates software interrupt forthe kernel «) Kernel module needs the system cal to interact with other kernel modules. » » 4 ‘copie Anewors s ©) Which ofthe fllowing isnot an inter Pracess Communication (IP) methodology? — 1) Named FIFO ') Remote Procedure Call ©) Queue Pipe » a Accent Answers: e 7) Among the following techniques, which does provide a solution fora critical section problem? ome 4) Shared memory by Mutex Pipe Queue c) a a te, anmeriaicae. ‘Aecentes Arewer: y How do you execute @ new program as a new process inthe Linux system? ‘point 2} Fork ) Fork followed by exec Bee 4) exec Followed by fork a % @ a serio ‘Aeceptes Aree: x © Find out the correct statements from the followings. ‘point |) Operating System isan example of a sytem program. 1) Cal by eeference fs avalabe in the C programming longuage. ) Media codecs are kernel space program: |n) The red-black tre is typeof selF-balancing binary search ree. Select appropriate option: 2) Only b) Only iv Oni i ‘Only Riv c) a a te, anmeriaicae. ‘Aecentes Aree: ° *9) what willbe the output ofthe following C program? pom ant main(){ ant = 6; af (i> 5) af (i> 9) 1-0 else a7 printf("ad\n", i): return 0; » ar p10 Je 4) Compiler dependent ‘copie Anewors o arr ‘Avout the Course Aska Qu co Unit 3 - Week 1 Cours oxting Week 1 Assignment 1 evant cot grag pet pe won 20-02-12 2550 1 eae aera aoe Manco neienmens A router works in to te a. Physical Layer es Daa Link Layer nr Network Layer ace Nt Pret 4, Transport Laver (tsar 3: Data Noor — Diet Leyrsal be to, america Pree Sic Soir ‘Accented Aree: tac 5 Aposton ayer é “Otero Prize ‘depletion Layer 2) Which of the following network device is uced for interconnecting two LANs werking om the ‘ame same protocel? (ute: Weck Aananment« We Feta Repeater b. Hub as 4. None ofthese erica ecepes Anawer: wees 3) Which of the following is a transport layer protocol? pot se) a. SMTP Wook 11 b. UDP ICMP weet 2 a Text ranserots Downlond videos 2 Live ieractve Sesion to, anor iicore. sect owas © In which layer NICs work? 1 pote a Network Layer ». Data Link Layer . Transport Layer <. Application Layer a ‘pecertes nawers ® 5) Which ofthe following nerwork device filters network traffic based on the MAC adresses? ol 4 Bridge 1b. Rowter «, Repeater Hub ‘copie Answer © Telephone system network is the one af example of: coe a. Cisuit switching 1 Packet switching ©, None of these pwr. ‘Accented Aree: 7A file of ‘x bits’ is sent from host A to host B over a circuit switched network that uses TDM. ‘poi “with ‘h slots’ and havea bitrate of *R Mbps’. The citcuit establish time is k seconds. Find the total time, a (AHY/R secs b. (Thy + k) secs (SYR secs 4. (UR +k) sees t,t anor iio. scopes owes: © Datagram switching is @ 1 point ‘2. Conmection-otiented packet switching . Connactionless packet switching None of these scsi fons: 5) Which protocol is used to acquire the MAC address ofa host whose IP address is known? ol ‘4 Dynamic Host Control Protocol , Address Resolution Protocol . User Datagram Protocol 1d. None of these to, america Sear ‘Accented Aree: "© Which ofthese following protocol prevents out-of-order delivery of data? pom &.DNS ».UDP TCP 4. None of these ‘econo Anewor arr aren ‘Avout the Course Aska Qu roviowes@rotl imac Mento Unit 4 - Week 2 ‘Course outtine Lace 6 Apleaton aye “Danan Nae Bsons Lec 7: ston Layer (tech Apso Ler IN Hyprtea Tte Lec 9: Aopen Leer (Lach 10: aio Layer Vp rareo tac mati of Wok 2 (ute: Week 2Aasgnment 2 Wook 7 ‘ext arsenite Week 2 Assignment 2 ‘eae dete for suming hs ssgnment hs essa Due on 2020-02-12, 23:59 IST, sper ourrecores you have not submtea ths esr Which of the following is a remote login application? atalnet ».DNS <. SMTP FTP ‘copie Answer ® whieh of the following network management command is used for querying the DNS? a. netstat b. nslookup whois 4. None of these eet tomar: 8) Which of the following file is used to configure DNS in the client side? achosts bb nsswitch.conf «.reselv.conf <4. np.cont en sneer icome ‘Accepts Aree: Which ofthe following system call puts the server socket ina passive mode and waits forthe ‘lient to approach the server to make a connection? buaccept «listen aubind Accept newer: 8) FTP control connection is initiated on port number 3.20 bat 80 43, eet tomar: ©) HTTP cookie ie stored in a, user's computer . None of these ° ‘Accented Aree: 7) Which port does HTTP ws in tausport layer? 380 baa 20 dat ‘Aesop Anewors: © Telnet does not use any security mechanism and transfers the data over network/intermet in & plain-text form including the passwords. Tue b. False . Smee ‘Accented Aree: 8) SMTP servare commonly use the TCP on port number at b.22 oB 4.25 to, america Sear ‘Accented Aree: 9) SNMP is an application ayer protocol which is used to ‘transfer mail from one user to another 'b. monitor the network, detect network Fults ete «c.move files between local and remote filesystems 4. transports messages between devices eset: 1 point + point + pom: 1 point + pom: ‘ome + pom: ‘ome ome ‘About the Course Ask a Q. Cours oxting Week 3 Assignment 3 a ee The de doe or suiting thie asgnment hs posse Due on 2020-02-18, 23:58 IST. cour wor AS per our records you have not submitted this assignment. 2. Which of the ftlwing layer provides ost hos communication services for pplictions? ‘oan ots Date tink Laver ee bb. Network Layer ms Teapot eee ere] @LAppiaon Layer "= Connection (Comte) * Pee a (@ Lecture 18: Transport Layer Y o a taaerae onto 2 Daaom node communication wed byte IP end UDP potcl wet dats maybe deed tom vm out of order. ur espe “Wee 3 Feeback Foe a Tue b aae ons : er ——— Weak © Which of the following is a reliable protocol? pom weeks a TCP wo uve sawn ¢ None dase ieee : — eS 4 Congestion contol prevents senders fom overhelning he ~~, lw ome reverts ‘rte the sender from overwhelming the — a receiver, network 2, network, ceceiver csender, receiver 1d, None of these No, tna anawericincatct scopes owes: 5) Te establish a connection, TCP uses a three-way handshake because both sender and receiver 1 point need to synchronize their segment sequence numbers used during their transmission, a. Tne b. False ‘Aesop Anewor © The Protocol Data Unit (PDU) ofthe transport laver is called + oi a Packet ».Bit Frame <4 Segment cepa ene: ” The field contains the next segment number thatthe sender ofthe 1 point acknowledgment expects to receive 1. Sequence number , Acknowledgment number ‘cori Anewors © In =, duplicate packets from ¢ previous conection (which has been closed) between the 1 point ‘nso nodes might still be floating on the network. a. Qaway handshake bb, Shway handshake . ‘Accented Aree: 8) Which of the following is the correct statement? pom a. TCP is unreliable, IP is uneeliable b. TCP is liable, IP is teliable . TCPis unreliable, IP is reliable 4. TCP is eliable, IP is unreliable a Smee Accented Aree: ¢ 91 Whieh of the following isthe correct statement? pom Go Back N ARQ rejects out-of-order packets 1, In Selective Repeat ARQ, out-of-order delivery can not happen ¢ InGo Back N ARQ, number of retransmissions in case of packet drop is 1 44. In Stap and Wait ARQ, lost data problem is recolved by eequence number ‘copie Answer Unit 6 - Week 4 ‘Course outtine Management nd Covgetin Lace 18: Taner ayer ut woo Assignment ¢ Wid Fence Frm Wook 7 ‘ext Warcorote reviowet@rptlimacin y ‘About the Course Week 4 Assignment 4 ‘Ted date for submiting this asgnment ha passa Due on 2020-02-26, 23:59 IST, 'As per ourrecores you have not submtoa ths assent Consider the bandit 9s 50 Kbps, one way tant time=240 mses ad the segme pst 1000 bit. Consider the event ofa seament transmission andthe corresponding ACK reception Find the maximum numberof segments shat canbe oustanding during this duration. (23 24 3s (26 ‘@ 8 ° 0 to, snes ests Anoers: 8 2 nthe sender. application data is sent from the transpor layer to the IP layer by the —— ell point (read, (ite) (© received) ® ® © esp Aner: S 8 Sender and ressiverneeds ro dynamically adjust buffer allocations for * pot {@) low contol (©) conzestion contr © reliability (@ connection estalisimnent © ® 8 6 seca Ars e ° © Transport layer is implemented in psi (9) Userspace (6) Kemel ® 8 to,neanmainncorc ests Aree: ° © merder to avoid congestion, the sending rate should be poi (0) receiver ate (©) maxinuannetwork rate, eceiversate) (6) a some aise. ‘Accented Aree: a 2 How long does the receiver wait before it sends a delayed acknowledgment for receiving ew mote packets? (RIT (oy 2-RTT (9)250ms. (2) 300 ms ” » » 8 ‘Accent Answers: o 5) Nagle's algorithm states that send a short packets in a TCP connection unless the previous short packets are acknowledged by the receiver. (a) True (0) False ” » ‘cent Answers: ° ©) Whenever the receiver advertises a large window sie, silly window eyndiome happens. (a) Tue (b) Fase » 5 ‘copie Answers o 8) The solution to silly window syndrome problem iste (2) Nagle’ algorithm (©) Clark's solution (© Jacobson’ algorithaa (@ None of these e 2 ° « erica. decent Answers: « ° 8 TCP stores the out of order data if there is space in receiver window, and sends a duplicate ACK. (Tie (0) False 5 to, anor isicore. ese Answers: a 7 Jacobson’s algorithm is used to (@) solve silly window syndrome problem (b) handle out of order data problem () caleulate dynamic time out timer “ 5 8 ‘econ nave o © Which ofthe following TCP timers avoid deadlock when receiver butfer is announced as zero? () Tine wait timer (©) Rewansmission timer (©) Keepalive timer (4) Persistent timer 5 8 a t,t anor iio. ‘Aeceptes Aree: @ © Kamis Algorithm ignotes reuansmitted segments when updating the round-trip time estimate, (a) True () False « 5 te, anomeric. ‘Aecentes Aree: a “*91 In the slow start phase in TCP congestion contol, the congestion window is increased (6) linearly (b) exponentially (©)nane of these » » ® ‘ecopte Anewors o 1 point 1 ome ‘pone + pom: + point + oi 1 point ‘pone 1 point 1 point ee Se ‘About the Course roviowes@rotl imac Mento Unit 8 - Week 6 ‘Course outtine tec 28: Noto Layrt— (st Casts sang (hvet-cioR (hve Newon Aas Taran aT) (ute: Week sananment 6 ‘ext Wareerots Week 6 Assignment 6 ‘Ted date for submiting this asgnment ha passa Due on 2020-09-11, 23:59 IST, 9) The network layer doesn't guarantee delivery of each packet, and doesn't promise to deliver them in the same onder. @ Tue (False » » goer ‘Accented Aree: a 2 wi communicating with another IP adress? @r (ice (oMQrT (ante of the following protocal i used by the routers to send error meseages when » 2 ° « te, anomeric. ‘Aecentes Aree: o © What is the maximum number of hosts that can be atached to a Class Ain the [Pv addressing system ? 26 (2016-2 2a (774-2 » ® a ‘Aecentes Answers: o 9) The adavess of a class B host isto be split into subnets with a6-bit subnet number. What i the macinum number of subnets and the maximum number af hosts in each subset? (a) 62 subnets and 262142 hosts, (©) 64 subnets and 262142 hosts. (©) 62 subnets and 1022 hosts. (4) 64 subnets and 1024 hosts, « » e “ on never aca ‘conte Answers & 5) Given IP Address: 172.16 0.025, find the umber of subnets and the numberof hosts per ube. (9) 514 subnets and 128 hosts per subnet (©) 512 subnets and 126 hosts per subnet {(€) 814 subnets and 126 hosts per subnet (@) 512 subnets and 128 hosts per subnet » » ® a ‘Aesop Anewor o 9 Inthe 1Pv4 addressing format, the number of nerworks allowed under Class C adresses is (24 wer (221 (2 » » & “ one rene incomet. ‘copie Answers & 7 Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same netmask N. Which of dhe values of N given below should not be used If A and B should belong to the same network? (@) 255.255.2550 (6) 255.255.255.128 (c) 255.255.255.192 (a) 235.255.255.224 e > ° « i, sneor nico. ‘Accepts Aree: @ 5 NAT canhelp to balance the load of muldiple identical server accessible from a single IP address, (The 0) Fase » ‘ccente Answers: a 8) 1P6 supports broadcast mechanisms (Tne (False » (o DES26A: (@AECE::1:600: ® » 8 6 ‘econo Anewors o 1 point pom 1 point pom + pom: 1 point pom pom ‘About the Course ‘Course outtine (hats 3) (Ganctas notte) (aie Pong Tle Shope). (ae Serasng) United a ete Seren anc) ‘ute: Wook 7 Assanment 7 ‘ext arsenite Week 7 Assignment 7 ‘Ted date for submiting this asgnment ha passa Due on 2020-09-16, 23:59 IST. 'As per ourrecores you have not submtoa ths assent +) Here two computers are connected via link. The bandwidth ofthe inks Mbps (Mops = 20° ‘point ‘its per second) and the delay ls SOOmilizaconds. Assume that you are sending 2 SMIB (aMebinyte (Mia) = bytes fle from A to 8. What wl be the transmission delay and the propagation delay? wows . BT] 9) Transmission dele: 05s, propegstion delay: 1.5350%e¢ 1b) Transmission delay: 10.48576se, propagation delay: 05sec {Transmission delay sec, propagation delay: 1.31072 1) Transmission delay: 1.31072se, propagation delay: sec » a ‘Aecente Answers: o 2 Whats a service level agreement? 100m 8) Tels the agreement to maintain constant bitrate, Its the agreement to maintain reliable connection between two hosts. )_ tis the agreement to maintain Os. Ie the agreement to maintain connect c) a a te, anmeriaicae. ‘Accented Aree: e © What does traffic shoping do in QoS? et 48} ‘Itregulates the incoming traffic rate. It regulates the outgoing trae rate )_Itpriortizes the outgoing flaw as pr polly. ) Mepriortizes the incoming flow as per policy. » » @ 4 on rovers icaat Accept newer: x ©) Assume thereisa token buffer traffic shaper with token arrival rater and bucket size tf packets arive in ‘pom bursts witha burst interval of time t and an arial rate ofp, what the maximum deperture rate from the traffic shaper? a) ep be 2 bt 8) (ony » a ‘Accent Anewers: 7 5) Given the arrival rate inthe table, how long wilt take to clear the trafic with a leaky bucket traffic shaper 170m having a leak rate of Splt per sec and bucket size 20pkts. How many packets does it need to drop? ‘Start ime (ese) End time ‘Arial rat =) 4 © 7 10 2 3 2 4 8) 124 sec, 20 packets dropped b) 13.4 sec, 15 packets dropped 6) 144 sec, 10 packets dropped 6) 15.4sec, 5 packets dropped a » @ 6 on rovers cat ‘econ Arewor 2 Whats (re) true for intserv and Diffserv? 1 point 2) DilfServ provides 008 by eiferentiating trafic based on the information available inthe packet ‘while Inter provides Qos based onthe service agreement b}IntServ architecture is suitable forthe Internet scale service while Diffserv provides guaranteed end-to-end Cs. )_iffServaware routers implement per-hop Qo behaviors while IntServ maintains end-to-end Qos by resource reservation. 4) Bandwidth broker is required in ntSer architecture while RSVP fs required for DIServ architecture, a ) o a i, sneak ‘Accepted Aree: a 3 7) Whatis true fora resource reservation protocol? ‘point 12) tls 2rauting protocol 1b) tris to reserve the required resources throughout the path RSVP demon tas to only remote routing protocol daemon. a ©) What happens in trafic classification and conditioning? ‘point 4) Mapping packets to a forwarding class supported in the next DS domain 8) Choosing the correct path fer a packet to forward tothe next notwork }_ Reserving the resources in next DS domain to provide Inter 4) None ofthe above » a ‘Accent Anewers: 7 ©) Random Early Detection (RED) queue is used to pom ‘} avoid congestion inthe network before it ocous. ') drop random packets from the queue to make space for anew packet. )_ provide fatr queuing among the efferent classes of wai 44) smoath out drop prabablity across all the flows. » » 4 on reer scat Accept newer: a a 7° Why i TCP traicelastic trafic? samt 2) TC sends waffle ata constant rate. b) TOP adjusts trae rate based on congestion. TCP maintains end-to-end flow contro, 4) None ofthe above: ‘copies Anewors s ‘About the Course Unit 10 - Week 8 ‘Course outtine vento spn Week 8 Assignment 8 ee ‘eae dete for suming hs ssgnment hs essa Due on 2020-09-25, 23:59 IST. sper ourrecores you have not submtea ths esr ) What does the router do? tm = 2) Route pockets rom one port to another in the sme sub network = b) Route packets rom one network to another network. .. €) The routers another name ofthe HTTP serve, serves webpages ns <)Mone ot te above, Wook 6 ° 3 ron ° ° Week & ed ctsanmieneaenie Oy nan: faronte 5 routing 2 What is the network address for the following IP addresses: tm ‘tome Rouge I]IP Address: 10:5.27.15, IP Mask: 255,255.288.0 Legon eran i Adres: 1721812100, 1 Mk 2528000 a Select he orc option nan 0:faronte vero, ann 105.240,9)17218.20 ae byn105.270,m a7238120 cota web Ansignment 1) 10.5,24.0, ii) 172,16.0.0 4)9105270,1917.3600 = A Week tt * 3 wt seymour mee ver ee a * 9) How does the router decide the destination if multiple entries in routing tables match with the destination 1 oe on sate? 2) pes the frst one Dy pls the destination wth the longest refi mtcing tees the destin th he shore rete mtg 4) pics the st matched destination . 5 : 3 seme Amr 6 4) What are the correct statements in the context of an autonomous system (AS)? — 1) Avast Scans walt om one ASto anater. 1) Tat AS by dtol muthome AS. 1) AsubAS can ot ca ay tana afte See! he comet optns an by wa a wai oe . 5 ° 3 tesbeg nom Sco Anu : 5) For the following network, what willbe the routing table Information for nade € if we use a link state i= rong pet Qa i : / a : 4 * » 6 a a 5 5 5 seve hor 5 © nPke tom «tance vector outing poten by nk sae outing retool hPa vector ting eel 3 router needs tobe configured in 2 way such that forwards all packets whose destination IPs are in ‘ont the range of 172.2400 to 172.25.255.255 to the gateway 192,168,238 though the interface enpds2. Select the correct command a) ap route add 172.24.0.0/15 dev enp®s2 b) ap route add 172.24.0.6 via 192.168.2.38/16 dev enpas2 c) ap route add 172.24.0.0/16 via 192.168.2.38 dev enpOs2 4) ap route add 172.24.0.0/15 via 192.168.2.38 dev enpas2 eB 3 “1 i 5) Which options are true for SDN? pom 4) SDN moves the contol plane to a centralized server. by) Switches inthe SDN need to be very smart, )_llthe traffic inthe SON needs to go through the controler. 4d) The switches contact SON when a packet does not match with any af the enstng rules. a some aise. ‘Aecenteg Anewer: a a Select the Openfiow controle. 1 pant a) NS bya ) omnetss ) Opendaytghe 5 4 doesn wwe: e ® 7 Whats the advantage of using a network emulator over a network simulator? + point 8}, Emulator alls caleulting things that have to go through the network instead of actually sending them, 1b) allows the user to set up an arbitrary network ina single hardware, «)Itean be used in rel network applications 4) Mathematical model canbe executed without implementing them n eal network. 5 3 1 ome 2} -mn—topo single3.4 b)-mn-topo single 43 6) mn~topo tinear 3.4 ) mn topo linear 4.3 i, sneer inicoe. ‘Accepted Aree: ° what is true forthe north-bound interface in SON? + point 19}, North-bound interface communicates teaffic withthe higher plane'in the SON, 1b) Communication between data-plane and contal plane happens via the northbound interface. 6) Allthe automation and orchestration ofthe system takes place via the north-bound interface, 4) The controller controls the packet through a north-bound interface » cy) a a te, anor isicore. Accepted Anewer: a 3 7) whatdoes a data-piane do? ome 42) Decide where to send a packet based on a central policy bi). Forward the data packet } Contigute the hardware 4d) None of them ‘copies Anewors s ‘About the Course Ask a Q. Unit 12 - Week 10 —— : Week 10 Assignment 10 ee ‘eae dete for suming i ssgnment hs ossae Due on 2020-04-06, 23:59 IST, sper ourrecores you have not submtea ths esr * whatis the difference between MAC sublayer and LLC sublayer? ‘point 2), LLC multiplexes date from network layer ane demultplexes data to network layer, MAC layer Week 2 provides mechanism to access the physical medium to recelve and transmit data b)Uallows a network device tobe uniguely identified in a LAN, MAC multiplexes date from network c= layer and demuitiplexes data to network ayer. 7 LLC optional if error control net required, MAC Is optional flow contra snot reeulred. 1) ULC provides flow control and error control over two devices in 8 LAN, MAC yer uniquely week's identifies a network card in a LAN Wook 6 » » week? ot weeks 4 on never aca wee ‘econ Anewor o Week 10 | Over sper 802.3 standard, what ithe length of MAC address? 0m Boi Coron 9) 128 ots (Lect 8: Oa Ln Layer by) sabe Leche 49: Oa Lik Lager o} Bbite eration) 4) none of ther Lac tit Wk 10 » a ate men Assen 5 ma WionaFos te, anmeriaicae. ‘Accented Aree: Week e ook 12 3) Which options are true? points SES 28) CSMAYCD should be used when the transmitter and the receiver can not be turned on Download videos srnuitaneously eta Sraton b) CSMA/CD have less collision probability than that of Aloha Live erste Sesion ©). Slotted Aloha does not sense before sending data 18) Anode can stat transiting date only at beginning of slot slotted lah > a te ne anoweraincanee, Sear ‘Accented Aree: > @ a Aloha (slotted or pure) used in wireless medium because pom 4) Itis not ahvays possible to detec collision aprior due to hidden node b) Itean detect eoliion faster than CSMA/CD )_ It detectshidden nodes before transmitting data ) It clears the paths before any transmission. c) a a te, anmeriaicae. ‘Accented Aree: a 5 whats the difference between a repeater and 2 hub? pom 2) Arepeaterrelays/amplifes/regenerates incoming signals and forwards. Hub forwards incoming signal to al the outgoing ports 1) Arepeater allows multiple computers tobe connected. Ahub increases the coverage ofa signal ©) Arepeateris an analog device, while a hub isa digital device. 1) Multiple repeaters can be connectedin the form of a chain to increase range, mukiple hubs an be connected inthe form of a ee to connect more devices » » 2 8 one nema incomet ‘Aesop Anewor o @ © What are the properties of itched ethernet? pom 4} Filter segments based on IP address 1). High tization of computer networks 1) Unencrypted data leakage can be avoided 4) Colson rates very high > a a to, american Sear ‘Aecenteg Anewer: > e 7) What does preamble doin an ethernet frame? 1 point 4), Provides packet level synchronization 8) Provides frame-level synchronization ©} Provides byte-leve synchronization «d) Provides bt level synchronization » >) 4 ‘Accept Answers: s ©) Whats true for bridged ethernet? pom 2) Colsionis nota all posible in bridged ethernet b)_ Bridged ethemet breaks the cllion domain by separating LAN 1). Bridged network reduce the overall throughput a result of excess overhead 4). Bridge networks efficency lesser than that of switched network * » 8 4 one newer incomet ‘copie Anewor s a © whats the purpose of random exponential backof!? ‘point 2} It guaranteed that collision will nt happen on nest try b)_Itdecrease the chance of colsion during next try _Itinereases congestion inthe network 4) Ie decreases latency in of packets 2 » 8 4 ‘copie Anewors s "01 What are the options that ae true for channel access methods? ‘point 4) Token pasing channel access methods prouide better uization of channel bandwidth under heavy load 1) Contention base channel access methods provide better(lower transmission latency under ight lood )_ Contention based channel access methods proude bettr(lower) transmission latency under heavy load 4) Token posing channel access methods provide beter uization of channel bandwidth under ight load sose erica ‘Aeceptes Aree: a 5 arr revewwd@roin aren ‘Avout the Course Aska Qu Mento Unit 13 - Week 11 ‘Course outtine BoOT.DHC? oore Sucre) Lec 54: Gonrsng Wind Feeback Fon ‘ext Warserots Download Videos Week 11 Assignment 11 ‘Ted date for suming this asgnment has passa Due on 2020-04-15, 23:59 IST, 'As per ourrecores you have not submtoa ths assent Which of the following TCP/IP protocols is used by a skless machine to obtan its IP address from a 2) RP b)RARP ROP od) ARP > » 8 4 Accept newer: x hich statement describes a spanning tree network that has converged? 2) Allswitch and bridge ports areelther blocking or looping. 'b) Allswitch and bridge ports are in ether the forwarding state or the blocking state. }_Allswitch and bridge ports are Inthe forwarding state 4) Allswitch and bridge ports are assigned a either root or designated ports. ‘econo Anewors s 8) Which s not detected for hidden stations in wireezs LAN? 2) Signal 1) Colision Frames 6) ate ‘econ Anewors x "How does the wireless LAN solve the hidden node problem? a) By extending the antenna to different locations ) By introducing RTS and crs ¢)_Byintroducing random backoff ) None ofthe above » a to, america Sear ‘Accented Aree: o 5) A set that makes stationary or mobile wireless station and alo have optional central base station fs known 2). Extended sevice set b)_ Network point set ©) Baslesenice set 1) Access pnt ” a a e snoer insane. ‘Aecente Aree: @ ©The address resolution protocol (ARP) is used for 2) Finding the P address ofthe defaut gateway. 1) Finding the IP adress from the ONS. } Finding the MAC address that corresponds toan IP address 4) Finding the P dress that corresponds toa MAC adress. » cy) a a te, anor isicore. Accepted Anewer: e 7) Which component of ARP is responsible fo sending # reply tothe data link layer? 2), Input Module 1) Queue Contrtier ©) Cache Controller 4d) Output Module ‘copie Answers 7 ©) Which ofthe fellowing describes the function of RARE? 2) leis used to map a 32-bit address to. 48-bit ethernet address 1) is used to map. 32-t ethermet adress toa 4-bItP address )_ tls used to map a da-bit ethernet address to 32-bit P addres. 6) tis used to map a 48-bit IP address to 2 32-bit ethernet address ‘Aesop Arewor 2 ® Which of the following is used to create a subnetting effect without explicitly declaring agatewey? 3) Routing Table b) ARP Table ©) RARD Table ) Cache Table ‘econo Anewors s 7) Which ofthe Following sfare provided by VLAN? 8}, Congestion control ») Wireless communication ©) Timeetficiency ) Reduce network traffic te, anomeric. ‘Aecentes Arewer: e a 1 point 1 point + pom: ome 1 ome 1 point + point + pom: ee ‘Avout the Course Aska Qu co Unit 14 - Week 12 —— : Week 12 Assignment 12 ee ‘eae dete for suming i ssgnment hs ossae Due on 2020-04-22, 23:59 IST, sper ourrecores you have not submtea ths esr Which ote flowing verte for Tme-Divsion mnipl access CTDMAY? ‘eit 2) Provides event equncy band t deen data steams woz 1) Provide diferent code o different spreading code radios. 6) Provides diferent ime dot to fet transmiors woos 4) None ofthom wet _ Week 5 by 3 Wook 6 a toyneweerincorct erp brows: Week 8 ° Wook 9 2 What is the maxinmm magnitude bit rate in a noiseless channel if signal level L=2 and bandwidth=BW is tm ted week 1o a) Halfof BW vweaest 5) Same a BW ©) Double of BW Weak 2 © None ac Lap Pp 5 rr : Lace 8: Lp Pa 3 pet 3 acre 7 ape Pr to, aero a savy Lace 8 Ne Sout eas secu ea Sey 9) wnt peo sia can be tnasmited by Brondband> "rome Lecture 60 Network Secu a re. =P ») Dest mig i ©) Both Analog and Digital tec maw et 3 kee aie: Wook 12 Assign 2 » Wind 12 Fat Frm c) a Text Tarserts : Download visor te, anmeriaicae. ‘Accented Aree: Det Station Ee coc Find the correct statement related to TP Security 1 pain 4) The transport mode protects the original 1P header. 1) The tunnel mode does not protect the original IP header. ©) The transport mote does aot protec the original IP header. ‘)) The tunnel mode protect the original IP header. ‘copie Anewors o a 5) What atacis used to make a computer resource unaiabl? psi 2) Denil of service 1) Backsoors 6) Bates ovelows 4) Snooping i, sneer inicoe. ‘Accepted Aree: a © wats the sequence for PCM? ‘poi 8). Sampling, Encoding Quantizing pecan Anewers 5 7 Fad the channel capacity if the SNR af a tlephone line wi bandwidth of 3000 Fis 10259 point 2) 3 bps ») 3bps ©) 30% 8 30Kbps » >) a ‘ecertes Aomwers 3 Find the security property ifthe dats ofa computer cystem canbe modified only by authorized parities ct 2) neeity 1b) Coniideniity ©) Authennety Availablity c) a a te, anmeriaicae. ‘Accented Aree: a 8 Which type of femal suse fo prevent direct TCP connection Between the host? psi 2) Proxy Server 1) Chen evlgnteways ) Packt filters Appheation level gateways ‘econ Anewors x 0) Which ofthe following coding techniques i wed to gt the maximum synchronizing capability? 1 point 2) Pseudotemary 1) Non Return to Zero inverted (NRZI) (©) Manchester D) Non Return to Zero-Level (NRZ-L) ‘Aesop Anewors o

You might also like