Mid Term - Solution
Mid Term - Solution
Attempt all questions. Solve on the question paper in the spaces provided only. Extra sheets
may only be used for rough work.
Question 1:
i. Manchester
ii. NRZI
iii. NRZ
iv. All of above
4. UDP and TCP both layer protocols.
i. Transport
ii. Data Link
iii. Physical
iv. Network
5. The Identifier that is used for data transfer in virtual circuit network is
i. Global address
ii. Virtual circuit identifier
iii. Network identifier
iv. IP identifier
6. A point-to-point protocol over Ethernet is a network protocol for
i. Encapsulating PPP frames inside Ethernet frames
ii. encapsulating Ethernet frames inside PPP frames
iii. for security of Ethernet frames
iv. for security of PPP frames
7. If an Ethernet destination address is 07:01:02:03:04:05, then this is ______ address.
i. Unicast
ii. Multicast
iii. Broadcast
iv. All of above
8. Frame Relay works by allowing the user _________________.
i. to exceed their guaranteed bandwidth
ii. to not exceed their guaranteed bandwidth
iii. the fixed bandwidth.
iv. None of above
9. Routers receive No LMI information and update the virtual circuit status
to_____________ state.
i. Active State
ii. Inactive State
iii. Deleted State
iv. Any of above
10. IEEE802.11g offer data rates up to in the band.
i. 2Mbps, 2.4GHz
ii. 11Mbps, 2.4GHz
iii. 54Mbps, 5GHz
iv. 54Mbps, 2.4GHz
11. I/G bit of Ethernet address field if set to 0 means _____, and if set to 1 means
______.
i. Unicast, Broadcast/Multicast
ii. Multicast, Unicast
iii. Broadcast, Multicast
iv. Multicast, Broadcast
12. In CSMA/CD if there was a collision, all stations that sent a frame send a _______.
i. Jamming Signal
ii. Acknowledgement Signal
iii. Same packet that suffers collision
iv. None of above
13. ___________ forms one collision domain.
i. Hub
ii. Switch
iii. Bridge
iv. Router
14. In SNAP (Sub Network Access Protocol) DSAP and SSAP fields are always______ and
command field is always _____.
i. AF and 4
ii. AA and 2
iii. AA and 3
iv. AF and 3
15. Noise of collision burst reaches the source node in ________.
i. Propagation time
ii. Two times propagation time
iii. Three times propagation time
iv. Four times propagation time
B. Show that how many broadcast domains and collision domains are in the
following networks A,B,C,D,E. CLO-1 (10)
A B
C D
A 7 2
B 4 2
Question 2:
C 7 1
A. A switch’s MAC address table is
shown at some point t o in time D 5 1
during its operation. Considering the
situation answer following E 4 1
questions, assuming all the
questions are asked at time instant t o
. Give one line reason of your answer.
CLO-1 (10)
i. Computer B wants to send data to computer C, would computer D see the
frame?
ii. Computer A wants to send data to computer C, would computer D see the
frame?
iii. Computer A wants to send data to computer D, would computer C see the
frame?
B. A network associate needs to configure the switches and router in the graphic
so that the hosts in VLAN3 and VLAN4 can communicate with the enterprise
server in VLAN2. Explain which two Ethernet segments would need to be
configured as trunk links? CLO-1 (10)
C and F. The link between the switches and the link between switch & router
should be configured as trunks. Other links (connected to hosts) should be
configured as access links.
ii. Which two benefits are provided by creating VLANs? (Choose two)
A. added security
B. dedicated bandwidth
C. provides segmentation
D. allows switches to route traffic between sub interfaces
E. contains collisions
A&C
iii. The address 43:7B:6C:DE: 10:00 has been shown as the source address
in an Ethernet frame. The receiver has discarded the frame. Why?
The first byte in binary is 01000011. The least significant bit is 1. This means that
the pattern defines a multicast address. A multicast address can be a destination
address, but not a source address. Therefore, the receiver knows that there is
an error, and discards the packet.
Question 3:
A. CLO-2 (5)
a. 802.11 station applies fragmentation only to frames having ______ address
i. Unicast
ii. Multicast
iii. Broadcast
iv. All of above
b. A wireless network interface controller can work in
i. Infrastructure Mode
ii. Ad Hoc mode
iii. Both i) and ii)
iv. None of the above
c. Which one of the following event is not possible in wireless LAN?
i. collision detection
ii. acknowledgement of data frames
iii. multi-mode data transmission
iv. none of the mentioned
d. Distributed Coordination Function (DCF) is having lower priority over
i. PCF
ii. RTS
iii. CTS
iv. PIFS
e. To configure a wireless LAN for optimum capacity, transmit power should
be set to
i. Higher value
ii. lower value
iii. max to min
iv. min to max
B. Consider the WLAN figure with passive scanning, a lap top wants to be a part
of WLAN, mark the arrows with numbers and write down the message type
against each number. CLO-2 (10)
1.
2.
3.
4.
5.
Question 4:
CLO-2 (10)
B. In figure below a virtual connection is established between A and B. Show
the DLCI for each link. CLO-2 (10)