CS610 Final Term Past Papers Mega File
CS610 Final Term Past Papers Mega File
COM
Page 1 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► Do all (page)
________ is used for typical data applications (where the data rate may be
unknown and bursty) and allows use of whatever bandwidth is available at a
given time.
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service (Page 71)
► None of the given
ATM assigns each VC a _____________ identifier that is divided two parts to
produce a hierarchy.
► 21-bit
► 22-bit
► 23-bit
► 24-bit (Page 67)
________ of TCP/IP layering model, corresponds to basic network hardware.
► Physical Layer (Page 84)
► Network Interface Layer
► Internet Layer
► Transport Layer
_________ places the boundary between the second and third octets
► Class A
► Class B (Computer Networks and Internets, page235)
Page 2 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► Class C
► Class D
UDP and TCP are both_________ layer protocols
► Physical
► Data link
► Network
► Transport (Page 101)
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex
communication, Stream interface, Reliable connection startup and Graceful
connection shutdown are the services provided by__________
► IP
► None of the given
► TCP (Page 123)
► UDP
_______ protocols of TCP/IP layering model specify how to ensure reliable
transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer (Page 84)
________identifies which application program on receiving computer should
receive the data
Page 3 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► Logical address
► Source port
► Destination Port (Computer Networks and Internets, page313)
► None of the given
________ identifies the application program that sent the data.
► Destination Port
► Source port (Computer Networks and Internets, page313)
► Logical address
► None of the given
Which of the following are interior routing protocols?
► RIP
► OSPF
► BGP
► RIP and OSPF
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP
► Both UDP and TCP
► None of the given
__________measures distance in network hops, where each network between
the source and destination counts as single hop.
► BGP
Page 4 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► OSPF
► RIP (Page 138)
► None of the given
OSPF is based on____
► Distance vector routing
► Link state routing (Page 140 )
► Path vector routing
► Distance vector routing and Link state routing
_________ performs local multicast and uses IP-in-IP encapsulation to send
multicast datagrams from one site on the Internet to another.
► Distance Vector Multicast Routing Protocol (DVMRP) (Page 144)
► Core Based Trees (CBT)
► Protocol Independent Multicast_ Sparse Mode (PIM-SM)
► Protocol Independent Multicast _ Dense Mode (PIM-DM)
The length of time required to send a variable length packet is variable and does
not require a complicated interrupt scheme to detect completion of
transmission.
► True
► False (Page 72)
NEXT HEADER field in the base header defines type of header and it appears at
end of fixed-size base header.
► True (Page 112)
Page 5 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► False
Although message exchange can be used to bind addresses, sending a request
for each binding is hopelessly inefficient.
► True (Page 99)
► False
Address mask defines how many bits of address are in suffix.
► True
► False (Page 103)
A computer attached to a given network can only communicate with other
computers attached to the same network. Is this a problem with multiple
networks?
► True (Page 81)
► False
In the 1970s large organizations began to acquire multiple networks. Each
network in the organization formed island. Employees needed to choose a
computer appropriate for each task. So they needed multiple screens,
keyboards and computers.
► False
► True (Page 81)
The term self-identifying is used for Classful IP addresses because the class of
the address can be computed from the address__________.
► itself (Page 87)
Page 6 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► prefix
► suffix
► mask
In which method of Address Resolution Protocol the protocol address
independent of hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
► T, C
►D
►C
► T, D (Page 97)
Reconstruction of original datagram is called reassembly.
► True (Page 28)
► False
A computer needs a complete stack of protocols to run either a client or a
server.
► True (Computer Networks and Internets, page 344)
► False
TCP uses _______ mechanism to control the flow of data.
► door
► window (Page 126)
► acknowledgment
Page 7 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► retransmission
In Direct point to point communication adding the Nth computer requires___
new connections.
►None of the given
►N
►N-1 (Page 23)
► (N2 –N)/2
In -------------, network occupies the smaller area like a room a floor or a building
►LAN (Page 4)
►WAN
►MAN
►None of the given
The third field of the header consists of ------ bit Ethernet frame type.
►48
►32
►16 (Page)
►8
The maximum size of an Ethernet segment is___________
►250 meters
►500 meters (page)
►700 meters
►None of the given
Page 8 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
The network with Throughput T and Delay D has a total --------------- bits in
transit at a time.
►D + T
►D – T
► D X T (Computer Networks and Internets, page203)
►D / T
___________ places the boundary between the first and second octets
►Class A (Computer Networks and Internets, page235)
►Class B
►Class C
►Class D
Router detects datagram --------- than network MTU and then it splits into pieces
and each piece is ----------than outbound network MTU.
►Larger, smaller (Page 108)
►Larger, larger
►Smaller, larger
►Smaller, smaller
Connectionless service, Message-Oriented protocol, best-effort delivery service,
arbitrary interaction & operating system independent are the characteristics of
_______
►TCP
►UDP (Page 120)
Page 9 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
►IP
►None of the given
----------- provide Application to application communication it also called end to
end communication
►IP
►TP (Page 119)
►RIP
►None of the given
A routing table contains_______
►The destination network ID
►The hop count to reach the network
►The router ID of the next hop (Page 102)
►All of the given
Which of the following protocols allows the sender and receiver to enforce
polices.
►RIP
►OSPF
►BGP (Reference Book 347)
►RIP and OSPF
__________measures distance in network hops, where each network between
the source and destination counts as single hop.
►BGP
Page 10 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
►OSPF
►RIP (Page 138)
►Non of these
_______ includes a 32-bits address mask with each address, which allows the
address to be classful, classless, or subnetted.
►RIP
►OSPF (Page 140)
►BGP
►None of the given
One repeater ---------------, two repeaters --------------- the maximum cable length
limitation.
►Double, triple (Page 49)
►Double, 4 time
►half, triple
►Double, half
ICMP message transport is acted upon by getting ICMP encrypted in IP.
►True (Page 117)
►False
Like most application programs, a client and server use a transport protocol to
communicate.
►True (Page 146)
►False
Page 11 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 12 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
►Clients
►Clients and servers (Computer Networks and Internets, page 344)
►Servers
►None of given
On of the design goals for unicast route propagation is __________.
►consistency
►inconsistency
►stability (Computer Networks and Internets, page 344)
►dynamic addressing
IPV6 address consists of ________
►32 Bits
►64 Bits
►128 Bits (Page 128)
►none of the given
UDP offers application programs a Message-Oriented Interface, applications can
depend on protocol to preserve data boundaries.
►True (Page 120)
►False
In case TCP, retransmission, acknowledgment from a computer on LAN are
expected to arrive within
►Seconds
►Micro seconds
Page 13 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
►Milliseconds
►Nanoseconds
Twice NAT is another variant of NAT. it is used with site that runs server. In this
process NAT box is connected to Domain Name.
►True (Page 131)
►False
A network uses a ------arranges for computers to be connected in a closed loop.
►Star Topology
►Ring Topology (Page 25)
►Bus Topology
►None of the given
Protocol addresses are abstractions provided by ___________.
►hardware
►software (Page 93)
►operating system
►internet
In Direct point to point communication adding the Nth computer requires----
new connections.
► None of the given
► N2
► N-1 (Page 23)
► (N2 –N)/2
Page 14 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 15 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 16 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 17 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
The address __________ identifies the physical network to which the computer
is attached, while the _______ identifies an individual computer on that
network.
► prefix , suffix (Page 85)
► suffix , prefix
► suffix , suffix
► None of the given
___________ places the boundary between the first and second octets
► Class A (Computer Networks and Internets, page 235)
► Class B
► Class C
► Class D
___________ places the boundary between the third and fourth octets.
► Class A
► Class B
► Class C (Computer Networks and Internets, page 235)
► Class D
________ field of header indicates whether a datagram is a fragment or a
complete datagram.
► FLAGS
► FLAGMENT OFFSET
► IDENTIFICATION
Page 18 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 19 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► Internet Layer
► Transport Layer (Page 84) rep
________identifies which application program on receiving computer should
receive the data
► Logical address
► Source port
► Destination Port (Computer Networks and Internets, page313) rep
► None of the given
________ identifies the application program that sent the data.
► DestinationPort
► Source port (Computer Networks and Internets, page313) rep
► Logical address
► None of the given
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP
► Both UDP and TCP
► None of the given
Which of the following protocols allows the sender and receiver to enforce
polices.
► RIP
► OSPF
Page 20 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 21 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 22 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 23 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
► T, D
►c
►T
► T, C (Page 97)
On of the design goals for unicast route propagation is __________.
► Consistency
► inconsistency
► stability (Computer Networks and Internets, page 344) rep
► dynamic addressing
Propagation multicast routing information differs dramatically from unicast
route propagation?
► True (Computer Networks and Internets, page 335)
► False
To save traffic, an EGP does not summerize routing information from the
autonomous system before passing it to another autonomous system.
► True
► False (Computer Networks and Internets, page 329)
In IPv6 the type of address used for collection of computers with same prefix.
Are known as_________.
► Anycast
Page 24 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► Unicast
► Multicast
► Non of the given (Page 114)
Special types of addresses in IPv6 used for multiple destinations; possibly not at
same site. Are known as_________.
► Unicast
► Anycast
► Multicast (Page 114)
► Non of the given
UDP offers application programs a Message-Oriented Interface, applications can
depend on protocol to preserve data boundaries.
► True (Page 120) rep
► False
Reliability is the responsibility of the _________ layer
► Network
► Datalink
► Transport (Page 123)
► Application
TCP uses _______ mechanism to control the flow of data.
► door
► window (Page 126) rep
► acknowledgment
Page 25 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► retransmission
FDDI can transmits data at a rate of ----------
► 100 million bits per second (Page 31)
► 10 million bits per second
► 1000 million bits per second
► None of the given
Computer networks are often called -------------- because they use packet
technology.
► Ethernet
► Switch networks
► Packet networks (Computer Networks and Internets, page 73)
► None of the given
A network uses a ------arranges for computers to be connected in a closed loop.
► Star Topology
► Ring Topology (Page 25) rep
► Bus Topology
► None of the given
An ------------method, the network hardware designers specify how type
information is included in the frame and the value use to identify various frame
types.
► Explicit frame type (Computer Networks and Internets, page 108)
► Ideal frame type
Page 26 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 27 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 28 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
_______ is ideal in a situation where the group is small and all members are
attached to contiguous Local Area Networks.
► Flood-and –Prune (Page 143)
► Configuration-and -Tunneling
► Core-Based Discovery
► None of the given
Router that decrements TTL to __ sends ICMP time exceeded message, with
router’s address as source address
►3
►2
►1
► 0 (Page 118)
Protocol addresses are abstractions provided by ___________.
► hardware
► software (Page 93) rep
► operating system
► internet
Although message exchange can be used to bind addresses, sending a request
for each binding is hopelessly inefficient.
► True (Page 99) rep
► False
Page 29 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 30 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 31 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
► Broadcasting
► Multicasting
► Unicasting
► None of the given
Ethernet uses a ------ bit static addressing scheme in which each device is
assigned a unique address by the manufacturer.
► 64
► 48 (Computer Networks and Internets, page 109)
► 32
►8
A system with redundant bridges might have a problem with_______ in the
system.
► Loop (page)
► Filters
► Spanning Trees
► All given choices
The product of delay and throughput measures the _____ of data that can be
present on the network.
► Area
► Volume (Page 80) rep
► Length
► None of the given
Page 32 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Questions:
1. Differentiate between IP and transport protocol with the help of example.
2. Give the main advantage and disadvantage of RIP. (2 Marks)
3. Tel the first assignable IP address from a 128.140.80.24/20. (2 Marks)
4. How was the NAT implemented? (2 Marks)
5. IS ATM including LAN and WAN network. If yes what kind of connection is
established? (2 Marks)
Page 33 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 34 of 35
For more papers, go to VUInsider.com
FOR MORE PAPERS, GO TO VUINSIDER.COM
Page 35 of 35
For more papers, go to VUInsider.com