Anda di halaman 1dari 14

Model Question Paper Subject Code: MIT3031 Credits: 4 Subject Name: High Speed Networks Marks: 140 Part

A (One mark questions)


1. Traffic isolation and traffic engineering provides ____________________. (a) Circuit switching (b) Network switching (c) Packet switching (d) None of above 2. Routing is the process of _______________in a network along which to send network traffic. (a) Application (b) Switching Technique (c) Selecting paths (d) None of the above 3. An X.25 packet contains how many bytes of data? _____________ (a) 124 bytes (b) 128 bytes (c) 126 bytes (d) 220 bytes 4. Asynchronous transfer mode does the data transfer in the form of _____________. (a) Indirect chunks (b) Direct chunks (c) Direct and indirect chunks (d) None of the above 5. Information flow in Asynchronous transfer mode is organized in the form of _____________ packets, and we are called as ___________ (a) Fixed size data, roots (b) Fixed size packets, roots (c) Fixed size data, cells (d) fixed size packets, cells 6. In ___________________method high priority packets can be sent first. (a) Circuit switching (b) Network switching (c) Packet switching (d) None of the above

7. In ______________________mode cell header is composed of SIX elements. (a) Synchronous transfer (b) Asynchronous transfer (c) Data transfer (d) None of the above 8. Fast Ethernet supports a maximum data rate of ___________. (a) 100 Mbps (b) 100 Kbps (c) 120 Mbps (d) 120 Kbps 9. The Gigabit Media Independent Interface is an interface found between the ___________________________________. (a) Media interface control layer and transport layer (b) Media access control layer and transport layer (c) Media information control layer and physical layer (d) Media Access Control layer and the Physical layer 10. ____________________Control needs to provide services to the network layer. (a) Logical link (b) Data link (c) Address link (d) None of the above 11. User-network information exchange is also called as ___________________. (a) Virtual circuit connections (b) Logical connection (c) Information exchange (d) Control signaling 12. ___________________________ provides a uniform interface to the Reconciliation sub-layer for all physical media. (a) Media Access Control layer (b) Physical Medium Dependent sub-layers (c) Physical coding sub-layer (d) Logical Link Control layer 13. ATM does the data transfer in the form of _________________. (a) Discrete chunks (b) Normal chunks (c) Indiscreet chunks (d) None of the above 14. _________ represents the set of ATM service categories. (a) ABR (b) FBR (c) GFR (d) None of the above 15. Network Attached Storage servers usually support _____________________levels.

(a) (b) (c) (d)

RAID 0, RAID 1, RAID 2 and RAID 3. RAID 2, RAID 3, RAID 4 and RAID 5. RAID 1, RAID 2, RAID 3 and RAID 5. RAID 0, RAID 1, RAID 4 and RAID 5.

16. The main task of AAL is _________________________ (a) Transferring and retrieving (b) Segmentation and reassemble (c) Combining and dividing (d) None of the above 17. For receive and transmit data paths the Gigabit Media Independent Interface have ______ capacity (a) 4 bit (b) 8 bit (c) 6 bit (d) 12 bit 18. The development of Wi-Fi technology commenced in ___________ year. (a) 1995 (b) 1996 (c) 1997 (d) 1998 19. The technologies for wireless LANs are specified by the _________________ group of standards. (Pick the right choice). (a) IEEE 803.11 (b) IEEE 802.11 (c) IEEE 802.22 (d) IEEE 803.22 20. Which is NOT a property of congestion control mechanism (a) Efficiency (b) Fairness (c) Stability (d) Security 21. Jackson's theorem was given by _____________________. (a) Jorge R. Jackson (b) James R. Jackson (c) James G. Jackson (d) Jorge G. Jackson 22. _____________layer provides information about IP and IPX protocols (a) Logical Link Control (b) Media Access Control (c) Physical Coding Sub-layer (d) Physical Media Attachment

23. Which is NOT a WLAN component (a) User devices (b) Radio NICs (c) Applications (d) Routers 24. A signal which has all its values fixed is known as ______________. (a) Deterministic signal (b) Distributed signal (c) Data transfer signal (d) Direct signal 25. The subscribers of frame relay are engaged ________________________ with the service provider. (a) Network capacity (b) Committed Information Rate (c) Dropping frames (d) Network resources. 26. _______________________ ARQ approach is the most efficient of all ARQ approaches. (a) Selective-repeat (b) Stop-and-wait ARQ (c) Go-Back-N ARQ (d) Continuous ARQ 27. In TCP flow control, window field provides a maximum window size of_______ bytes (a) 65,455 (b) 65,535 (c) 65,545 (d) 65,435 28. Which among the following is considered as the simplest heavy-tailed distribution? (a) Jordan theorem (b) John bell theorem (c) Jacksons theorem (d) Jacobi theorem 29. When the overall demand of a resource exceeds its capacity is termed as ____________. (a) Signaling (b) Effects of Congestion (c) Congestion (d) None of above in negotiations on

30. TCPs 16-bit window field provides a maximum window size of ___________ bytes (a) 65,445 (b) 64,430 (c) 65,535 (d) 64,475 31. Both the sender and the _____________________ play a major role in determining the transmission rate of data flow. (a) Receiver (b) Network (c) Router (d) Retransmission timer 32. ____________________ value depends on the round-trip timer (a) Keep alive timer (b) Delayed ACK timer (c) Retransmit timer (d) Probe timer 33. ____________is defined in reference to a particular service class (a) Resource (b) Efficiency (c) Fairness (d) Service 34. GCRA stands for _________________________________. (a) General Cell Rate Algorithm (b) Geographical Cell Rate Algorithm (c) Guaranty Cell Rate Algorithm (d) Generalized Cell Rate Algorithm 35. _______________ is the fundamental property of any control system. (a) Stability (b) Data (c) Networking (d) None of the above 36. Identify the recently developed window management technique that has started to show up in TCP implementations. (a) Limited transmit (b) Fast recovery (c) Fast retransmit (d) Slow start

37. _____________________ technique is to use the available capacity in a network as much as possible and react to congestion in a controlled way. (a) Implicit congestion avoidance (b) Explicit congestion avoidance (c) Both A and B (d) None of above 38. A _____________is a control packet created at a congested node and sent back to a source node to control traffic flow. (a) Choke packet (b) Data packet (c) Node address packet (d) Node data packet 39. _________________is the capability of transmitting a single stream to multiple subscribers simultaneously. (a) Single casting (b) Multi-threading (c) Multicasting (d) None of above 40. _________________ uses the reverse-path multicasting (RPM) algorithm to construct source-based multicast delivery trees. (a) Distance-Vector Multicast Routing Protocol (DVMRP) (b) Core-Based Trees (CBT) (c) Protocol Independent Multicast (PIM) (d) Border Gateway Multicast Protocol (BGMP) 41. ______________________________ is the measure of maximum number of backto-back cells that may be transmitted at the peak cell rate without harming the sustained cell rate. (a) Peak Cell Rate (b) Sustained Cell Rate (c) Cell Transfer Delay (d) Maximum Burst Size 42. _______________ timer is used to holdup the transmission of ACK packets (a) Delayed ACK (b) Keep alive ACK (c) Retransmit ACK (d) Probe ACK 43. _____________________ Control has a major effect on the performance of bursty traffic if it mainly consists of bursts separated by long idle periods.

(a) Closed-loop (b) Open-loop (c) Hop-by-hop (d) Congestion 44. Identify the element of IntServ model whose function is to forward various packets flows in a manner which ensures that QoS commitments are met. (a) Packet classifier (b) Packet scheduler (c) Flow descriptor (d) Admission control 45. Identify the network element which is used to specify the allowed traffic pattern into network. (a) Tspec (b) Rspec (c) Filterspec (d) Flowspec 46. Identify the ATM service category which receives a capacity of SCR from the network. (a) RT-VBR (b) NRT-VBR (c) UBR (d) ABR 47. Name the edge function which checks the adherence of flow to the specified traffic profile. (a) (b) (c) (d) Marker Classifier Metering Shaper

48. Which of the following factors influences the PHB of a specific flow? (a) (b) (c) (d) Packet loss Assured forwarding Expedited forwarding Best-effort behavior

49. SBM is a signaling protocol that offers a method to map an _____________ protocol (a) Internet-level setup

(b) Intranet-level setup (c) Extranet-level setup (d) None of the above 50. Name the DiffServ model in which the packets from a sender are treated equally. (a) (b) (c) (d) Structured DiffServ Flat DiffServ Direct DiffServ Indirect DiffServ

Part B (Two mark questions)


51.________________delivers message to a single specified node and _______________ delivers message to all nodes in the network. (a) Multicast and any cast (b) Unicast and broadcast (c) Small cast and broadcast (d) Network cast and protocol cast 52. In Gigabit Ethernet the GMII is the interfaces between __________________ and _______________. (a) Data link layer, network layer (b) Media Access Control layer, Physical layer (c) Network layer, data transfer layer (d) Media Access Control layer, network layer 53. The GMII offers two media status signals __________________ and _______________. (a) Presence of carrier, absence of collision. (b) Application status, data collision (c) Network structure, data transfer (d) None of the above 54. Major factors of congestion are ________________ and ____________________. (a) Server based, data storage (b) Application, local area network (c) Data access, network access (d) Error prone network, low bandwidth lines 55. ATM cell always consists of a ___________header followed by a ___________ payload (a) 3-byte, 28-byte (b) 4-byte, 38-byte (C) 5-byte, 48-byte (d) 2-byte, 2

56. The two categories of Fast Ethernet that have been designed by IEEE are __________________ and _______________. (a) 1000BASE-X, 1000BASE-T4 (b) 100BASE-X, 100BASE-T4 (c) 1000BASE-X, 1000BASE-T6 (d) 10BASE-X, 10BASE-T6 57. The internetwork Border Gateway Protocol involves identification of ___________and the transportation of _________________. (a) Optimal routing paths, Information groups (b) Data collection paths, application groups (c) Structural routing, program groups (d) None of the above 58. NAS can increase the availability of data by using __________ or ____________. (a) SISK, Clustering (b) RAID, Clustering (c) RISK, Clustering (d) None of above 59. In Graph theory - entities of a graph as ____________and the links as _____________. (a) Rows, columns (b) Roots, begins (c) Nodes, edges (d) None of the above 60. We can represent a graph using either an _____________ or an ____________ matrix. (a) Adjacency, Incidence (b) Combining, arithmetic (c) Rows, adjacent (d) None of the Above 61. The IP routing process assigns values to different routes, based on the distance between the ______________and ________________. (a) Source, destination (b) Packets, roots (c) Clients, packets (d) Server, roots

62. _____________________ Field of the MPLS header has a length of __________ has the actual value of the MPLS label.

(a) (b) (c) (d)

Label, 20 bits Class Of Service (COS), 25 bits Stack, 30 bits Time-to-Live (TTL), 35 bits

63. The SBM LAN is made up of __________________ and ______________________. (a) (b) (c) (d) Many SBM clients, designated SBM Less SBM clients, delivery SBM Many SBM servers, designated SBM Less SBM servers, delivery SBM

64. The SBM protocol operations into two categories ______________ and ____________. (a) (b) (c) (d) Application design and data control Installation and executing control Execution and error handling control Initialization and admission control.

65. In __________________________ approach for providing multicast under Diffserv, the multicast information is embedded within the __________ itself as an additional header element. (a) Multicast capable core router, header (b) Multicast non-capable core router, router (c) Encapsulation based, packet (d) Packet embedding, multicast 66. The group membership protocol is employed by _______________to learn about the presence of group members on their directly attached to ____________________. (a) (b) (c) (d) Packets, sub-routers Routers, sub-networks Communicators, application None of the above

67. IPv4 multicast address range from _____________ to _______________ is reserved for multicasting (a) 0.0.0.224 to 255.255.255.239 (b) 239.225.225.255 to 0.0.255.255 (c) 224.0.0.0 to 239.255.255.255 (d) 255.255.239.224 to 225.255.0.0 68. The MTP Packet Format having fourth byte of the transport header includes the subchannel value of the__________. And the sub-channel field has a default value of______.

(a) (b) (c) (d)

Client, zero Server, one Client, one Server, zero

69. SLA between a _________________ and _________________is firstly established and the corresponding Service Level Specification (SLS) is delivered to the Network Access Server (NAS). (a) Service level and database (b) Data, internet (c) Application and the Internet provider (d) None of the above 70. Assured forwarding is elaborate scheme for managing the _____________and it defines ___________ priority classes. (a) Applications, three (b) Service classes, four (c) Network, six (d) Address, five 71. Packet scheduler algorithms follow different approaches ___________________ and ______________________. (a) Weighted Fair Queuing (WFQ) and First In First Out (FIFO). (b) Unweight Fair Queuing (WFQ) and Last In First Out (FIFO). (c) Condition Fair Queuing (WFQ) and First In Last Out (FIFO). (d) Process Fair Queuing (WFQ) and Last In Last Out (FIFO).

72. What are the two functions of the RSVP PROTOCOLS?

(a) Information and process State information (b) Manipulate and Maintain state information (c) counting and distributing (d) transfer and loading

73. The ____________________________ and _______________________ are the IntraDomain Routing Protocols (a) Brood Gateway Protocol (BGP) and Intra-Domain Routing Protocol (IDRP). (b) Base Gateway Protocol (BGP) and Altera-Domain Routing Protocol (IDRP).

(c) Border Gateway Protocol (BGP) and Inter-Domain Routing Protocol (IDRP). (d) Business Gateway Protocol (BGP) and Inactive-Domain Routing Protocol (IDRP).

74. MPLS also provides ________networks. (a) ATM and ISDN (b) FEC and SLS (c) PRN and IDSN (d) IDRP and IDSN

significant

benefits

when

applied

to

________

and

75. In multicast group ______________ and ______________ is used to receiving frames address. (a) LAN process and process interface card (b) IP process and network interface card (c) WAN process and rooter interface card (d) MAN process and HUB interface card

Part C (Ten mark questions)


1. 2. 3. 4. What is Packet-switching network? Discuss its basic operation What is ATM? Discuss its architecture with suitable diagram Write a short note on the categories of Fast Ethernet that have been designed by IEEE Explain the Poisson and related processes

High-speed networks Answer Key


Part - A Q. No. Ans. Key Q. No. Ans. Key Q. No. Ans. Key

1 A 2 C 3 C 4 B 5 D 6 B 7 B 8 A 9 D 10 C 11 B 12 C 13 A 14 C 15 D 16 B 17 B 18 C 19 B 20 D

21 B 22 A 23 C 24 A 25 B 26 A 27 B 28 B 29 C 30 C 31 B 32 D 33 C 34 D 35 A 36 A 37 B 38 A 39 C 40 A

41 D 42 A 43 B 44 B 45 A 46 A 47 C 48 A 49 A 50 B

Part - B
Q. No. Ans. Key 51 B 52 B 53 A 54 C 55 C 56 B

57 A 58 B 59 C 60 A 61 A 62 A 63 A 64 D 65 C 66 B 67 C 68 A 69 C 70 B 71 A 72 B 73 C 74 A 75 B

Anda mungkin juga menyukai