Networks
Networks
Q−R1−R2−R3−H
A. Only I1 and I2
B. Only I1
C. Only I2 and I3
D. Only I3 and I4
A. n(n−1)/2 , n−1
B. n, n−1
C. n−1, n
D. n−1, n(n−1)/2
5 How many characters per sec (7 bits + 1 parity) can be transmitted over a
2400 bps line if the transfer is synchronous ( 1 start and 1 stop bit)?
A. 300
B. 240
C. 250
D. 275
A. 250 milliseconds
B. 20 milliseconds
C. 520 milliseconds
D. 270 milliseconds
A. 192
B. 240
C. 1920
D. 1966
8 One SAN switch has 24 ports. All 24 supports 8 Gbps Fiber Channel
technology. What is the aggregate bandwidth of that SAN switch?
A. 96 Gbps
B. 192 Mbps
C. 512 Gbps
D. 192 Gbps
9 Data is transmitted continuously at 2.0482.048 Mbps rate for 1010 hours
and received 512512 bits errors. What is the bit error rate?
A. 6.9 e-9
B. 6.9 e-6
C. 69 e-9
D. 4 e-9
10 How many bytes of data can be sent in 1515 seconds over a serial link with
baud rate of 96009600 in asynchronous mode with odd parity and two stop
bits in the frame?
A. 10,00010,000 bytes
B. 12,00012,000 bytes
C. 15,00015,000 bytes
D. 27,00027,000 bytes
A. I only
B. II only
C. III only
D. II and III only
13 Which of the following addressing modes are suitable for program
relocation at run time?
I. Absolute addressing
II. Based addressing
III. Relative addressing
IV. Indirect addressing
A. I and IV
B. I and II
C. II and III
D. I, II and IV
A. Indirect addressing
B. Indexed addressing
C. Base register addressing
D. PC relative addressing
A. Co – routines
B. Position – independent code
C. Shareable code
D. Interrupt Handlers
A. 125,7
B. 125,10
C. 135,9
D. 135,10
How many bits of the control words can be saved by using vertical
microprogramming over horizontal microprogramming?
A. 00
B. 103
C. 22
D. 55
The ALU,ALU, the bus and all the registers in the data path are of identical
size. All operations including incrementation of the PCPC and
the GPRsGPRs are to be carried out in the ALU.ALU. Two clock cycles
are needed for memory read operation – the first one for loading address in
the MARMAR and the next one for loading data from the memory bus into
the MDR.MDR.
The instruction ‘‘add R0, R1”‘‘add R0, R1” has the register transfer
interpretation R0⇐R0 + R1.R0⇐R0 + R1. The minimum number of clock
cycles needed for execution cycle of this instruction is:
A. 22
B. 33
C. 44
D. 5
A. SYN bit =1, SEQ number =X+1, ACK bit =0, ACK number =Y, FI
N bit =0
B. SYN bit =0, SEQ number =X+1, ACK bit =0, ACK
number =Y, FIN bit =1
C. SYN bit =1, SEQ number =Y, ACK bit =1, ACK number =X+1, FI
N bit =0
D. SYN bit =1, SEQ number =Y, ACK bit =1, ACK number =X, FIN b
it =0
a. 512 bytesbytes
b. 768 bytesbytes
c. 1152 bytesbytes
d. 1024 bytes
A. 35 B. 40 C. 50 D. 30
24
Consider the following statements regarding the slow start phase of the
TCP congestion control algorithm. Note that cwnd stands for the TCP
congestion window and MSS window denotes the Maximum Segments
Size:
A. I only
B. II only
C. Both I and II
D. Neither I nor II
26 Consider a TCP client and a TCP server running on two different machines.
After completing data transfer, the TCP client calls close to terminate the
connection and a FIN segment is sent to the TCP server. Server-side TCP
responds by sending an ACK, which is received by the client-side TCP. As
per the TCP connection state diagram (RFC 793), in which state does the
client-side TCP connection wait for the FIN from the server-side TCP?
A. LAST-ACK
B. TIME-WAIT
C. FIN-WAIT-11
D. FIN-WAIT-2
27 Suppose two hosts use a TCP connection to transfer a large file. Which of
A. III only
B. I and III only
C. I and IV only
D. II and IV only
A. 60 and 290
B. 230 and 291
C. 60 and 231
D. 60 and 230
A. YY but not ZZ
B. ZZ but not YY
C. Neither YY nor ZZ
D. Both YY and Z
A. 8 Mbps
B. 6.4 Mbps
C. 0.8 Mbps
D. 0.64 Mbps
A. 109
B. 216
C. 218
D. 219
33 How many bytes of data can be sent in 15 seconds over a serial link with
baud rate of 9600 in asynchronous mode with odd parity and two stop bits
in the frame?
A. 10,000 bytes
B. 12,000 bytes
C. 15,000 bytes
D. 27,000 bytes
34 Let us consider a statistical time division multiplexing of packets. The
number of sources is 1010. In a time unit, a source transmits a packet
of 10001000 bits. The number of sources sending data for the
first 2020 time units
is 6,9,3,7,2,2,2,3,4,6,1,10,7,5,8,3,6,2,9,56,9,3,7,2,2,2,3,4,6,1,10,7,5,8,3,6,2,
9,5 respectively. The output capacity of multiplexer is 5000 bits per time
unit. Then the average number of backlogged of packets per time unit
during the given period is
A. 55
B. 4.45
C. 3.45
D. 0
36 In serial communication employing 8 data bits, a parity bit and 22stop bits,
the minimum band rate required to sustain a transfer rate of 300 characters
per second is
A. 2400 band
B. 19200 band
C. 4800 band
D. 1200 band
37 Group-1 Group-2
P. Data link 1. Ensures reliable
layer transport of data
over a physical
point-to-point link
Q. Network 2.
layer Encodes/decodes
data for physical
transmission
R. Transport 3 . Allows end-to-
layer end
communication
between
two processes
4. Routes data
from one network
node to the next
A. P-1, Q-4, R-3
B. P-2, Q-4, R-1
C. P-2, Q-3, R-1
D. P-1, Q-3, R-2
a. WMEKREETSILTWETCOOCYONRU!
b. EETSICOOCYWMEKRONRU!LTWET
c. LTWETONRU!WMEKRCOOCYEETSI
d. ONRU!COOCYLTWETEETSIWMEKR
A. I and II only
B. I only
C. II only
D. II and III only
41
In a system an RSA algorithm with p=5p=5 and q=11q=11, is implemented
for data security. What is the value of the decryption key if the value of the
encryption key is 27?
A. 3
B. 7
C. 27
D. 40
42 Using public key cryptography, XX adds a digital signature σ to
message MM, encrypts <M,σ><M,σ>, and sends it to YY, where it is
decrypted. Which one of the following sequences of keys is used for the
operations?
Which one of the following choices gives the correct values of xx and yy?
A. x is 0 and y is 0
B. x is 0 and y is 1
C. x is 1 and y is 0
D. x is 1 and y is 1
The maximum distance d (in meters, rounded to the closest integer) that
allows Q to successfully avoid a collision between its proposed
transmission and P’s ongoing transmission is
A. 25 B. 50 C. 75 D.100
46
For the IEEE 802.11 MACIEEE 802.11 MAC protocol for wireless
communication, which of the following statements is/are TRUE?
A. 100111001101
B. 100111001011
C. 100111001
D. 100111001110
48 Consider a network connecting two systems located 8000 Km apart. The
bandwidth of the network is 500×10^6 bits per second. The propagation
speed of the media is 4×10^6 meters per second. It needs to design a Go-
Back-N sliding window protocol for this network. The average packet size
is 107 bits. The network is to be used to its full capacity. Assume that
processing delays at nodes are negligible. Then, the minimum size in bits of
the sequence number field has to be _
A. 9 B. 6 C. 7 D. 8
49
A. 0111110100
B. 0111110101
C. 0111111101
D. 0111111111
50
Consider the store and forward packet switched network given below.
Assume that the bandwidth of each link is 106 bytes / sec. A user on
host A sends a file of size 103 bytes to host B through routers R1 and R2 in
three different ways. In the first case a single packet containing the
complete file is transmitted from A to B. In the second case, the file is split
into 10 equal parts, and these packets are transmitted from A to B. In the
third case, the file is split into 20 equal parts and these packets are sent
from A to B. Each packet contains 100 bytes of header information along
with the user data. Consider only transmission time and ignore processing,
queuing and propagation delays. Also assume that there are no errors
during transmission. Let T1, T2 and T3 be the times taken to transmit the
file in the first, second and third case respectively. Which one of the
following is CORRECT?
A. T1<T2<T3
B. T1>T2>T3
C. T2=T3,T3<T1
D. T1=T3,T3>T2
51 Identify the correct sequence in which the following packets are transmitted
on the network by a host when a browser requests a webpage from a remote
server, assuming that the host has just been restarted.
A. I and II only
B. II and III only
C. I and III only
D. I, II and III
A. 802.2
B. 802.3
C. 802.5
D. 802.6
58 Data transmitted on a link uses the following 2D parity scheme for error
detection:
Each sequence of 28 bits is arranged in a 4×7 matrix (rows r0r0 through r3,
and columns d7 through d1) and is padded with a column d0d0 and
row r4 of parity bits computed using the Even parity scheme. Each bit of
column d0d0 (respectively, row r4) gives the parity of the corresponding
row (respectively, column). These 40 bits are transmitted over the data link.
The table shows data received by a receiver and has n corrupted bits. What
is the minimum possible value of n?
A. 11
B. 22
C. 33
D. 4
A. 12
B. 14
C. 16
D. 18
60 A channel has a bit rate of 4 kbps and one-way propagation delay of 20 ms.
The channel uses stop and wait protocol. The transmission time of the
acknowledgment frame is negligible. To get a channel efficiency of at
least 50%, the minimum frame size should be
A. 80 bytes
B. 80 bits
C. 160 bytes
D. 160 bits
Multiple choice questions (MCQ) – 2 Marks
1 The protocol data unit(PDU) for the application layer in the Internet stack is
(A)Segment
(B)Datagram
(C)Message
(D) Frame
2 Which of the following transport layer protocols is used to support electronic mail?
(A) SMTP
(B) IP
(C) TCP
(D) UDP
3 In the IPv4 addressing format, the number of networks allowed under Class C addresses
is
(A) 2^14
(B) 2^7
(C) 2^21
(D) 2^24
6 The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of
IP addresses could belong to this network.
(a) 172.57.88.62 & 172.56.87.23
(b) 10.35.28.2 & 10.35.29.4
(c) 191.203.31.87 & 192.234.31.88
(d) 128.8.129.43 & 128.8.161.55
8 One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the
following statements best explains the need for this field?(a) It can be used to priortize
packets
(b) It can be used to reduce delays
(c) It can be used to optimize throughput
(d) It can be used to prevent packet looping
11 In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window
(a) does not increase
(b) increases linearly
(c) increases quadratically
(d) increases exponentially
12 If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the
maximum number of hosts per subnet?
(a) 1022 (b) 1023 (c) 2046 (d) 2047
13 Which of the following system calls results in the sending of SYN packets?
(a) socket (b) bind (c) listen (d) connect
14 What is the maximum size of data that the application layer can pass on to the TCP layer
below?
(a) Any size
(b) 216 bytes-size of TCP header
(c) 216 bytes
(d) 1500 bytes
15 The protocol data unit(PDU) for the application layer in the Internet stack is
(a) Segment (b) Datagram (c) Message (d) Frame
16 Which of the following transport layer protocols is used to support electronic mail?
(a) SMTP (b) IP (c) TCP (d) UDP
17 In the IPv4 addressing format, the number of networks allowed under Class C addresses is
(a) 214(b) 27 (c) 221 (d) 224
18 An organization has a class B network and wishes to form subnets for 64 departments.
The subnet mask would be:
(a) 255.255.0.0
(b) 255.255.64.0
(c) 255.255.128.0
(d) 255.255.252.0
19 Assume that source S and destination D are connected through two intermediate routers
labeled R. Determine how many times each packet has to visit the network layer and the
data link layer during a transmission from S to D.
21 NetWare IPX addressing uses a network number and a node number. Which statement is
not true?
a) The network address is administratively assigned and can be up to 16 hexadecimal
digits long
b) The node address is always administratively assigned
c) The node address is usually the MAC address
d) If the MAC address is used as the node address, then IPX eliminates the use of ARP
22 What does the following series of commands “Router IGRP 71 network” accomplish?
10.0.0.0 router IGRP 109 network 172.68.7.0
a) It isolates networks 10.0.0.0 and 172.68.7.0
b) It loads IGRP for networks 109 and 71
c) It disables RIP
d) It disables all routing protocols
23 The “IPX delay number” command will allow an administrator to change the default
settings. What are the default settings?
a) For LAN interfaces, one tick; for WAN interfaces, six ticks
b) For LAN interfaces, six ticks; for WAN interfaces, one tick
c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks
d) For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
24 You want to enable both arpa and snap encapsulation on one router interface. How do you
do this?
a) The interface can handle multiple encapsulation types with no extra configuration
b) Assign two network numbers, one for each encapsulation type
c) Enable Novell-ether to run multiple encapsulation types
d) Both arpa and snap are enabled by default so you don’t have to configure anything
25 What is name of Transport Layer Protocol which is used to support the electronic mail ?
(a) SMTP
(b) IP
(c) TCP
(d) UDP
27 IP Header has a field TTL ( Time To Live). Which among the following statement best
explain the use of TTL
(a) It can be used to prioritize the packets
(b) It can be used to reduce the delay.
(c) It can be used to optimize the throughput.
(d) It can be used to prevent packet looping
28 A router receives an IP packet containing a data of 300 byte and it is forwarded to a
network with maximum transmission unit of 80 bytes. Assume that IP header is 10 Byte
long. Find the total fragment , more fragment and offset values
(a) 4, 1110,(0,10,20,30)
(b) 1,1110,(0,8.75,17.5,26.25,35)
(c) 5,1111,(0,8,17,26,35)
(d) none
32 All the routers use the distance vector based routing algorithm to update their routing
tables. Each starts with its routing table initialized to contain an entry for each neighbour
with the weight of the respective connecting link. After all the routing tables stabilize,
how many links in the network will never be used for carrying any data?
(a) 4
(b) 3
(c) 2
(d) 1
34 What is the minimum number of bits (l) that will be required to represent the sequence
numbers distinctly? Assume that no time gap needs to be given between transmission of
two frames.
(a) l = 2
(b) l = 3
(c) l = 4
(d) l = 5
35 Suppose that the sliding window protocol is used with the sender window size of 2l, where
l is the number of bits identified in the earlier part and acknowledgments is always
piggybacked. After sending 2l frames, what is the minimum time the sender will have to
wait before starting transmission of the next frame? (Identify the closest choice ignoring
the frame processing time)
(a) 6 ms
(b) 18 ms
(c) 20 ms
(d) 22 ms
36 While opening a TCP connection, the initial sequence number is to be derived using a
time-of-day (ToD) clock that keeps running even when the host is down. The low order 32
bits of the counter of TOD clock is to be used for the initial sequence numbers. The clock
counter increments once per millisecond. The maximum packet lifetime is given to be 64s.
Which one of the choices given below is closet to the minimum permissible rate at which
sequence numbers used for packets of a connection can increase?
(a) 0.015/s
(b) 0.064/s
(c) 0.135/s
(d) 0.327/s
37 In the RSA public key cryptosystem, the private and the public keys are (e, n) and (d, n)
respectively, where n = p* and p and q are large primes. Besides, n is public and p and q
are private. Let M be an integer such that 0 < M <nandφ(n) = (p − 1) (q − 1). Now
consider the following equations.
I. M' = Me mod n
M = (M')d mod n
II. ed ≡ 1mod n
III.ed ≡ 1modφ(n)
IV. M' = Memodφ(n)
M = (M')dmod φ(n)
Which of the above equations correctly represent RSA cryptosystem?
(a) I and II
(b) I and III
(c) II and IV
(d) III and IV
38 38)The probability that a single bit will be in error on a typical public telephone line using
4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the
residual error rate for a communication line using 9-bit frames is approximately equal to
A
0.003
.
B
0.009
.
C
0.991
.
D
0.999
.
39 39) Frames from one LAN can be transmitted to another LAN via the device
A
Router
.
B
Bridge
.
C
Repeater
.
D
Modem
.
40 40) What are the most commonly used transmission speeds in BPS used in data
communication?
A. 300
B. 1200
C. 2400
D. 9600
2
Which can be the possible header size (in byte) in IPV4 datagram
A. 20
B. 30
C. 50
D. 60
3
Consider the class-c network with 7 subnets and 25 hosts per sub net. What will be the subnet
mask for this network.
A. 255.255.255.224
B. 255.255.255.44
C. 255.255.255.63
D. 255.255.255.112
4
The following is a UDP header in hexadecimal format
5EFA 00 FD 001C 3297
Which of the following statement is/are correct?
A. Total length of datagram =28 byte and packet is going from client to server
B. Total length of datagram =28 byte and packet is going from server to client
C. Data size is 20 byte and packet is going from client to server
D. Data size is 20 byte and packet is going from server to client
5
If Direct Broadcast address is 200.200.200.31
Which of the following can be subnet mask?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.248
D. 255.255.255.128
6
Consider the block of IP addresses ranging from 150.10.20.64 to 150.10.20.127. Is it a CIDR
block? If yes what is the CIDR representation?
7
Which of the following cache mappings may experience conflict miss?
A. Direct Mapping
B. 2-way set associate mapping
C. 4-way set associate mapping
D. Full associate mapping
8 Which of the following delay components are not affected by the congestion in the network?
A. Queuing Delay
B. Transmission Delay
C. Processing Delay
D. Propagation Delay
9 What are the properties of a source buffer used at the sender side of the transport layer in a connection-
oriented protocol?
A. Source buffer needs to be connection specific that is a buffer is maintained for every connection
from the device
B. OS maintains a global source buffer for all the connections from the device.
C. Source buffer is finite.
D. Source buffer is infinite.
10
What are the basic tasks of the network layer?
A. It provides reliable data transfer.
B. It delivers a packet to the destination.
C. It keeps the network congestion free.
D. It finds out the route from a node to another node
11
What is true for IPv6
A. It supports broadcasting
B. It supports extended IP header
C. It supports encapsulation
D. It is compatible with IPv4
12
Which of the following statements is (are) correct?
A. A server is a process that is offering some service.
B. A client is a process that is requesting the service.
C. A server can serve multiple clients simultaneously.
D. A client sends request to the server and gets back the response.
13
The Web Browser can act as an HTTP ________
A. Client
B. Server
C. Interpreter
D. host
14
Which option are true?
A. CSMA/CD should be used when the transmitter and receiver cannot be turned on
simultaneously.
B. CSMA/CD have a less collision probability than that of aloha.
C. slotted aloha does not sense before sending data
D. a node can start transmitting data only at beginning of a slot in slotted data.
15
Which is true for Forwarding Information Base (FIB)
A. It is resides at the RAM
B. In a specialized Hardware, it is implemented using TCAM
C. It is contain a subnet of the routing table
D. The routing table is a subnet of the FIB
16
Senders and Receivers needs to dynamically adjust buffer allocations for
A. Flow Control
B. Congestion Control
C. Reliability
D. Connection Establishment
17
The solution to silly window syndrome problem is/are
A. Nagle’s Algorithm
B. Clark’s Algorithm
C. Jacobson’s Algorithm
D. None of these
18
Why do we need IPv6 addresses when we already have IPv4 addresses?
A. The number of devices are grown beyond the capacity of IPv4.
B. IPv4 is not suitable for IoT devices.
C. IPv4 is not secure.
D. IPv4 does not provide QoS.
19 What is true for a resource reservation protocol?
A. It is a routing protocol
B. It tries to reserve the required resources throughout the path
C. RSVP domain talks to only remote routing protocol domain.
D. RSVP domain runs in all the devices including end hosts and intermediate routers.
2 firewall is installed at the point where the secure internal network and untrusted external
network meet, which is also known as_____
3 Identify the correct option for the given assertion and reason
Assertion: In IEEE 802.3 is not suitable for client server application
Reason: In Ethernet, there is a restriction on minimum size.
9 In a packet switching network, packets are routed from source to destination along a
single path having two intermediate nodes. If the message size is 24 bytes and each
packet contains a header of 3 bytes, then what is the optimum packet size?
10 Station B needs to send a message consisting of 9 packets to Station C using a sliding
window (window size 3) and go-back-n error control strategy. All packets are ready and
immediately available for transmission. If every 5 th packet that B transmits gets lost (but
no acks from C ever get lost), then what is the number of packets that B will transmit for
sending the message to C?
11 For an organization that has a class B network and wishes to form subnets for 64
departments, what will the subnet mask be?
12 If two computers C1 and C2 are configured as follows and C1 has IP address 203.197.2.53
and netmask 255.255.128.0, while C2 has IP address 203.197.75.201 and netmask
255.255.192.0, then which of the following statements is true?
Look at these three statements about link state and distance vector routing
protocols, for a
large network with 500 network nodes and 4000 links
[S1] The computational overhead in link state protocols is higher than in distance
vector protocols.
[S2] A distance vector protocol (with split horizon) avoids persistent routing
loops, but not a link state protocol.
[S3] After a topology change, a link state protocol will converge faster than a
distance vector protocol.
Which one of the above is correct about S1, S2, and S3?
13 If the length of a Broadcast LAN is 2 Km and it has 107 bps bandwidth and uses
CSMA/CD and the signal travels along the wire at 2108m/s, then what is the minimum
size of the packet?
14 What is the number of 8-bit characters that can be transmitted per second over a 9600
baud serial communication link that use asynchronous mode of transmission with 8 data
bits, one start bit and one parity bit?
17 Take the example of 1 Mbps error-free line, with the maximum frame size of 1000 bits
and new packets generated about 1 second apart . Timeout interval is 10 m/sec if the
special acknowledgement timer were eliminated, unnecessary timeout would occur . In
the scenario, how any times average msg would have been transmitted
18 In a class C address, if 3 bits are borrowed for subnetting of host ID part, the total
possible number of subnet masks are _________________.
.
19 This is one of two protocols that let a network administrator supervise and distribute IP
addresses from a central point. It automatically sends a new IP address when a computer
is plugged into a different place in the network.
20 The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect
it from errors. The message that should be transmitted is______