CS610 Final Term Past Paper 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

FOR MORE PAPERS, GO TO VUINSIDER.

COM

CS610 Final Term

A ---------- Relies on the hardware manufacturer to assign a unique physical


address to each network interface.
► Static addressing scheme (Page 34)
► Configurable addressing scheme
► Dynamic addressing scheme
► None of the given
An interface for thin Ethernet must have an ____________ connector, and must
enerate signals according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2 (CS610 Reference Book , Page 21)
► BNC, 10 Base T
A system with redundant bridges might have a problem with_______ in the
system.
► Loop
► Filters
► Spanning Trees
► All given choices
A Bridge can ________
► Filter a frame
► Forward a frame
► Extend a LAN

Page 1 of 11
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM

CS610 Final Term

► Do all (page)
________ is used for typical data applications (where the data rate may be
unknown and bursty) and allows use of whatever bandwidth is available at a
given time.
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service (Page 71)
► None of the given
ATM assigns each VC a _____________ identifier that is divided two parts to
produce a hierarchy.
► 21-bit
► 22-bit
► 23-bit
► 24-bit (Page 67)
________ of TCP/IP layering model, corresponds to basic network hardware.
► Physical Layer (Page 84)
► Network Interface Layer
► Internet Layer
► Transport Layer
_________ places the boundary between the second and third octets
► Class A
► Class B (Computer Networks and Internets, page235)

Page 2 of 11
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM

CS610 Final Term

► Class C
► Class D
UDP and TCP are both_________ layer protocols
► Physical
► Data link
► Network
► Transport (Page 101)
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex
communication, Stream interface, Reliable connection startup and Graceful
connection shutdown are the services provided by__________
► IP
► None of the given
► TCP (Page 123)
► UDP
_______ protocols of TCP/IP layering model specify how to ensure reliable
transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer (Page 84)
________identifies which application program on receiving computer should
receive the data

Page 3 of 11
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM

CS610 Final Term

► Logical address
► Source port
► Destination Port (Computer Networks and Internets, page313)
► None of the given
________ identifies the application program that sent the data.
► Destination Port
► Source port (Computer Networks and Internets, page313)
► Logical address
► None of the given
Which of the following are interior routing protocols?
► RIP
► OSPF
► BGP
► RIP and OSPF
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP
► Both UDP and TCP
► None of the given
__________measures distance in network hops, where each network between
the source and destination counts as single hop.
► BGP

Page 4 of 11
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM

CS610 Final Term

► OSPF
► RIP (Page 138)
► None of the given
OSPF is based on____
► Distance vector routing
► Link state routing (Page 140 )
► Path vector routing
► Distance vector routing and Link state routing
_________ performs local multicast and uses IP-in-IP encapsulation to send
multicast datagrams from one site on the Internet to another.
► Distance Vector Multicast Routing Protocol (DVMRP) (Page 144)
► Core Based Trees (CBT)
► Protocol Independent Multicast_ Sparse Mode (PIM-SM)
► Protocol Independent Multicast _ Dense Mode (PIM-DM)
The length of time required to send a variable length packet is variable and does
not require a complicated interrupt scheme to detect completion of
transmission.
► True
► False (Page 72)
NEXT HEADER field in the base header defines type of header and it appears at
end of fixed-size base header.
► True (Page 112)

Page 5 of 11
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM

CS610 Final Term

► False
Although message exchange can be used to bind addresses, sending a request
for each binding is hopelessly inefficient.
► True (Page 99)
► False
Address mask defines how many bits of address are in suffix.
► True
► False (Page 103)
A computer attached to a given network can only communicate with other
computers attached to the same network. Is this a problem with multiple
networks?
► True (Page 81)
► False
In the 1970s large organizations began to acquire multiple networks. Each
network in the organization formed island. Employees needed to choose a
computer appropriate for each task. So they needed multiple screens,
keyboards and computers.
► False
► True (Page 81)
The term self-identifying is used for Classful IP addresses because the class of
the address can be computed from the address__________.
► itself (Page 87)

Page 6 of 11
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM

CS610 Final Term

► prefix
► suffix
► mask
In which method of Address Resolution Protocol the protocol address
independent of hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
► T, C
►D
►C
► T, D (Page 97)
Reconstruction of original datagram is called reassembly.
► True (Page 28)
► False
A computer needs a complete stack of protocols to run either a client or a
server.
► True (Computer Networks and Internets, page 344)
► False
TCP uses _______ mechanism to control the flow of data.
► door
► window (Page 126)
► acknowledgment

Page 7 of 11
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM

CS610 Final Term

► retransmission
In Direct point to point communication adding the Nth computer requires___
new connections.
►None of the given
►N
►N-1 (Page 23)
► (N2 –N)/2
In -------------, network occupies the smaller area like a room a floor or a building
►LAN (Page 4)
►WAN
►MAN
►None of the given
The third field of the header consists of ------ bit Ethernet frame type.
►48
►32
►16 (Page)
►8
The maximum size of an Ethernet segment is___________
►250 meters
►500 meters (page)
►700 meters
►None of the given

Page 8 of 11
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM

CS610 Final Term

The network with Throughput T and Delay D has a total --------------- bits in
transit at a time.
►D + T
►D – T
► D X T (Computer Networks and Internets, page203)
►D / T
___________ places the boundary between the first and second octets
►Class A (Computer Networks and Internets, page235)
►Class B
►Class C
►Class D
Router detects datagram --------- than network MTU and then it splits into pieces
and each piece is ----------than outbound network MTU.
►Larger, smaller (Page 108)
►Larger, larger
►Smaller, larger
►Smaller, smaller
Connectionless service, Message-Oriented protocol, best-effort delivery service,
arbitrary interaction & operating system independent are the characteristics of
_______
►TCP
►UDP (Page 120)

Page 9 of 11
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM

CS610 Final Term

►IP
►None of the given
----------- provide Application to application communication it also called end to
end communication
►IP
►TP (Page 119)
►RIP
►None of the given
A routing table contains_______
►The destination network ID
►The hop count to reach the network
►The router ID of the next hop (Page 102)
►All of the given
Which of the following protocols allows the sender and receiver to enforce
polices.
►RIP
►OSPF
►BGP (Reference Book 347)
►RIP and OSPF
__________measures distance in network hops, where each network between
the source and destination counts as single hop.
►BGP

Page 10 of 11
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM

CS610 Final Term

►OSPF
►RIP (Page 138)
►Non of these

Questions:
1. Differentiate between IP and transport protocol with the help of example.
2. Give the main advantage and disadvantage of RIP. (2 Marks)
3. Tel the first assignable IP address from a 128.140.80.24/20. (2 Marks)
4. How was the NAT implemented? (2 Marks)
5. IS ATM including LAN and WAN network. If yes what kind of connection is
established? (2 Marks)
6. Is IP multicasting beneficial? Defend your answer with proper reason. (3
Marks)
7. Can the length of the segment be increased 500 meter by adding three
repeater one with each segment. It can be done or not. (3 Marks)
8. How an administrator can handle static and dynamic routing. (3 Marks)
9. IS TCP/IP suit including ARP. What kind of messages are in ARP. (3 Marks)
10.Traceroute continues to increment the Time To Live until the value is large
enough for the datagram to reach its final destination. What happens
when the TTL is sufficiently large for the datagram to reach its
destination? (3 Marks)

Page 11 of 11
For more papers, go to VUInsider.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy