0% found this document useful (0 votes)
85 views16 pages

B) Message Stream

This document contains a 50 question multiple choice exam on networking topics. The questions cover subjects like network types (LAN, WAN, MAN), encoding techniques (Manchester, 4B/5B), protocols (TCP, UDP, DNS, SNMP), switching, routing, queuing, and more. The exam is assessing understanding of fundamental networking concepts and protocols.

Uploaded by

coolguru2
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views16 pages

B) Message Stream

This document contains a 50 question multiple choice exam on networking topics. The questions cover subjects like network types (LAN, WAN, MAN), encoding techniques (Manchester, 4B/5B), protocols (TCP, UDP, DNS, SNMP), switching, routing, queuing, and more. The exam is assessing understanding of fundamental networking concepts and protocols.

Uploaded by

coolguru2
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 16

MTECH PART-TIME OBJECTIVE TYPE QUESTION PAPER MTECH Part Time Objective Questions 1 Mark Questions (1-50) 1.

The _____________ channel could be used by both the video-on-demand and videoconferencing applications. a) request/reply b) message stream c) FTP d) NFS 2. The gap between what the application expects and what the underlying technology can provide is called as ________________. a) application gap b) technology gap c) semantic gap d) failure gap 3. A network which extends worldwide is __________________. a) local area network (LAN) b) wide area network (WAN) c) metropolitan area network (MAN) d) storage area network (SAN) 4. Sometimes, physical links are limited to a pair of nodes, such a link is said to be _____________. a) point-to-point b) multiple-access

c) limited-access d) node-to-link access 5. Packet switched network uses---------stratergy. a)store and forward b)forward without store c)store before forward d)forward 6. -------------- and -------------- that establish policies for a particular protocol graph a) ISO b)IETF c) both ISO and IETF d)ISP

7. _______ register is readable and writable from the CPU. a. Control status b. General purpose register c. floating point register d. Special purpose register 8. Throughput of the memory system is given by a. TransferSize - TransferTime b. TransferSize + TransferTime c. TransferSize * TransferTime d. TransferSize / TransferTime 9. . In 4B/5B encoding, the code 11111 is used ______________. a) when the line is idle b) when the line is dead c) when the line is halt d) when the line is busy 10. In the case of Manchester encoding, ________________. a)the baud rate is four times the bit rate b) the bit rate is half the baud rate c) the baud rate is half the bit rate d) the bit rate is four times the baud rate 11. In a network, nodes are considered as a. Workstation class machines b. Network class machines c. Host class machines d. None of the above

12 Network adaptor is a place where different worlds interact which include a. Network, Host operating system, Hardware, Software b Host architecture, Host operating system, Software c. Network, Host architecture, Host operating system d. Network, Host architecture, Hardware 13. The problem with Manchester encoding is that ________________. a) It quadruples the rate at which signal transitions are made on the link b) It triples the rate at which signal transitions are made on the link c) it doubles the rate at which signal transitions are made on the link d) Consecutive 1s and 0s leads to baseline wander and clock recovery problems 14 The following is an example of bit-oriented protocol a) Binary Synchronous Communication (BISYNC) Protocol b) Digital Data Communication Message Protocol (DDCMP) c) Point-to-Point Protocol (PPP) d) Synchronous Data Link Control (SDLC) Protocol 15. If P(x) is the transmitted message including redundant bits, and C(x) a divisor polynomial, then with CRC, which one of the following corresponds to transmission without error? a) We should be able divide P(x) by C(x), division need not be exact. b) We should be able to divide P(x) by C(x) exactly, leaving a remainder of zero. c) We should be able to divide P(x) by C(x), leaving a remainder of one. d) We should be able to divide P(x) by C(x), leaving a remainder of two. 16. In a packet switching, if packets destined for a certain output arrive at a switch and their arrival rate exceeds the capacity of that output, then we have a problem of _______________. a) switching b) congestion c) packing d) contention 17. Which of the following statement is correct? a) A switch is a single-input, multi-output device, which transfers packets from an input to one or more outputs. b) A switch is a single-input, single-output device, which transfers packets from an input to one or more outputs. c) A switch is a multi-input, multi-output device, which transfers packets from an input to one or more outputs.

d) A packet is a single-input, multi-output device, which transfers switches from an input to one or more outputs. 18. The significant difference in cell formats (UNI & NNI) is that ___________. a) UNI format replaces GFC filed with 4 extra bits of VPI b) NNI format replaces GFC filed with 4 extra bits of VPI c) UNI format replaces GFC filed with 4 extra bits of CRC d) NNI format replaces GFC filed with 4 extra bits of CRC 19. The length of packets that are switched in an ATM network are ____ bytes. a) 5 b) 10 c) 48 d) 53 20. The packets that are switched in an ATM network are of _______________. a) fixed length b) variable length c) fixed or variable length d) none of the above. 21. Which of the following statement is correct? a) Even though a switch has a fixed number of inputs and outputs, large networks can be build by interconnecting a number of switches. b) We can connect switches to each other and to hosts using point-to-point links. c) Adding a new host to a network by connecting it to a switch does not necessarily reduce the performance of the network. d) All of these. 22. The 2 different ATM cell formats are a) UNI and SNI

b)NNI and SSI c) SNI and NNI d) UNI and NNI 23. A function of a switch that receives incoming packets on one of its link and transmits on some other link is called as a) Stepping b) Forwarding c) Reversing d) Manipulation
24. To decide how to forward a packet, a switch consults a _____________

a) Connection table b) Junction table c) Routing table d) Entry table 25. A switch has a ___________ topology a) Bus b) Mesh c) Tree d) Star 26. A _____________ that uniquely identifies a virtual connection a) Virtual correct Identifier b) Virtual circuit identifier c) Connection identifier d) Network Manager 27. Spanning tree algorithms are used to find a) Longest path between two nodes of a network

b) Shortest path between two nodes of a network c) Link failure between two nodes d) None of the above 28. The method of forwarding of a frame with a destination address on each active port other than the one on which the frame was received is called as a) Multicasting b) Unicasting c) Anycasting d) Broadcasting 29. The method of forwarding of a frame with a destination address on a group of active ports other than the one on which the frame was received is called as a) Multicasting b) Unicasting c) Anycasting d) Broadcasting 30. UDP is a -------------a. b. c. d. simple demultiplexer simple multiplexer host to host delivery service both a&c

31. Pseudo header consists of--------------a. b. c. d. protocol number source IP address destination IP address all the above

32. UDP stands for -----------a. User defined packet b. Universal data protocol

c. User datagram protocol d. None of the above

33.DNS stands for a. b. c. d. dynamic name server dynamic name system domain name server domain name software

e.
34. TCP is ------------ protocol a. Connectionless b. Connection oriented c. Not both d. Its not a protocol 35. UDP port field is a. 6bytes long b. 16bytes long c. 16bits long d. 53 bytes long

36. Flow control involves_________ a. Keeping a fast sender from overrunning a slow receiver b. Keeping a slow sender from overrunning a slow receiver c. Keeping a fast sender from overrunning a fast receiver d. Keeping a slow sender from overrunning a fast receiver 37. Which of the following is a resource allocation mechanism a. Router centric versus host centric

b. Window based versus rate based c. Reservation based versus feedback based d. All the above 38. Power of a network is given by the ratio__________ a. b. c. d. Power=Throughput/Delay Power=Delay/Throughput Power=Throughput/voltage Power= Voltage /Throughput

39. The queuing algorithm can be thought of as allocating____________ a. Bandwidth b. Buffer space c. Both a and b d. None of the Above 40. WFQ means_____________ a. Weighted fair queuing b. Weighted fare queuing c. Window fair queuing d. Window fare queuing 41. Routers that implement multiple FIFO queues transmits___________. a. Packets out of the lowest-priority queue if that queue is nonempty before moving on the next priority queue b. Packets out of the highest-priority queue if that queue is empty before moving on the next priority queue. c. Packets out of the highest-priority queue if that queue is nonempty after moving on the next priority queue. d. Packets out of the highest-priority queue if that queue is nonempty before moving on the next priority queue

42. Raj Jains fairness index to flows is given by____________ a. f(x1,x2,.,xn)=(n i=1 xi)3/nn i=1 xi2 b. f(x1,x2,.,xn)=(n i=1 xi)2/nn i=1 xi2 c. f(x1,x2,.,xn)=(n i=1 xi)/nn i=1 xi d. f(x1,x2,.,xn)=(n i=2 xi)2/nn i=1 xi2 43. For every flow we can calculate Fi for each packet that arrives using __________ a. Fi=max(Fi-1, Ai)+Pi b. Fi=max(Fi-2, Ai)+Pi c. Fi=min(Fi-1, Ai)+Pi d. Fi=min(Fi-2, Ai)+Pi 44. -------- Operation , when applied to a particular variable ID returns the value of that Variable plus the ID of the next variable. a) GET-SET b) SET-GO c) GET-READY d) GET-NEXT 45. SNMP depends on a companion specification called the --------a) SIP b) GET c) SET d) MIB 46. To partition the hierarchy into subtrees called ----------a) Branch b) Node c) Region d) Zones 47. ------- is a character string that identifies a resource a) URL b) IMP c) UDP d) URI 48. <CRLF> stands for a) Carriage return line first b) Carriage return line feed c) Control return line feed d) Control return line first 49. ---------- also define a set of message attributes that are exchanged as part of other Command , independent of transferring the message itself

a) TCP b) SMTP c) SNMP d) IMAP 50. MIME uses a straightforward encoding of binary data into the ASCII character set . The encoding is called a) base46 b) base64 c) base23 d) base10 2 marks questions(51-65)

51. Each protocol defines---------and-----------. a)packet interface,broadcast interface b)service interface,peer interface c)reliable interface,multicast interface d)peer interface,multicast interface. 52. Function of switch is a)forward the packet b)connect different networks c)store and forward packets d)none of the above 53. In 4B/5B encoding, 5-bit code for 0110 and 1001 is respectively a. 01110, 11001 b. 01110,10011 c. 01010, 11001 d. 00110, 11011 54. Electromagnetic waves traveling through is considered as 2/3rd the speed of Light in a vacuum.;a 300 Hz wave traveling through copper would have a wavelength of a. 66.7 X103 METERS b. 6.67 X103 METERS c. 667 X103 METERS d. 6.67 X106 METERS suppose a workstation can perform all necessary processing to switch 1 million packets each second .If the average packet is short, say, 64 bytes then the throughput is a. 512 bps b. 512Mbps c. 1Gbps d. 64kbps

55.

56.

802.16 and 802.15.1 are respectively a. Bluetooth and Wi-Fi b. Bluetooth and WiMAX c. Wi-Fi and WiMAX d. WiMax and Bluetooth

57.

In Token-ring Maintenance, to detect a missing token, the monitor watches for a passing token and maintains a timer equal to the maximum possible token rotation time. This interval equals a. NumStations x THT + RingLatency b. NumStations+ RingLatency x THT c. THT + RingLatency x NumStations d. NumStations + THT + RingLatency 58. Match the following: i) Switch fabric ii) Shared bus a) specially designed busses used for high-performance switches b) moves packets from input ports to output ports with minimal delay c) a matrix of pathways that can be used to connect any input port to any output port

a) i b, ii a, b) i a, ii c c) i c, ii a d) i c, ii b 59. A network with variable length packets, where the minimum packet length is 4KB and the link speed is 100Mbps.The time to transmit a maximum sized packet is a. 3276.8micro sec b. 327.68 micro sec

c.32.768 micro sec 3276.8 micro sec 60. A host with physical address 00100001 01001001 has IP address a. 127.16.0.0 b. 128.96.33.81 c. 255.255.255.0 d. 127.255.33.81 61. For the following network , Use RIP.In the final routing table at node A ,for destination D with cost ------------and next hop-------B A C

E D F G

a. 2,G b. 3,C c. 2,C d. 3,G

62. How long it takes for the sequence number to wrap around on network with bandwidth of OC-12(622 Mbps)? a. 54 sec

b. 55 sec c. 56 sec d. d. 57 sec 63. For retransmission of segments, TCP sets timeout function of RTT between the two ends of transmission and is given by the formula a. 2 X EstimatedRTT b. 2 + EstimatedRTT c. 2 EstimatedRTT d. 2 / EstimatedRTT 64. Match the following a. IP b. X.25 1. Virtual circuit abstraction 2. Connectionless datagram delivery service 3. Signaling protocols 4. End to end connection abstraction

a. a2,b1 b. a3,b1

c. a4, b1 d. a1 b2 65. SNMP is essentially a specialized Request/Reply protocol that support--------and -------------- kinds of request messages a. GET and POST b. GET and PUT c.GET and SET d. GET and FILL 4 Marks Questions (66-70)

66. Match the following 1. A function of a switch that receives incoming packets on one of its link and transmits on some other link is called as 2. The method of forwarding of a frame with a destination address on a group of active ports other than the one on which the frame was received is called as 3. The method of forwarding of a frame with a destination address on each active port other than the one on which the frame was received 1. Fragmentation or Segmentation

2. Forwarding or Switching

3. Multicasting

4. The method of splitting a huge data 4. Broadcasting block into smaller ones at the source node a) 1-2, 2-3, 3-1, 4-4 b) 1-1, 2-3, 3-4, 4-2 c) 1- 2, 2-3, 3-4, 4-1 d) 1-1, 2-2, 3-3, 4-4

67. Match the following: i) Application layer ii) Presentation layer iii) Session layer iv) Transport layer a) handles the transmission of raw bits over a communication link b) collects a stream of bits into larger aggregate called a frame c) handles routing among nodes within a packet-switched network d) implements a process-to-process channel

v) Network layer

e) provides a name space that is used to tie together the potentially different transport streams that are part of a single application f) is concerned with the format of data exchanges between peers g) defines a protocol by which file transfer applications can interoperate

vi) Data link layer vii) Physical layer

a) i b, ii f, iii d, iv e, v a, vi g, vii - c c) i c, ii f, iii d, iv e, v g, vi a, vii - b c) i g, ii f, iii e, iv d, v c, vi b, vii - a c) i d, ii a, iii e, iv g, v b, vi c, vii f

68 Each HTTP message has a general form START_LINE <CRLF> MESSAGE_HEADER <CRLF> <CRLF> MESSAGE_BODY <CRLF> (i) START_LINE stands for a) specifies the collection of option and (ii) MESSAGE_HEADER parameter that qualifies the request or response (iii) Blank line for b) whether this is request message or a (iv) MESSAGE_BODY response message c) Content of the request message d) is terminated a) i-a , ii-b ,iii-c ,iv-d b) i- b. ii-a , iii- d , iv- c c) i-d , ii-c.iii-b,iv-a d) i-c , ii-b , iii- c , iv - d 69. Suppose a workstation has an I/O bus speed og 1Gbps and memory bandwidth of 2Gbps. Assuming DMA in and out of memory, --------------- number of interfaces to 45Mbps T3 links a switch based on this workstation can handle. a. 10 b. 11 c. 12 d. 13

70. Bluetooth operates in the ____________ band at __________. It has a range of only ___________ and comes under a) license-exempt, 2.45 GHz, 10 m,wireless b) license, 10.45 GHz, 100 m, wireless c) license-exempt, 102.45 GHz, 100 m,wired d) license-exempt, 502.45 GHz, 100 m,wireless

Chapter No. (All from Peterson) 01 Foundation 02 Direct Link Networks 03 Packet Switching 04 Internetworking 05 End-to-end Protocols 06 congestion control and Resource Allocation 09 Applications

No. of 01 Mark Questions 06 09 07 07 06 08 07

No. of 02 Mark Questions 02 05 02 02 02 01 01

No. of 04 Mark Questions 01 01 01 01

Total Marks 14 23 15 15 10 10 13

01

You might also like