To$ of 6orm
7e$ly
0ottom of 6orm
)essage
8ermalink 7e$ly by ).Tari% )alik on #ecember 3/& 2932 at 2!29$m
)era cs:39 ka 8a$er acha ho gaya mostly $a$er mc% $ast main say thay aur ; %uestion bhi aur yah sab moa'
wali file say mc% aur sub(ective kay ; %uestion aye that.
"""""" 8rogram sends a message to a remote com$uter and re$orts whether the com$uter res$onds.
8ing *<om$uter ,etworks and Internets& $age=-
Traceroute
I<)8
,on of the given
"""""""""" was es$ecially concerned about the lack of high $owered com$uters.
A78A *<om$uter ,etworks and Internets& $age4-
I555
5IA
,on of the given
<om$uter networks are often called """""""""""""" because they use $acket technology.
5thernet
Switch networks
8acket networks *<om$uter ,etworks and Internets& $age >;-
,one of the given
?nlike 6rame 7elay and AT)& S)#S *Switched multi"megabit #ata service- offers@@@@@@@ .
<onnectionless service $aradigm *<om$uter ,etworks and Internets& $age332-
<onnection oriented service $aradigm
0oth <onnectionless and <onnection"oriented service $aradigm
,one of the given
AT) is designed to work on@@@@@@@@@@@.
Twisted 8air
<oaxial
7adio 6re%uency
6iber *<om$uter ,etworks and Internets& $age >2-
+ocal Talk is a +A, technology that em$loys """""""""""""
0us to$ology *8age ;9-
7ing to$ology
Star to$ology
,one of the given
The $roduct of delay and through$ut measures the @@@@@ of data that can be $resent on the network.
Area
Aolume *8age 29-
+ength
,one of the given
One re$eater @@@@@@@& two re$eaters @@@@@@@@ the maximum cable length limitation.
doubles& tri$le *8age /=-
s%uare roots& cude roots
and& tri$le
doubles& cancel
A network uses a """""" if all com$uters attach to a central $oint
Star To$ology *8age 24-
7ing To$ology
0us To$ology
,one of the given
In """""""""& network occu$ies larger areas like cities B countries.
+A,
WA, *8age /-
)A,
,one of the given
@@@@@@@@ has a (itter 'ero
,one of the given
Airtual 8rivate ,etwork
Isochronous ,etwork
Asynchronous ,etwork
A """""""""" $rovide a mechanism that a customer can use to set a $hysical address.
Static addressing scheme
<onfigurable addressing scheme *8age ;/-
#ynamic addressing scheme
,one of the given
To$ of 6orm
7e$ly
0ottom of 6orm
)essage
8ermalink 7e$ly by ).Tari% )alik on #ecember 3/& 2932 at 2!23$m
We say that 0ridges is a intelligent device ....Cive reasons
Write down the ty$e of network $erformance
What ty$e of switching techni%ue is used in WA,
Su$$ose you are a ,etwork 5ngineer in IS8& $roviding different technologies services like one of these may be
cell based network& as ,etwork 5ngineer you must know that which term is used to refer DinformationE related
to the network but not refers to the DinformationE that only uses the network& give name of this term and
reserved values.
There are two sites office A B 0& both are using A8,. If a user of another network wants to send some $acket to
A& then what will be the behavior of network A Fow data is $rotected in A8, environment Cive ; reasons*94
marks-
Su$$ose& There are two sites office A B 0 6ar away from each other& Which technolgy is used&+A, or WA,& give
/ reasons
To$ of 6orm
7e$ly
0ottom of 6orm
)essage
8ermalink 7e$ly by ).Tari% )alik on #ecember 3/& 2932 at 2!23$m
my to#ay 8a$5r
All )c%s from )oa' file and
"""""" has no way to determine the cause of the $roblem.
I<)8
8ing *<om$uter ,etworks and Internets& $age 33-
Trace route
,on of the given
Guestion ,o! 2 * )arks! 3 - " 8lease choose one
"""""" 8rogram sends a message to a remote com$uter and re$orts whether the
com$uter res$onds.
@ 8ing *8"33-
@ Trace route
@ I<)8
@ ,on of the given
)ost +A,s that em$loy ring to$ology use an access mechanism known as"""""""
<S)AH<#
<S)AH<A
TOI5, 8ASSI,C *<om$uter ,etworks and Internets& $age=4-
,one of the given
6ormally named @@@@@@@@@@ informally known as the twisted $air 5thernet or T8 5thernet.
39 0ase 2
39 0ase 4
39 0ase T *8age /;-
,one of the given
An interface for twisted $air 5thernet must have an @@@@@@@@@@@@ connector & and must generate signals
according to the@@@@@@@@@@@@@ s$ecification.
7."/4& 39 0ase T *<om$uter ,etworks and Internets& $age 32:-
7."/4& 39 0ase 4
0,<& 39 0ase 2
0,<& 39 0ase T
A 0ridge can @@@@@@@@
6ilter a frame
6orward a frame
5xtend a +A,
#o all the above
AT) used in """"""" and have
WA, <onnectionless service $aradigm
+A, <onnection oriented service $aradigm
0oth +A, and WA, <onnection"oriented service $aradigm
0oth +A, and WA, <onnectionless service $aradigm *<om$uter ,etworks and Internets& $age332-
A network with through$ut T and delay # has a total of @@@@@@@@ bit in transit at any time.
T H #
T x # *<om$uter ,etworks and Internets& $age29;-
T J #
,one of the given
+ocal Talk is a +A, technology that em$loys """""""""""""
0us to$ology *8age ;9-
7ing to$ology
Star to$ology
,one of the given
One re$eater @@@@@@@& two re$eaters @@@@@@@@ the maximum cable length limitation.
doubles& tri$le *8age /=-
s%uare roots& cude roots
and& tri$le
doubles& cancel
A network uses a """""" if all com$uters attach to a central $oint
Star To$ology *8age 24-
7ing To$ology
0us To$ology
,one of the given
In """""""""& network occu$ies larger areas like cities B countries.
+A,
WA, *8age /-
)A,
,one of the given
AT) assigns each A< a @@@@@@@@@@@@@ identifier that is divided two $arts to $roduce a hierarchy.
23"bit
22"bit
2;"bit
2/"bit *8age :>-
Static addressing scheme A """""""""" $rovide a mechanism that a customer can use to set a $hysical address.
<onfigurable addressing scheme *8age ;/-
#ynamic addressing scheme
,one of the given
7emaining 4 )<G1s r new
7ead more! <S:39 Today1s $a$er sub(ective " Airtual ?niversity of
8akistan htt$!HHvustudents.ning.comHgrou$Hcs:39com$uternetworkHforumHto$icsHcs:39"today"s"$a$er"
sub(ectiveKix''2mAt(/T+y
7ead more at htt$!HHvustudents.ning.comHgrou$Hcs:39com$uternetworkHforumHto$icsHcs:39"today"s"$a$er"
sub(ectiveKAd)F+0'7Iex3IOc2.==
Gno.3 in +A, of 2 $cs& at low cost which wire scheme you will use. Cive reasons
Answer!"
7easons!"
L Twisted $air 5thernet is the chea$est wiring that makes it so $o$ular.
L To allow changing the wiring without changing the interface hardware& ,I<s su$$ort
L )ulti$le wiring schemes are not limited to 5thernet technology.
L hubs *$hysically a star to$ology- to simulate a logical ring network.
L The distance between devices
L The amount of em"noise
756!! Fandouts 8age ,o. /4&/>
Gno.2 how many bits contains in A<I B A8I
Answer!"
L Airtual <hannel Indicator *3:"bits-
L Airtual 8ath Indicator *2" bit-&
756!! Fandouts 8age ,o. :>
Gno.; we have a bridge network that has two segments. is that $ossible to transfer data simultaneously through
segments
?nlike a re$eater& a bridge uses two ,I<s to connect two segments. It listens to all traffic and recogni'es frame format. It
also forwards only correct com$lete frames and discards the collided and error frames. A ty$ical bridge has two ,I<s& a
<8? a memory and a 7O). It only runs the code stored in its 7O). A network bridge can be used to segment one
network into two& thereby reducing the number of devices com$eting for transmission $rivileges.
+or eample,
if network A has 29 devices& there is the likelihood that two or more of them will attem$t to transmit data at the same
time and cause a collision. If a network bridge is added& it can s$lit network A into networks A and 0 of 39 devices each.
756!! Fandouts 8age ,o. 49
Gno.; is there any technology that use -A. an! /A. both topologies. i0 yes then write its
.ame
Star Topology, all com$uters are attached to a central $oint& which is sometimes called the Fub
&ing Topology network the com$uters are connected to each other in closed loo$. In this network first com$uter $asses
data to the second and then second $asses data to third and so on&
&E+"" 1an!outs 'age .o. 25
Qno.3 why packet switch check the hea!er 0rame be0ore 0orwar!ing the packet
Answer"#
#ata delivery from one com$uter to another is accom$lished through store and forward technology. In this technology
$acket switch stores incoming $acket and also forwards that $acket to another switch or com$uter. 6or this $ur$ose
$acket switch has internal memory into which it can hold $acket if outgoing connection is busy. 8ackets for each
connection held on %ueue.
&E+"" 1an!outs 'age .o. 54
Qno.5 /hy the !esigner o0 ATM technology select cells not packets5 6ive 0ive reasons
Answer"#
&eason"
3. AT) multi$lexed these 4;"byte cells instead of $ackets which reduced worst"case cell contention (itter by a
factor of almost ;9& reducing the need for echo cancellers.
2. 7eduction of (itter *and also end"to"end round"tri$ delays-
;. 6ull"length 3499 byte *32999"bit- data $acket would take >>./2 to transmit.
/. The design of AT) aimed for a low"(itter network interface
4. AT) broke u$ all $ackets& data& and voice streams into /2"byte chunks& adding a 4"byte routing header to each
one so that they could be reassembled later
&E+"" 1an!outs 'age .o. 44
http"77en.wikipe!ia.org7wiki7Asynchronous8Trans0er8Mo!e
Qno.4 %0 two 0ar away situate! o00ices are to connect with will be appropriate -A. etension or /A.. 6ive 0our
reasons to support you answer
3. If two buildings are located far from each other& a bridge& a $air of fiber modems and an o$tical fiber can be
used to connect two +A,s
2. +A, segments that need to be interconnected but are slightly far away& $oint to $oint wireless solutions are
available
;. They are generally ke$t over a tower so that line of sight is reali'ed between the locations& for best
$erformance.
/. These outdoor access $oints are configured to o$erate in the $oint"to"$oint or $oint"to"multi$oint modes and
one such access $oint along with antennaHtower is re%uired in each de$artmentHbuilding which needs to be
interconnected.
4. In certain areas& metro 5thernet might be available where the service $rovider has the infrastructure to connect
two locations of a same branch located in different $laces at s$eeds of 39H399 )b$s using his $ublic network
infrastructure
&E+"" 1an!outs 'age .o. 51
http"77www.ecitingip.com74597what#are#the#various#ways#to#eten!#a...
Qno.: writes three bene0its o0 routing i0 source a!!ress is not inclu!e! in the hea!er
Answer"#
0enefit
It allows fast and efficient routing.
8acket switch need not hove com$lete information about all destinations in s$ite it (ust has next The network can
continue to function even if to$ology changes without notifying entire network
&E+"" 1an!outs 'age .o. 5;
Qno.; 1ow many metho!s are available to span a network over longer !istances5 $ust write their names. <2 Marks=
Answer"#
3. +5AS5# S57IA+ +I,5 <O,,5<TIO,!
2. +5AS5# SAT5++IT5 <FA,,5+!
&E+"" 1an!outs 'age .o. 52
Qno.> which two i!enti0ier in ATM are use! to make ?irtual (ircuit5 <2 Marks-
Answer"#
A<I *Airtual <hannel Indicator-
A8I *Airtual 8ath Indicator-
&E+"" 1an!outs 'age .o. 4:
Qno.1@ conceptual Auestion about ?irtual private .etwork.<marks 9=
Answer"#
Airtual 8rivate ,etwork *A8,- combines the features of both $rivate and $ublic networks. It is limited to single
organi'ation and uses $ublic network for connectivity. These connections are sometimes called tunnels and connect
sites. 5ach site sees tunnel as $oint"to"$oint link. There is no access for other users of $ublic networks.
&E+"" 1an!outs 'age .o. :5
Qno.11 Bescribe the proce!ures in steps o0 Telephone calling, A connection oriente! service <Marks5=
Answer"
The connection"oriented service $aradigm for networking is similar to the manner in which tele$hones are used. This is
given as follows!
A caller dials a number of the destination. The tele$hone at the destination signals the arrival of a connection re%uest. If
the called $erson does not answerM the caller gives u$ after waiting for a timeout. If the called $erson does answer& then
the connection is established as binary connection identifier is given to each of the two $arties to enable identification of
the connection.
&E+"" 1an!outs 'age .o. 4:
Qno.12 Bescribe two maCor components o0 thick Ethernet <2=
Answer"#
3. ,etwork interface card *,I<-
2. Analog electronic device
&E+"" 1an!outs 'age .o. 32
Qno.19 Suppose in a computer network o0 a chemical company, each packet is trans0erre! with eAual amount o0 time
between systems. (onsi!er this scenario what will be the Citter5<2=
Answer"#
The amount of delay that a network introduces is called (itter. A network with 'ero (itter takes exactly the same amount
of time to transfer each $acket. A network with high (itter takes much longer to deliver some $ackets than others
&E+"" 1an!outs 'age .o. ;@
Qno.13 Suppose in university campus, bri!ges are use! in its local are network. Eplain all steps, how bri!ge buil! up
a!!ress list table o0 all attache! computers. <9=
Answer!"
?niversity cam$us im$lement bridges to attached the com$uters& bridges as a frame arrives to it& extracts a source
address from its header and automatically adds it in the list for that segment. In this way a bridge builds u$ address lists.
&E+"" 1an!outs 'age .o. 5@
Qno.15 Suppose an organization wants voice communication in a network by using ATM technology. Eplain how ATM
eliminates the varying !elays associate! with variable size !ata packets.
Answer"#
Organi'ation wants voice communication introduced AT) to meet several goals. It $rovides universal service for all
subscribers and su$$ort for all users for voice& video and data. It has a single unified infrastructure *no se$arate +A,s and
WA,s-. It gives guaranteed service when it is a$$ro$riate and su$$ort for low cost devices.
$%TTE&"
.itter is the term used for variance in transmission delays. .itter is significance for voice& video and data. In +A,s& (itter
can occur when a $acket is delayed because the network is busy.
'A()ET S%*ES"
+arge $ackets result in fewer overheads because a smaller fraction of the $acket is used for header information.
O$timum networks use /k0 $ackets or larger. +arge $ackets canNt easily be used for voice for exam$le 2"bit sam$les *at
324usec $er sam$le- would re%uire half a second to fill a /k0 $acket. 5cho cancellation can only be used with low
transmission delays.
&E+"" 1an!outs 'age .o. 44
Qno.14 /hile !esigning the ATM technology why !esigner o0 ATM chosen cells over packets which being use! wi!ely5
6ive 0ive reasons to support your answers.<5=
&eason"
3. AT) multi$lexed these 4;"byte cells instead of $ackets which reduced worst"case cell contention (itter by a
factor of almost ;9& reducing the need for echo cancellers.
2. 7eduction of (itter *and also end"to"end round"tri$ delays-
;. 6ull"length 3499 byte *32999"bit- data $acket would take >>./2 to transmit.
/. The design of AT) aimed for a low"(itter network interface
4. AT) broke u$ all $ackets& data& and voice streams into /2"byte chunks& adding a 4"byte routing header to each
one so that they could be reassembled later
&E+"" 1an!outs 'age .o. 44
http"77en.wikipe!ia.org7wiki7Asynchronous8Trans0er8Mo!e
Qno.1: Suppose star organization using repeater in its network. %0 0rames comes 0rom another network then will the
repeater be capable o0 !istinguish between 0rames 0rom two !i00erent networks5 Support your answer with a reason
also writes !own three !rawbacks, this organization may 0ace !ue to use o0 repeater.
Answer!"
Brawbacks
3. 7e$eaters $rovide no method for isolating traffic generated on one cable segment from traffic generated by
the other cable segment
2. When network uses a re$eater to connect cable segment A to segment 0 whether or not there is a station in
segment 0 that is the destination of the signal
;. 5thernet standard s$ecifies that any two stations cannot be se$arated by more than four re$eaters.
/. 7e$eaters do not recogni'e frame formatsM they (ust am$lify and retransmit the electrical signal. If a collision or
error occurs in one segment& re$eaters am$lify and retransmit also the error onto the other segments.
&E+"" 1an!outs 'age .o. 5@
Question D 1
/hat is the !i00erence between -A. an! /A.5
Answer
+ocal area network *+A,-
+A, is small in si'e covers the area within a room& building or cities.
Wide area network *WA,-
WA, is large in si'e and covers the area cities& countries and continents.
Question D 2
Be0ine the term $itter.
Answer
The term .itter is used for variance in transmission delays. .itter is significance for voice& video and data. .itter can occur
when a $acket is delayed because the network is busy.
Question D 9
6ive a comparison o0 the 0ollowing5
Thick Ethernet wiring scheme an! Thin Ethernet wiring scheme.
Answer
This uses thick coax cable. A?I cable or transceiver or dro$ cable connects from ,I< to transceiver. A?I cable carries
digital signal from ,I< to transceiver. The transceiver generates analog signal on coax cable. The wires in A?I carry digital
signals $ower and other control signals. Thick 5thernet also re%uires terminators to avoid signal reflectance.
Thin 5thernet uses thin coax cable that is chea$er and easier to install than thick 5thernet coax. In thin 5thernet wiring
scheme transceiver electronics are built into ,I< and ,I< connect directly to network medium. <oax cable use connector
on ,I<. <oax runs directly to back of each connected com$uter by T"connector. The T"connector directly attaches to ,I<.
Question D 3
1ow can Switche! ?irtual .etwork be establishe!5
Answer
)ost networks offer dynamic connections that last for a relatively short time. AT) can dynamically establish a switched
virtual circuit SA< that allows it as long as necessary and then terminate it. The com$uter sends a connection re%uest to
the switch to which it is attached. Software in the switch finds a $ath to the destination and sends with the connection
re%uest. 5ach $air of switches in the $ath communicates to choose a A8IHA<I for their tables. Once the connection is
established a message is given back to the originating com$uter to indicate the SA< is ready.
Question D 5
Bescribe permanent virtual circuits <'?(=.
Answer
AT) can $rovide the virtual circuits that look like traditional leased digital circuits. The $ermanent virtual circuits 8A<
works as long as the customer $ays the $eriodic fee for its use. The forwarding table enter configured the terms used by
Telco 8rovisioning re%uires two ste$s.
To determine a com$lete $ath.
To choose a$$ro$riate A8IHA<I for each ste$ in the $ath and configures each ad(acent $air of switches.
Question D 4
/hat are !e0ault routes !raw the table.
Answer www.vustudents.ning.com
7outing table entries can colla$se with a default route. If destination doesnNt have in ex$licit routing table entry and then
it use a default route. It is shown in the below table.
Table
#estination ,ext ho$#estination
,ext
ho$ #estination
,ext
ho$ #estination
,ext
ho$
3 " 2 " 3 ;&3 2 /&2
O 3&; / 2&/ 2 ;&2 / "
O 2&; ; " O /&;
/ ;&/
,ode 3 ,ode 2 ,ode ; ,ode /
Question D :
/hat is the !i00erence between the physical an! logical topologies5
Answer
5very +A, has a to$ology& or the way that the devices on a network are arranged and how they communicate with each
other.
'1ES%(- TF'F-F6E"
The way that the workstations are connected to the network through the actual cables that transmit data "" the $hysical
structure of the network "" is called the $hysical to$ology. %t !epen!s on the wiring scheme.
-F6%(A- TF'F-F6E"
The logical to$ology& in contrast& is the way that the signals act on the network media& or the way that the data $asses
through the network from one device to the next without regard to the $hysical interconnection of the devices. We can
say that it is !e0ine! by the speci0ic network technology.
Question D ;
Be0ine ?ector#Bistance Algorithm.
Answer
8acket switches wait for next u$date message and they iterate through entries in message. If entry has shortest $ath to
destination& insert source as next ho$ to destination and record distance as distance from next ho$ to destination $lus
distance from this switch to next ho$.
Question D >
/hat is the concept o0 store an! 0orwar! technology5
Answer
STF&E A.B +F&/A&B"
#ata delivery from one com$uter to another is accom$lished through store and forward technology. In this technology
$acket switch stores incoming $acket and also forwards that $acket to another switch or com$uter. 6or this $ur$ose
$acket switch has internal memory into which it can hold $acket if outgoing connection is busy. 8ackets for each
connection held on %ueue.
Question D 1@
1ow can Switche! ?irtual .etwork be establishe!5
Answer
www.vustudents.ning.com
S/%T(1EB ?%&TGA- (%&(G%TS"
)ost networks offer dynamic connections& which last for a relatively short time.
To handle this& AT) can dynamically establish a switched virtual circuit *SA<-& allow it last as long as necessary and then
terminate it.
The terminology comes from the TelcoNs where switching system normally refers to all switching.
ESTAH-%S1%.6 A. S?("
The com$uter sends a connection re%uest to the switch to which it is attached.
Software in the switch finds a network $ath to the destination and sends along the connection re%uest.
5ach $air of switches in the $ath communicates to choose a A8IHA<I for their tables. Once the connection is established
by the destination& a message is sent back to the originating com$uter to indicate the SA< is ready.
If any switch or the destination com$uter does not agree to setting u$ the A<& an error message is sent back and the SA<
is not established
Question D 11
1ow can a bri!ge know whether to 0orwar! 0rames5
Answer
The bridge builds a list of )A< addresses on either side of the bridge. Therefore& it knows which $ackets should be
forwarded to the other side and which should not. )ost bridges are self"learning bridges. As soon as a frame arrives to a
bridge& it extracts a source address from its header and automatically adds it in the list for that segment. In this way a
bridge builds u$ address lists.
In the exam$le of a $acket that uses a )A< address not in its table it can err on the side of caution by forwarding the
$acket.
Question D 12
(ompare connection oriente! an! connectionless Service.
Answer
(onnection#Friente! vs. (onnectionless Service
This characteristic s$ecifies whether conversations take $lace in a more or less structured manner. When using
a connection#oriente! $rotocol& you incur the overhead of setting u$ a virtual circuit *a defined communications $ath-
between the sender and receiver& which is maintained until the sender and receiver have com$leted their entire
conversation.
When the conversation is com$leted& you incur the overhead of tearing down the virtual circuit. <onnection"oriented
$rotocols $rovide guaranteed delivery of messages in the order in which they were sent.
<ontrast this with (onnectionless service& which does not re%uire establishing a session and a virtual circuit. This can be
found in the network layer or trans$ort layer& de$ending on the $rotocol. Pou can think of a connectionless $rotocol as
being akin to mailing a $ost card. Pou send it and ho$e that the receiver gets it. <ommon features of a connectionless
service are!
8ackets do not need to arrive in a s$ecific order
7eassembly of any $acket broken into fragments during transmission must be in $ro$er order
,o time is used in creating a session
,o Acknowledgement is re%uired.
The largest connectionless network in use today is the Internet
Question D 19
/hich type o0 in0ormation is obtaine! 0rom network sni00er an! in which mo!e .etwork sni00er operates5
Answer"
A network analy'er also called network monitor or a network sniffer is used to examine the $erformance of or debug a
network. It can re$ort statistics such as ca$acity utili'ation& distribution of frame si'e& collision rate or token circulation
time
'ost installations still %se #I( Ethernet encoding in which
there is no //&01234 header in the frame. 3 network
analy5er can tell from the val%es in the type field *small
val%es are lengths, which mean an //&01234 header is
located in the first octets of the data area6 large val%es are
types, which mean no //&01234 header is incl%ded..
The o$eration of network analy'er is a com$uter with a network interface that receives all frames& which is called
$romiscuous mode. So many deskto$ com$uters have interface that can be configured for $romiscuous mode. When
combined with software com$uter can examine any frame on +A,. In this way the communication across +A, is
guaranteed to be $rivate. <om$uter receives and dis$lays frames on the +A,.
,etwork analy'er can be configured to filter and $rocess frames. It can count frames of s$ecific ty$e of si'e. It dis$lays
only frames from or to s$ecific com$uters.
Question D 13
Bi00erentiate b7w Thin Ethernet, Thick Ethernet an! Twiste! 'air Ethernet5
Answer
Thick Ethernet"
Thick 5thernet& officially known as 39 0ase"4& is the oldest form of 5thernet.
One form of cabling su$$orted by 5thernet is low"loss 49 Ohm coaxial cable as shown in the figure below. This ty$e of
cable is 9.4Q diameter *usually su$$lied with a yellow outer 8A< coating- and rather inflexible. It has become known in
the communications industry as QThick 5thernetQ. The official name for this cable is 39 0aseband4 *3904-& indicating that
it is s$ecified for baseband communications at 39 )b$s over distances u$ to 499m.
Thin Ethernet"
Thin 5thernet& officially called 39 0ase"2& is a less ex$ensive version of 39 0ase"4 *Thick 5thernet- technologies. It uses a
lighter and thinner coaxial cable and dis$enses with the external transceivers used with 39 0ase"4.
39 0ase"2 uses an 7C"42AH? coaxial cable and is wired in a bus to$ology. 5ach device on the network is connected to the
bus through a 0,< QTQ ada$ter& and each end of the bus must have a 49 Ohm terminator attached. 5ach node on the bus
must be a minimum of 9.4 meters *3.4 feet- a$art& and the overall length of the bus must be less than 324 meters *:9:
feet-.
Twiste! 'air Ethernet"
Twisted 8air 5thernet *39baseT-& sometime also called Q?T8Q from Q?nshielded Twisted 8airQ& is based on using a cable
similar to $hone"wiring. The cable is connected via 7."/4 connectors to the network card installed in the 8<.
Question D 15
-%ST SFME (1A&A(TE&%ST%(S F+ A (-%E.T5
Answer
The characteristics of a client are ex$lained below!
Q<lient is an arbitrary a$$lication $rogram.
QIt becomes client tem$orarily.
QIt can also $erform other com$utations.
QIt is invoked directly by the user.
QIt runs locally on the userNs com$uter.
QIt actively initiates contact with a server.
QIt contacts one server at a time.
Question D 14
Eplain T(' Segment +ormat5
Answerwww.vustudents.ning.com
T<8 uses single format for all messages. T<8 uses the term segment to refer to a message. 5ach message sent from T<8
on one machine to T<8 on another machine uses this format including data and acknowledgement.
Question D 1:
/hat is %'v4 A!!ress .otation5
Answer
322"bit addresses unwidely in dotted decimalM re%uires 3: numbers!
394.229.3;:.399.244.244.244.244.9.9.32.322.3/9.39.244.244
:=#<! 22:/! 6666! 6666! 9!3229!2<9A! 6666
Rero"com$ression S series of 'eroes indicated by two colons
669<! 9!9!9!9!9!9!03
669<!!03
I8v: address with =: leading 'eros is inter$reted to hold an I8v/ address
Question D 1;
www.vustudents.ning.com
1ow much !ata can present on original Ethernet segment at one time5 To 0in! out compute the !elay#throughput
pro!uct. The original Ethernet operate at 1@ mega bits per secon!, an! a segment was limite! to 5@@ meters. Assume
the signals propagate !own the cable at 44 percent o0 the spee! o0 light5
Answer
S$eed of light T 2== >=2 /42 m H s
0andwidthT39
#elay T :: $ercent of s$eed of light T3=>2:;922 mHs
0andwidth #elay $roductT 2/>;22>>>499
Question D 1>
Eplain these terms
Star topology, &ing topology, +rame5
Answer
+&AME"
A frame or hardware frame denotes a $acket of a s$ecific format on a s$ecific hardware technology
&%.6 TF'F-F6E
In this to$ology of network the com$uters are connected to each other in closed loo$.
STA& TF'F-F6E
In this to$ology& all com$uters are attached to a central $oint& which is sometimes called the Fub
Question D 2@
Eplain the term bri!ge an! its 0unctions
Answer
A bridge kee$s a list for each segment that consists of $hysical addresses of the com$uter attached to that segment. In
this way a bridge knows on which segment a destination com$uter is attached.
)ost bridges are self learning bridges. As soon as a frame arrives to a bridge& it extracts a source address from its header
and automatically adds it in the list for that segment. In this way a bridge builds u$ address lists.
A bridge is a hardware device also used to connect two +A, segments to extend a +A,.
67A)5 6I+T57I,C
The most im$ortant task a bridge $erforms is frame filtering. If both the source and destination are on the same
segment& it does not forward the frame to the other segment. A frame is forwarded to the other segment& if it is
destined to that segment.
www.vustudents.ning.com
Question D 21
Eplain .%( an! (omputer 'rocessing5
Answer
.%( A.B ('G '&(ESS%.6"
,I< contains sufficient hardware to $rocess data inde$endent of system <8?. In which some ,I<s contain se$arate
micro$rocessor. In addition to this it also include analog circuitry interface to system bus& buffering and $rocessing
Question D 22
/hat is 'arity (hecking5 Eplain
Answer
8arity checking
To detect the error there are different schemes for which $arity checking is also common used& in $arity checking& $arity
refers to the number of bits set to 3 in the data item. A $arity bit is an extra bit transmitted with data item chose to give
the resulting bit even or odd $arity
www.vustudents.ning.com
Question D 29
/hat !o you know about BCikstraIs algorithm5
Answer
BCikstraIs algorithm
#(ikstraNs algorithm can accommodate weights on edges in gra$h. The shortest $ath is then the $ath with lowest total
weight.
Question D 23
/hat are the uses o0 &epeater5
Answer
7e$eater is a networking device
A re$eater is used to increase the signal strength. It am$lifies the weakening signal received from one segment and then
retransmits onto another segment
'c$7s of cs810 In one 'ega file
9%estion 2o: 1 * 'arks: 1 . ; 4lease choose one
A
---------- relies on the hardware manufacturer to assign a unique physical address to each network
interface.
< 1tatic addressing scheme
< Configurable addressing scheme
< Dynamic addressing scheme
< None of the given
9%estion 2o: , * 'arks: 1 . ; 4lease choose one
An
interface for thin Ethernet must have an connector ! and must generate signals according
to the specification.
< =>;?5, 10 Base T
< "#-$%! &' (ase %
< (NC! &' (ase )
< (NC! &' (ase *
9%estion 2o: - * 'arks: 1 . ; 4lease choose one
A
system with redundant bridges might have a problem with in the system.
< /oop
< +ilters
< ,panning *rees
< All given choices
9%estion 2o: ? * 'arks: 1 . ; 4lease choose one
A (ridge can
< +ilter a frame
< +orward a frame
< E-tend a .AN
< #o all the a"ove
9%estion 2o: 5 * 'arks: 1 . ; 4lease choose one
is used for typical data applications /where the data rate may be unknown and bursty0 and
allows use of whatever bandwidth is available at a given time.
< Constant (it "ate /C("0 service
< 1ariable (it "ate /1("0 service
< 3vaila"le Bit =ate *3B=. service
< None of the given
9%estion 2o: 8 * 'arks: 1 . ; 4lease choose one
3*2
assigns each 1C a identifier that is divided two parts to produce a hierarchy.
< )&-bit
< ))-bit
< )3-bit
< ,?;"it
9%estion 2o: * 'arks: 1 . ; 4lease choose one
identifies which application program on receiving computer should receive the data
< .ogical address
< ,ource port
< #estination 4ort
< None of the given
9%estion 2o: 1- * 'arks: 1 . ; 4lease choose one
identifies the application program that sent the data.
< Destination 4ort
< 1o%rce port
< .ogical address
< None of the given
9%estion 2o: 1? * 'arks: 1 . ; 4lease choose one
9hic
h of the following are interior routing protocols:
< =I4
< ;,4+
< (84
< "64 and ;,4+
9%estion 2o: 15 * 'arks: 1 . ; 4lease choose one
*he
(order 8ateway 4rotocol /(840 uses for all communication
< 7D4
< T&4
< (oth 7D4 and *C4
< None of the given
9%estion 2o: 18 * 'arks: 1 . ; 4lease choose one
measures distance in network hops! where each network between the source and destination
counts as single hop.
< (84
< ;,4+
< =I4
< None of the given
9%estion 2o: 1 * 'arks: 1 . ; 4lease choose one
;,4+
is based on--------
< Distance vector routing
< /ink state ro%ting
< 4ath vector routing
< Distance vector routing and .ink state routing
9%estion 2o: 1+ * 'arks: 1 . ; 4lease choose one
performs local multicast and uses 64-in-64 encapsulation to send multicast datagrams from one site
on the 6nternet to another.
< #istance @ector '%lticast =o%ting 4rotocol *#@'=4.
< Core (ased *rees /C(*0
< 4rotocol 6ndependent 2ulticast Sparse Mode (PIM-SM)
< 4rotocol 6ndependent 2ulticast Dense Mode (PIM-DM)
9%estion 2o: 19 * 'arks: 1 . ; 4lease choose one
*he length of time required to send a variable length packet is variable and does not require a complicated
interrupt scheme to detect completion of transmission.
< *rue
< Aalse
9%estion 2o: ,0 * 'arks: 1 . ; 4lease choose one
NE<
* =EADE" field in the base header defines type of header and it appears at end of fi-ed-si>e base header.
< Tr%e
< +alse
9%estion 2o: ,1 * 'arks: 1 . ; 4lease choose one
Altho
ugh message e-change can be used to bind addresses! sending a request for each binding is hopelessly
inefficient.
< Tr%e
< +alse
9%estion 2o: ,, * 'arks: 1 . ; 4lease choose one
Address mask defines how many bits of address are in suffi-:
< *rue
< Aalse
9%estion 2o: ,- * 'arks: 1 . ; 4lease choose one
A computer attached to a given network can only communicate with other computers attached to the same
network. 6s this a problem with multiple networks:
< Tr%e
< +alse
9%estion 2o: ,? * 'arks: 1 . ; 4lease choose one
6n the
&?@'s large organi>ations began to acquire multiple networks. Each network in the organi>ation formed
island. Employees needed to choose a computer appropriate for each task. ,o they needed multiple
screens! keyboards and computers.
< +alse
< Tr%e
9%estion 2o: ,5 * 'arks: 1 . ; 4lease choose one
*he
term self-identifying is used for Classful 64 addresses because the class of the address can be computed
from the address.
< itself
< prefi-
< suffi-
< mask
9%estion 2o: ,8 * 'arks: 1 . ; 4lease choose one
6n
which method of Address "esolution 4rotocol the protocol address independent of hardware address
9ere A*A stands for *able lookup! ACA for Closed-form Computation and ADA for Data E-change:
< *! C
< D
< C
< T, #
9%estion 2o: , * 'arks: 1 . ; 4lease choose one
6n
which method of Address "esolution 4rotocol the protocol address is determined by hardware address:
9ere A*A stands for *able lookup! ACA for Closed-form Computation and ADA for Data E-change:
< *
< D
< &
< *! C
9%estion 2o: ,+ * 'arks: 1 . ; 4lease choose one
"eco
nstruction of original datagram is called reassembly.
< Tr%e
< +alse
9%estion 2o: ,9 * 'arks: 1 . ; 4lease choose one
A
computer needs a complete stack of protocols to run either a client or a server.
< Tr%e
< +alse
9%estion 2o: -0 * 'arks: 1 . ; 4lease choose one
*C4
uses mechanism to control the flow of data.
< door
< window
< acknowledgment
< retransmission
9%estion 2o:-1 *'arks: 1. ; 4lease choose one
representation of links that connect nodes is called as physical topology.
B geometrical
B logical
B physical
9%estion 2o: -, * 'arks: 1 . ; 4lease choose one
*he internet model consists of layers.
B three
B two
B five
B seven
9%estion 2o: -- * 'arks: 1 . ; 4lease choose one
Encryption and encoding are the same terms.
*rue
B +alse
9%estion 2o: -? * 'arks: 1 . ; 4lease choose one
he amplitude of a digital signal depends upon the to represent a bit.
B phase
B voltage
B wavelength
9%estion 2o: -5 * 'arks: 1 . ; 4lease choose one
*he inversion of the level at & bit is called as
BN"C-.
B N"C-6
B "C
9%estion 2o: -8 * 'arks: 1 . ; 4lease choose one
2odulation of an analog signal can be accomplished through changing the of the
carrier signal.
B amplitude
B frequency
B phase
B all of the given
9%estion 2o: - * 'arks: 1 . ; 4lease choose one
6f +CC regulations are followed! the carrier frequencies of adDacent A2 radio stations are
apart.
B % E=>
B &' E=>
B )'' E=>
B %3' E=>
9%estion 2o: -+ * 'arks: 1 . ; 4lease choose one
Category % 7*4 cable is used for data transmission of upto.
B &'' 2bps
B )'' 2bps
B )%' 2bps
B $'' 2bps
9%estion 2o: -9 * 'arks: 1 . ; 4lease choose one
*he "8 number gives us information about .
B *wisted pairs
B Coa-ial cables
B ;ptical fibers
B all of the given
9%estion 2o: ?0 * 'arks: 1 . ; 4lease choose one
*he inner core of an optical fiber is in composition.
B 8lass plastic
B Copper
B (imetallic
B .iquid
9%estion 2o: ?1 * 'arks: 1 . ; 4lease choose one
All of popular +iber optic connectors are shaped.
B Conical
B (arrel
B Circular
B "ectangular
9%estion 2o: ?, * 'arks: 1 . ; 4lease choose one
*he 1.+ and .+ bands use propagation for communications.
B 8round
B ,ky
B .ine of sight
B ,pace
9%estion 2o: ?- * 'arks: 1 . ; 4lease choose one
2ultiple-ing is the set of techniques that allows simultaneous *< of multiple signals across
data link
B ,ingle
B 2ulti
B ,ingle and 2ulti
B none of the given
9%estion 2o: ?? * 'arks: 1 . ; 4lease choose one
A portion of the path that carries *< b5w a given pair of devices is known as .
B Node
B (ridge
B Channel
B 8ateway
9%estion 2o: ?5 * 'arks: 1 . ; 4lease choose one
9hich error detection method involves polynomials:
B Checksum
B *wo-dimensional parity check
B C"C
B ,imple parity check
9%estion 2o: ?8 * 'arks: 1 . ; 4lease choose one
6f the A,C66 character 8 is sent and the character D is received! what type of error is this:
B ,ingle-bit
B 2ultiple-bit
B (urst
B "ecoverable
9%estion 2o: ? * 'arks: 1 . ; 4lease choose one
9hich error detection method involves the use of parity bits:
B ,imple parity check F two dimensional parity check
B C"C
B *wo-dimensional parity check
B ,imple parity check
9%estion 2o: ?+ * 'arks: 1 . ; 4lease choose one
9hich error detection method can detect a single-bit error:
B ,imple parity check
B *wo-dimensional parity check
B C"C
B All of the given
9%estion 2o: ?9 * 'arks: 1 . ; 4lease choose one
*he =amming code is a method of
B Error detection
B Error correction
B Error ecapsulation
B Error detection F Error encapsulation
9%etion 2o: 50 * 'arks: 1 . ; 4lease choose one
,liding window requires that data frames be transmitted
B ,equentially
B +requently
B ,ynchronously
B Asynchronously
9%estion 2o: 51 * 'arks: 1 . ; 4lease choose one
6n selective-reDect A"G! only the specific damaged or lost frame is.
B "etransmitted
B +orwarded
B ,elected
B "eDected
9%estion 2o: 5, * 'arks: 1 . ; 4lease choose one
9hich of the following sublyer! resolves the contention for the shared media
B 2AC
B ..C
B4hysical
9%estion 2o: 5- * 'arks: 1 . ; 4lease choose one
*he 4D7 has no flag fields! no C"C! and no station address
B *"7E
B +A.,E
9%estion 2o: 5? * 'arks: 1 . ; 4lease choose one
6EEE divides the base band category into standards.
B %
B $
B 3
B H
9%estion 2o: 55 * 'arks: 1 . ; 4lease choose one
.ike &' (ase %! &' (ase ) is a topology .AN
B "ing
B 2esh
B ,tar
B (us
9%estion 2o: 58 * 'arks: 1 . ; 4lease choose one
Check sum method is used for layers.
B 4hysical
B Application
B *ransport
B Datalink
9%estion 2o: 5 * 'arks: 1 . ; 4lease choose one
"epeater works on layer.
B Data .ink
B 4hysical
B Network
B Application
9%estion 2o: 5+ * 'arks: 1 . ; 4lease choose one
*runks are transmission media such as that handle the telephone to the nearest end
office.
B ,atellite links
B *wisted-pair F +iber-optic
B *wisted-pair
B +iber-optic
9%estion 2o: 59 * 'arks: 1 . ; 4lease choose one
9hich of the following uses a series of filters to decompose multiple-ed signal into
its constituent signals.
27<
B DE27<
B ,witch
B (ridge
9%estion 2o: 80 * 'arks: 1 . ; 4lease choose one
6n +ast Ethernet! data rate can be increased by collisions.
B 6ncreasing
B Decreasing
B Eeeping Constant
B None of the given
9%estion 2o: 81 * 'arks: 1 . ; 4lease choose one
Computer networks are often called -------------- because they use packet technology.
< Ethernet
< ,witch networks
< 4acket networks
< 2one of the given
9%estion 2o: 8, * 'arks: 1 . ; 4lease choose one
A network uses a ------arranges for computers to be connected in a closed loop.
< ,tar *opology
< =ing Topology
< (us *opology
< None of the given
6n a ring topology each computer is connected to other thorough a ring
9%estion 2o: 8- * 'arks: 1 . ; 4lease choose one
An ------------method! the network hardware designers specify how type information is included in the
frame and the value use to identify various frame types.
< E)plicit frame type
< 6deal frame type
< 6mplicit frame type
< None of the given
E<4.6C6* +"A2E *I4EJ
6n this type the identifying value is included with frame describes types of
included data.
9%estion 2o: 8? * 'arks: 1 . ; 4lease choose one
An interface for thin Ethernet must have an connector ! and must generate signals
according to the specification.
< =>;?5, 10 Base T *reference not availa"le.
< "#-$%! &' (ase %
< (NC! &' (ase )
< (NC! &' (ase *
9%estion 2o: 85 * 'arks: 1 . ; 4lease choose one
A (ridge forwards or filters a frame by comparing the information in its address table to the
frameKs
< .ayer ) source address
< ,ource nodeKs physical address
< /ayer , destination address
< .ayer 3 destination address
9%estion 2o: 88 * 'arks: 1 . ; 4lease choose one
2ost 9AN systems include a mechanism that can be used to eliminate the common case of duplication
routing is called
< =ierarchal address
< #efa%lt ro%te
< ,hortest path
< None of the given
2ost 9AN systems include a mechanism that can be used to eliminate the common case of duplication
routing is called Default route. *he mechanism allows a single entry in a forwarding table to replace a
long list of entries that have the same ne-t hope value
9%estion 2o: 8 * 'arks: 1 . ; 4lease choose one
of *C4564 layering model! corresponds to basic network hardware.
< 4hysical /ayer
< Network 6nterface .ayer
< 6nternet .ayer
< *ransport .ayer
.AIE" &J
Corresponds to basic network hardware layer in ;,6
9%estion 2o: 8+ * 'arks: 1 . ; 4lease choose one
4rotocols of *C4564 layering model specify how to ensure reliable transfer.
< 4hysical .ayer
< Network 6nterface .ayer
< 6nternet .ayer
< *ransport .ayer
*he 6nternet layer in the *C4564 reference model is responsible for transferring data between the source
and destination computers
9%estion 2o: 89 * 'arks: 1 . ; 4lease choose one
is called an end-to-end protocol because it provide a connection directly from an application on
one computer to an application on a remote computer.
< 64
< B#4
< *C4
< None of the given
7D4 has the following characteristics.
6t is an end-to-end protocol. 6t provides application-to-application communication.
9%estion 2o: 0 * 'arks: 1 . ; 4lease choose one
uses distance vector approach to define routing
< (84
< ;,4+
< =I4
< None of the given
#I1T32&E;@E&TC= =CBTI2D:
L 6t is very simple to implement.
L 4acket switch updates its own routing table first.
L 6t is used in "64.
9%estion 2o: 1 * 'arks: 1 . ; 4lease choose one
is ideal in a situation where the group is small and all members are attached to contiguous
.ocal Area Networks.
< Alood;and ;4r%ne
< Configuration-and -*unneling
< Core-(ased Discovery
< None of the give''HE
A/CC#;32#;4=B2E:
+lood-and-prune is ideal in a situation where the group is small and all members
Are attached to contiguous .ocal Area Networks.
9%estion 2o: , * 'arks: 1 . ; 4lease choose one
"outer that decrements **. to sends 6C24 time e-ceeded message! with routerKs address as source
address
< 3
< )
< &
< 0
"outer that decrements **. to ' sends 6C24 time e-ceeded message! with routerKs
address as source address
9%estion 2o: - * 'arks: 1 . ; 4lease choose one
4rotocol addresses are abstractions provided by .
< =ardware
< 1oftware
< ;perating system
< 6nternet
4";*;C;. ADD"E,,E, AND 4ACEE* DE.61E"IJ
4rotocol addresses are abstractions provided by software
9%estion 2o: ? * 'arks: 1 . ; 4lease choose one
Although message e-change can be used to bind addresses! sending a request for each binding is
hopelessly inefficient.
< Tr%e
< +alse
CA,=6N8 A"4 "E,4;N,E,J
Although message e-change can be used to bind addresses! sending a request for
each binding is hopelessly inefficient
9%estion 2o: 5 * 'arks: 1 . ; 4lease choose one
A"4 is almost always used to bind a -bit 64 address to a -bit Ethernet address.
< -,, ?+
< )$! 3)
< 3)! H$
< 3)! &)M
A"4 is almost always used to bind a 3)-bit 64 address to a $M-bit Ethernet address
9%estion 2o: 8 * 'arks: 1 . ; 4lease choose one
6n the &?@'s large organi>ations began to acquire multiple networks. Each network in the organi>ation
formed island. Employees needed to choose a computer appropriate for each task. ,o they needed
multiple screens! keyboards and computers.
< +alse
< Tr%e
6n the &?@'s large organi>ations began to acquire multiple networks. Each
Network in the organi>ation formed island. Employees needed to choose a
computer appropriate for each task. ,o they needed multiple screens! keyboards
And computers.
9%estion 2o: * 'arks: 1 . ; 4lease choose one
6n which method of Address "esolution 4rotocol the protocol address is determined by hardware address:
9ere A*A stands for *able lookup! ACA for Closed-form Computation and ADA for Data E-change:
Aeat%res
Types of
=esol%tion
7se full with any hardware *
Address change affects all hosts *
4rotocol address is determined by
hardware address
C
< *
< D
< &
< *! C
9%estion 2o: + * 'arks: 1 . ; 4lease choose one
*he general form of an 64 datagram is with a header followed by data. *he header contains information
that controls where and how the datagram is to be sent.
< Tr%e
< +alse
=eader contains all information needed to deliver datagram to the destination
Computer. 6t containsJ
L Destination address
L ,ource address
L 6dentifier
L ;ther delivery information
9%estion 2o: 9 * 'arks: 1 . ; 4lease choose one
*o save traffic! an E84 does not summari>e routing information from the autonomous system before
passing it to another autonomous system.
< *rue
< +alse
A6t provides routing among autonomous systems /E840.
9%estion 2o: +0 * 'arks: 1 . ; 4lease choose one
9hich of the following is a correct representation of the 64vH:
< 105.,,0.1-8.100.,55.,55.,55.,55.0.0.1+.1,+.1?0.10.,55.,55
< &'%.))'.&3H.&''.)%%.)%%.)%%.)%H.'.'.&M.&)M.&$'.&'.)%%.)%%
< &'%.))'.&3H.&''.)%%.)%%.)%%.)%%.'.'.&M.&)M.&$'.&'.)%%.)%%.)%H
< &'%.))'.&3H.&''.)%%.)%%.)%%.)%%.'.'.&M.&)M.&$'.&'.)%%
&)M-bit addresses unwieldy in dotted decimalN requires &H numbersJ
&'%.))'.&3H.&''.)%%.)%%.)%%.)%%.'.'.&M.&)M.&$'.&'.)%%.)%%
9%estion 2o: +1 * 'arks: 1 . ; 4lease choose one
*he number of connections needed for N computer in direct point to point communication is equal toJ
< *2
,
E2.0,
< N/N- &0
< N
)
< None of the given
Aor Fn7 comp%ters connections in direct point to point comm%nication G *nH, En.0,.
9%estion 2o: +, * 'arks: 1 . ; 4lease choose one
9hen an application--------------- data! it makes a copy of the data available to all other computers on the
network.
< (roadcasting
< 2ulticasting
< 7nicasting
< 2one of the given *not s%re.
9%estion 2o: +- * 'arks: 1 . ; 4lease choose one
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by
the manufacturer.
< H$
< ?+
< 3)
< M
Ethernet %ses a ?+;"it static addressing scheme
9%estion 2o: +? * 'arks: 1 . ; 4lease choose one
A system with redundant bridges might have a problem with in the system.
< /oop
< +ilters
< ,panning *rees
< All given choices
9%estion 2o: +5 * 'arks: 1 . ; 4lease choose one
*he product of delay and throughput measures the of data that can be present on the network.
< Area
B 1olume
< .ength
< None of the given
It is computed as delay time multiplied by effective throughput. It measures amount of data that can be
present in the networ
9%estion 2o: +8 * 'arks: 1 . ; 4lease choose one
Connectionless service! 2essage-;riented protocol! best effort delivery service! arbitrary interaction and
operating system independent are the characteristics of
< *C4
< B#4
< 64
< None of the given
B#4 has the following characteristics.
I It is an end;to;end protocol. It provides application;to;application comm%nication.
I It provides connectionless service.
I It is a 'essage;Criented protocol.
I It %ses "est;effort delivery service.
I It follows ar"itrary interaction.
I It is operating system independent
9%estion 2o: + * 'arks: 1 . ; 4lease choose one
Connection-oriented service! 4oint-to-point! Complete reliability! +ull-duple- communication! ,tream
interface! "eliable connection startup and 8raceful connection shutdown are the services provided
by
< None of the given
< T&4
< 7D4
< 64
1E=@I&E 4=C@I#E# BJ T&4:
Aollowing are the services provided "y T&4:
I &onnection;oriented service
I 4oint;to;point
I &omplete relia"ility
I A%ll;d%ple) comm%nication
I 1tream interface
I =elia"le connection start%p
I Dracef%l connection sh%tdown
9%estion 2o: ++ * 'arks: 1 . ; 4lease choose one
*he process of using a routing table to select a ne-t hop for a given datagram is called
< Encapsulation
< "eassembling
< =o%ting or forwarding
< None of the given
9%estion 2o: +9 * 'arks: 1 . ; 4lease choose one
uses distance vector approach to define routing
< (84
< ;,4+
< =I4
< None of the given
#I1T32&E;@E&TC= =CBTI2D:
I It is very simple to implement.
I 4acket switch %pdates its own ro%ting ta"le first.
I It is %sed in =I4.
9%estion 2o: 90 * 'arks: 1 . ; 4lease choose one
A multicast routing scheme in which the protocol software builds a delivery tree from a central point is
called
< Distance 1ector 2ulticast "outing 4rotocol /D12"40
< &ore Based Trees *&BT.
< 4rotocol 6ndependent 2ulticast Sparse Mode (PIM-SM)
< 4rotocol 6ndependent 2ulticast Dense Mode (PIM-DM)
&C=E B31E# T=EE1 *&BT.:
3 m%lticast ro%ting scheme in which the protocol software "%ilds a delivery tree
from a central point.
9%estion 2o: 91 * 'arks: 1 . ; 4lease choose one
;ne repeater ! two repeaters the ma-imum cable length limitation.
< doubles! cancel
< do%"les, triple
< square roots! cude roots
< and! triple
Cne repeater do%"les, two repeaters triple the ma)im%m ca"le length limitation.
9%estion 2o: 9, * 'arks: 1 . ; 4lease choose one
9henever it handles a packet! 64 software needs to separate the destination address into a and
.
< postfi-! 6nfi-
< non of these
< 6nfi-! prefi-
< prefi), s%ffi)
Khenever it handles a packet, I4 software needs to separate the destination address into a prefi)
and s%ffi)
9%estion 2o: 9- * 'arks: 1 . ; 4lease choose one
Although message e-change can be used to bind addresses! sending a request for each binding is
hopelessly inefficient.
< Tr%e
< +alse
&31LI2D 3=4 =E14C21E1:
3ltho%gh message e)change can "e %sed to "ind addresses, sending a re$%est for
each "inding is hopelessly inefficient.
9%estion 2o: 9? * 'arks: 1 . ; 4lease choose one
A"4 is almost always used to bind a -bit 64 address to a -bit Ethernet address.
< -,, ?+
< )$! 3)
< 3)! H$
< 3)! &)M
3=4 is almost always %sed to "ind a -,;"it I4 address
to a ?+;"it Ethernet address
9%estion 2o: 95 * 'arks: 1 . ; 4lease choose one
End-to-end delivery service is connection oriented.
< *rue
< Aalse
End;to;end delivery service is connection less
9%estion 2o: 98 * 'arks: 1 . ; 4lease choose one
A single networking technology is best for all needs.
< *rue
< Aalse
There is no single networking technology that is "est for all needs
9%estion 2o: 9 * 'arks: 1 . ; 4lease choose one
6n the &?@'s large organi>ations began to acquire multiple networks. Each network in the organi>ation
formed island. Employees needed to choose a computer appropriate for each task. ,o they needed
multiple screens! keyboards and computers.
< +alse
< Tr%e
In the 190s large organi5ations "egan to ac$%ire m%ltiple networks. Each network in the
organi5ation formed island. Employees needed to choose a comp%ter appropriate for each task. 1o
they needed m%ltiple screens, key"oards and comp%ters.
9%estion 2o: 9+ * 'arks: 1 . ; 4lease choose one
9hich method of Address "esolution 4rotocol is useful with any hardware:
Kere MTM stands for Ta"le look%p, M&M for &losed;form &omp%tation and M#M for #ata
E)changeN
Aeat%res
Types of
=esol%tion
7se full with any hardware *
Address change affects all hosts *
4rotocol address is determined by
hardware address
C
< T
< C
< D
< C! D
9%estion 2o: 99 *'arks:1 . ; 4lease choose one
6n which method of Address "esolution 4rotocol the protocol address is determined by hardware address:
Kere MTM stands for Ta"le look%p, M&M for &losed;form &omp%tation and M#M for #ata
E)changeN
Aeat%res
Types of
=esol%tion
7se full with any hardware *
Address change affects all hosts *
4rotocol address is determined by
hardware address
C
< *
< D
< &
< *! C
9%estion 2o: 100 * 'arks: 1 . ; 4lease choose one
9e use the term to refer to a measure of the path that routing software use when choosing a
route.
< routing path
< ro%ting metric
< routing
switching
Ke %se the termro%ting metric to refer to a meas%re of the path that ro%ting software %se when
choosing a ro%te
9%estion 2o : 101 *'arks: 1. ; 4lease choose one
6n Direct point to point communication adding the Nth computer requires------------ new connections.
B None of the given
B N)
< 2;1
B /N) ON05)
disadvantage In #irect point to point comm%nication is that adding a new comp%ter to the network
re$%ires 2;1 new connections .*4O ,-.
9%estion 2o: 10, * 'arks: 1 . ; 4lease choose one
6n 4oint-to-4oint topology there are two topologies.
B *ree and "ing
B ,tar and "ing
< 1tar and Tree
B None of the given
4;6N*-*;-4;6N*J
6n Point-to-Point topology there are two topologies.
&0 ,*A" topology
)0 *"EE topology
9%estion 2o: 10- * 'arks: 1 . ; 4lease choose one
6n -------------! network occupies the smaller area like a room a floor or a building
< /32
B 9AN
B 2AN
B None of the given
In /32 network occ%pies the smaller area like a room a floor or a "%ilding.*4O ?.
9%estion 2o: 10? * 'arks: 1 . ; 4lease choose one
=ardware that calculates a C"C uses two simple components.
B AND unit and <;" unit
< 1hift register and (C= %nit
< ,hift register and AND unit
B None of the given
C"C uses Dust two hardware componentsJ
,hift register
E-clusive ;" / <;" unit 0 .(P! "#)
9%estion 2o: 105 * 'arks: 1 . ; 4lease choose one
C"C can detect more errors than a simple checksum.
B true
B false
9%estion 2o: 108 * 'arks: 1 . ; 4lease choose one
*he 8igabit Ethernet hardware operates at a rate of --------
B &' 2bps
B &'' 2bps
< 1000 '"ps
B None of the given
Diga"it Ethernet that operates at 1 D"ps *1000 '"ps. over fi"er optics and twisted pair Ethernet ca"les.
9%estion 2o: 10 * 'arks: 1 . ; 4lease choose one
+ormally named informally known as the twisted pair Ethernet or *4 Ethernet.
B &' (ase )
B &' (ase %
< 10 Base T
B None of the given
$#%&S'-()
This is another standard of wiring scheme. It is commonly called 10Base;T, Twisted 4air or T4 Ethernet.
*4O ?-.
9%estion 2o: 10+ * 'arks: 1 . ; 4lease choose one
An interface for thin Ethernet must have an connector ! and must generate signals according to
the specification.
< =>;?5, 10 Base T
B "#-$%! &' (ase %
B (NC! &' (ase )
B (NC! &' (ase *
9%estion 2o: 109 * 'arks: 1 . ; 4lease choose one
A system with redundant bridges might have a problem with in the system.
< /oop
B +ilters
B ,panning *rees
B All given choices
9%estion 2o: 110 * 'arks: 1 . ; 4lease choose one
computes shortest paths in a graph by using weights on edges as a measure of distance.
B 8reedy algorithm
B Distance vector algorithm
< #iPksta7s algorithm
B Non of the given
#Pikstra7s algorithm can accommodate weights on edges in graph. The shortest
path is then the path with lowest total weight *s%m of the weight with all edges.. It sho%ld
"e noted that the shortest path is not necessarily with fewest edges *or hops..
9%estion 2o: 111 * 'arks: 1 . ; 4lease choose one
(asic .AN technologies such as Ethernet! *oken "ing! and +DD6 use a .
B Connectionless service paradigm
B Connection-oriented service paradigm
< Both &onnectionless and &onnection;oriented service paradigm
B None of the given
G%estion 2o: 11, * 'arks: 1 . ; 4lease choose one
protocols of *C4564 layering model specify how to ensure reliable transfer.
B 4hysical .ayer
B Network 6nterface .ayer
B 6nternet .ayer
< Transport /ayer
/3JE= ?: ens%re relia"le transfer layer ? in T&4 layering model is transport layer.
9%estion 2o: 11- * 'arks: 1 . ; 4lease choose one
An 6nternet Address /64 address0 is a unique binary number assigned to a host and used for all
communication with host
B $M-bit
< -,;"it
B )$-bit
B None of the given
3n Internet address *I4 address. is a %ni$%e -,;"it "inary n%m"er assigned to a
host and %sed for all comm%nication with the host
9%estion 2o: 11? * 'arks: 1 . ; 4lease choose one
*he address identifies the physical network to which the computer is attached! while the
identifies an individual computer on that network.
B prefi- ! suffi-
< s%ffi) , prefi)
B suffi- ! suffi-
B None of the given
4"E+6<J
6t identifies the physical network to which the computers are attached.
,7++6<J
6t identifies an individual computer on the network.
9%estion 2o: 115 * 'arks: 1 . ; 4lease choose one
places the boundary between the first and second octets
< &lass 3
B Class (
B Class C
B Class D
Class A places the boundary between the first and second octets. Class ( places the boundary between the
second and third octets! and class C places the boundary between the third and fourth octets.
9%estion 2o: 118 * 'arks: 1 . ; 4lease choose one
places the boundary between the third and fourth octets.
B Class A
B Class (
< &lass &
B Class D
Class A places the boundary between the first and second octets. Class ( places the boundary between the
second and third octets! and class C places the boundary between the third and fourth octets.
9%estion 2o: 11 * 'arks: 1 . ; 4lease choose one
field of header indicates whether a datagram is a fragment or a complete datagram.
B +.A8,
B +.A82EN* ;++,E*
B 6DEN*6+6CA*6;N
< 2one of the given
A=3D'E2T3TIC2:
64 uses fragmentation i.e. datagramKs can be split into pieces to fit in network with small 2*7. Each fragment
is an independent datagram. 6t includes all header fields. (it in header indicates that the datagram is a fragment
9%estion 2o: 11+ *'arks: 1. ; 4lease choose one
provides connectionless service.
B *C4
< B#4
B 64
B none of the given
B#4 has the following characteristics.
L 6t is an end-to-end protocol. 6t provides application-to-application communication.
L 6t provides connectionless service.
L 6t is a 2essage-;riented protocol.
L 6t uses best-effort delivery service.
L 6t follows arbitrary interaction.
L 6t is operating system independent
9%estion 2o: 119 * 'arks: 1 . ; 4lease choose one
7D4 and *C4 are both layer protocols
B 4hysical
B Data link
B Network
< Transport
9%estion 2o: 1,0 * 'arks: 1 . ; 4lease choose one
Connection-oriented service! 4oint-to-point! Complete reliability! +ull-duple- communication! ,tream
interface! "eliable connection startup and 8raceful connection shutdown are the services provided
by
B 64
B None of the given
< T&4
B 7D4
,E"16CE 4";16DED (I *C4J
+ollowing are the services provided by *C4J
L Connection-oriented service
L 4oint-to-point
L Complete reliability
L +ull-duple- communication
L ,tream interface
L "eliable connection startup
L 8raceful connection shutdown
9%estion 2o: 1,1 *'arks: 1. ; 4lease choose one
protocols of *C4564 layering model specify how to ensure reliable transfer.
B 4hysical .ayer
BNetwork 6nterface .ayer
B 6nternet .ayer
< Transport /ayer
/3JE= ?: ens%re relia"le transfer layer ? in T&4 layering model is transport layer
9%estion 2o: 1,, * 'arks: 1 . ; 4lease choose one
identifies which application program on receiving computer should receive the data
B .ogical address
B ,ource port
< #estination 4ort
B None of the given
Aield#estination4ort identifies which application program on receiving comp%ter sho%ld receive the
data. Khile field so%rce port identifies the application programs that sent the data. *=eference from E;
"ooks.
9%estion 2o: 1,- *'arks: 1. ; 4lease choose one
identifies the application program that sent the data.
B Destination 4ort
< 1o%rce port
B .ogical address
B none of the given
Aield #estination 4ort identifies which application program on receiving comp%ter sho%ld receive the
data. Khile field so%rce port identifies the application programs that sent the data. *=eference from E;
"ooks.
9%estion 2o: 1,? *'arks: 1. ; 4lease choose one
*he (order 8ateway 4rotocol /(840 uses for all communication
B 7D4
< T&4
B (oth 7D4 and *C4
B none of the given
BC=#E= D3TEK3J 4=CTC&C/:
6t is most popular E-terior 8ateway 4rotocol in 6nternet. 6t has following characteristicsJ
A6t provides routing among autonomous systems /E840.
A6t provides policies to control routes advertised.
A6t uses reliable transport /*C40.
9%estion 2o: 1,5 *'arks: 1. ; 4lease choose one
9hich of the following protocols allows the sender and receiver to enforce polices.
B "64
B ;,4+
B (84
B "64 and ;,4+
9%estion 2o: 1,8 *'arks: 1. ; 4lease choose one
uses distance vector approach to define routing
B (84
B ;,4+
< =I4
B None of the given
=CBTI2D I2AC='3TIC2 4=CTC&C/ *=I4.:
6t has the following characteristicsJ
MIt is %sed for ro%ting within an a%tonomo%s system *ID4..
A=op Count 2etricJ "64 measures distance in network hops! where each network
(etween the source and destination counts as a single hop.
A6t uses 7D4 for all message transmissions.
A"64 is used over .AN. 1ersion & of "64 uses hardware broadcast and version ) allows
Delivery via multicast.
A6t can be used to advertise default route propagation. An organi>ation can use "64 to
6nstall a default route in each router.
A6t uses distance vector algorithm.
9%estion 2o: 1, *'arks: 1. ; 4lease choose one
6C24 message transport is acted upon by getting 6C24 encrypted in 64.
< Tr%e
B +alse
I&'4 message transport is acted %pon "y getting I&'4 encaps%lated in I4 *4O 11.
9%estion 2o: 1,+ * 'arks: 1 . ; 4lease choose one
4rotocol addresses are abstractions provided by .
B hardware
< software
B operating system
B internet
4rotocol addresses are abstractions provided by software
9%estion 2o: 1,9 * 'arks: 1 . ; 4lease choose one
*hese packets serve same purpose on as frames on
B 6ntranet! .AN
B 6nternet! 9AN
B 6ntranet! 9AN
< Internet, /32
@I=TB3/ 43&QET1:
These packets serve same p%rpose in Internet as frames on /32
9%estion 2o: 1-0 *'arks: 1. ; 4lease choose one
Address mask defines how many bits of address are in suffi-:
B *rue
< Aalse
Address mask defines how many bits of address are in prefi-. 4refi- defines how much of address used to
identify network.
9%estion 2o: 1-1 *'arks: 1. ; 4lease choose one
A single networking technology is best for all needs.
B *rue
< Aalse
There is no single networking technology that is "est for all needs
9%estion 2o: 1-, * 'arks: 1 . ; 4lease choose one
A computer attached to a given network can only communicate with other computers attached to the same
network. 6s this a problem with multiple networks:
< Tr%e
B +alse
the chief problems with multiple networks are as followsJ
L A computer attached to a given network can only communicate with other
Computers attached to the same network.
9%estion 2o: 1-- *'arks: 1. ; 4lease choose one
the term self-identifying is used for Classful 64 addresses because the class of the address can be computed
from the address.
< itself
B prefi-
B suffi-
B mask
&lassf%l I4 addresses are self;identifying "eca%se the class of the address can "e comp%ted from the
address itself
9%estion 2o: 1-? *'arks: 1. ; 4lease choose one
+ind the class of the address.
&'&''&&& &&'&&'&& &'''&'&& '&&'&&&&
B A
< B
B E
B C
=eference ta"le hando%ts 4 O +
9%estion 2o: 1-5 *'arks: 1. ; 4lease choose one
+ind the class of the addressJ
&&&&''&& &''&&'&& &&&&&'&& ''''&&&&
B A
B C
< E
B (
=eference ta"le hando%ts 4 O +
9%estion 2o: 1-8 * 'arks: 1 . ; 4lease choose one
6n which method of Address "esolution 4rotocol the protocol address is determined by hardware address:
9ere A*A stands for *able lookup! ACA for Closed-form Computation and ADA for Data E-change:
B *
B D
< &
B *! C
=eference ta"le hando%ts 4 O 9
9%estion 2o: 1- *'arks: 1. ; 4lease choose one
9hich method of Address "esolution 4rotocol requires hardware broadcast:
9ere A*A stands for *able lookup! ACA for Closed-form Computation and ADA for Data E-change:
< #
B *
B C
B *! D
=eference ta"le hando%ts 4 O 9
9%estion 2o: 1-+ * 'arks: 1 . ; 4lease choose one
9hich method of Address "esolution 4rotocol resolution with minimum delay:
9ere A*A stands for *able lookup! ACA for Closed-form Computation and ADA for Data E-change:
B *! D
B c
B *
< T, &
=eference ta"le hando%ts 4 O 9
9%estion 2o: 1-9 * 'arks: 1 . ; 4lease choose one
6n which method of Address "esolution 4rotocol the implementation is more difficult:
9ere A*A stands for *able lookup! ACA for Closed-form Computation and ADA for Data E-change:
B *! C
B *
B C
< #
=eference ta"le hando%ts 4 O 9
9%estion 2o: 1?0 *'arks: 1. ; 4lease choose one
on of the design goals for unicast route propagation is .
B Consistency
B inconsistency
< sta"ility
B dynamic addressing
on of the design goals for unicast route propagation is stabilityPcontinual changes in route are undesirable
because they lead to higher Ditter and datagram arriving out of order. *hus! once a unicast routing protocol
finds a shortest path! it usually retains the route until a failure makes the path unusable. /"eference from E-
book0
9%estion 2o: 1?1 *'arks: 1. ; 4lease choose one
4ropagation multicast routing information differs dramatically from unicast route propagation:
< Tr%e
B +alse
Propagating multicast routing information differs dramatically from unicast route propagation. The
difference arises "eca%se internet m%lticast allows dynamic gro%p mem"ership and a%tonomo%s senders
9%estion 2o: 1?, *'arks: 1. ; 4lease choose one
*he 64 multicast abstraction allows an application running on an arbitrary computer to leave a multicast group
at any time. 9hile application on a computer remain a member of a group.
B ;ne or more
B only one
B no
B many
9%estion 2o: 1?- *'arks: 1. ; 4lease choose one
*o save traffic! an E84 does not summari>e routing information from the autonomous system before passing it
to another autonomous system.
B *rue
< Aalse
to save traffic, an ED4 s%mmari5e ro%ting information from the a%tonomo%s system "efore passing it to
another a%tonomo%s system. 'ore important an ED4 implements policy constraint that allows a system
manager to determine e)actly what information is released o%tside the organi5ation. *=eference from E;
"ook.
9%estion 2o: 1?? *'arks: 1. ; 4lease choose one
6n 64vH the type of address used for collection of computers with same prefi-. Are known as.
B Anycast
B 7nicast
B 2ulticast
< none of the given
Aollowing are special types of addresses, I4v8 %ses)
7nicastJ 6t is used for single destination computer.
2ulticastJ 6t is used for multiple destinationsN possibly not at same site.
ClusterJ *his type of address is used for collection of computers with same prefi-!
Datagram is delivered to one out of cluster.
9%estion 2o: 1?5 *'arks: 1. ; 4lease choose one
,pecial types of addresses in 64vH used for multiple destinationsN possibly not at same site. Are known
as.
B 7nicast
B Anycast
< '%lticast
B none of the given
Aollowing are special types of addresses, I4v8 %ses:
Bnicast: 6t is used for single destination computer.
'%lticast: 6t is used for multiple destinationsN possibly not at same site.
&l%ster: *his type of address is used for collection of computers with same prefi-!
datagram is delivered to one out of cluster.
9%estion 2o: 1?8 * 'arks: 1 . ; 4lease choose one
7D4 offers application programs a 2essage-;riented 6nterface! applications can depend on protocol to
preserve data boundaries.
< Tr%e
B +alse
B#4 offers application programs a 'essage;Criented Interface. It does not divide messages into packets
for transmission and does not com"ine messages for delivery.
3#@32T3DE1:
I 3pplications can depend on protocol to preserve data "o%ndaries.
9%estion 2o: 1? * 'arks: 1 . ; 4lease choose one
"eliability is the responsibility of the layer
B Network
B Datalink
< Transport
B Application
=elia"ility is the responsi"ility of the Transport layer
9%estion 2o: 1?+ * 'arks: 1 . ; 4lease choose one
*C4 uses mechanism to control the flow of data.
B door
< window
B acknowledgment
B retransmission
T&4 %ses window mechanism to control the flow of data.
9%estion 2o: 1?9 * 'arks: 1 . ; 4lease choose one
*he time for acknowledgement to arrival of packet depends on.
< #istance to destination and &%rrent traffic conditions
B Current traffic conditions
B Distance to destination
B non of these
*he time for acknowledgement to arrive depends onJ
L Distance to destination
L Current traffic conditions
9%estion 2o: 150 * 'arks: 1 . ; 4lease choose one
+DD6 can transmits data at a rate of ----------
< 100 million "its per second
B &' million bits per second
B &''' million bits per second
B None of the given
A##I: Ai"er distri"%ted data interconnect *A##I. is another ring technology. Its most
important feat%res are:It %ses fi"er optics "etween stations and transmits data at 100'"ps.
9%estion 2o:151 *'arks:1. ; 4lease choose one
9hen an application--------------- data! it makes a copy of the data available to all other computers on the
network.
< Broadcasting
< 2ulticasting
< 7nicasting
< None of the given
9%estion 2o:15, *'arks:1. ; 4lease choose one
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by
the manufacturer.
< H$
< ?+
< 3)
< M
9%estion 2o: 15- *'arks: 1. ; 4lease choose one
*he product of delay and throughput measures the of data that can be present on the network.
< Area
< @ol%me
< .ength
< None of the given
9%estion 2o: 15? *'arks: 1. ; 4lease choose one
Connectionless service! 2essage-;riented protocol! best effort delivery service! arbitrary interaction and
operating system independent are the characteristics of
< *C4
< B#4
< 64
< None of the given
9%estion 2o: 155 *'arks: 1. ; 4lease choose one
uses distance vector approach to define routing
< (84
< ;,4+
< =I4
< None of the given
9%estion 2o: 158 *'arks: 1. ; 4lease choose one
9henever it handles a packet! 64 software needs to separate the destination address into a and
.
< postfi-! 6nfi-
< non of these
< 6nfi-! prefi-
< prefi), s%ffi)
9%estion 2o: 15 *'arks: 1. ; 4lease choose one
A"4 is almost always used to bind a -bit 64 address to a -bit Ethernet address.
< -,, ?+
< )$! 3)
< 3)! H$
< 3)! &)M
9%estion 2o: 15+ *'arks: 1. ; 4lease choose one
9hich method of Address "esolution 4rotocol is useful with any hardware:
*ere +(+ stands for (able looup, +-+ for -losed-form -omputation and +D+ for Data '.change/
< *
< &
< D
< C! D
9%estion 2o: 159 *'arks: 1. ; 4lease choose one
6n which method of Address "esolution 4rotocol the protocol address is determined by hardware address:
Kere MTM stands for Ta"le look%p, M&M for &losed;form &omp%tation and M#M for #ata
E)change/
< *
< D
< &
< *! C
9%estion 2o: 180 *'arks: 1. ; 4lease choose one
9e use the term to refer to a measure of the path that routing software use when choosing a
route.
< routing path
< ro%ting metric
< routing
< switching
9%estion 2o: 181 *'arks: 1. ; 4lease choose one
A network uses a ------arranges for computers to be connected in a closed loop.
< ,tar *opology
< =ing Topology
< (us *opology
< None of the given
9%estion 2o: 18, *'arks: 1. ; 4lease choose one
An interface for thin Ethernet must have an connector ! and must generate signals
according to the specification.
< =>;?5, 10 Base T
< "#-$%! &' (ase %
< (NC! &' (ase )
< (NC! &' (ase *
9%estion 2o: 18- *'arks: 1. ; 4lease choose one
protocols of *C4564 layering model specify how to ensure reliable transfer.
< 4hysical .ayer
< Network 6nterface .ayer
< 6nternet .ayer
< Transport /ayer
9%estion 2o: 18? *'arks: 1. ; 4lease choose one
uses distance vector approach to define routing
< (84
< ;,4+
< =I4
< None of the given
CS610 Solved MCQS 100% Correct
________ of TCP/IP layering model, corresponds to basic network hardware.
Physical Layer
Network Interface ayer
Internet ayer
Transport ayer
_______ protocols of TCP/IP layering model specify how to ens!re reliable transfer.
Physical ayer
Network Interface ayer
Internet ayer
Transport Layer
________is called an end"to"end protocol beca!se it pro#ide a connection directly from an
application on one comp!ter to an application on a remote comp!ter.
IP
UDP
TCP
None of the gi#en
____________ !ses distance #ector approach to define ro!ting
$%P
&'P(
RIP
None of the gi#en
_______ is ideal in a sit!ation where the gro!p is small and all members are attached to
contig!o!s ocal )rea Networks.
lood!and !Pr"ne
Config!ration"and "T!nneling
Core"$ased *isco#ery
None of the gi#en
+o!ter that decrements TT to __ sends IC,P time e-ceeded message, with ro!ter s address as
so!rce address
.
/
0
0
Protocol addresses are abstractions pro#ided by ___________.
hardware
so#t$are
internet
)ltho!gh message e-change can be !sed to bind addresses, sending a re1!est for each binding is
hopelessly inefficient.
Tr"e
(alse
)+P is almost always !sed to bind a ___"bit IP address to a ___"bit 2thernet address.
%&' ()
/3, ./
./, 43
./, 0/5
In the 0678s large organi9ations began to ac1!ire m!ltiple networks. 2ach network in
the organi9ation formed island. 2mployees needed to choose a comp!ter appropriate for
each task. 'o they needed m!ltiple screens, keyboards and comp!ters.
www.vustudents.ning.com
(alse
Tr"e
In which method of )ddress +esol!tion Protocol the protocol address is determined by
hardware address: ;ere <T< stands for Table look!p, <C< for Closed"form Comp!tation and <*<
for *ata 2-change:
T
*
C
T, C
;hich method of )ddress +esol!tion Protocol is !sef!l with any hardware:
;ere <T< stands for Table look!p, <C< for Closed"form Comp!tation and <*< for *ata 2-change:
T
C
*
C, *
In which method of )ddress +esol!tion Protocol the implimentation is more diffic!lt:
;ere <T< stands for Table look!p, <C< for Closed"form Comp!tation and <*< for *ata 2-change:
T, C
T
C
D
;hich method of )ddress +esol!tion Protocol resol!tion with minim!m delay:
;ere <T< stands for Table look!p, <C< for Closed"form Comp!tation and <*< for *ata 2-change:
T, *
c
T
T' C
The general form of an IP datagram is with a header followed by data. The header contains
information that controls where and how the datagram is to be sent.
Tr"e
(alse
To sa#e traffic, an 2%P does not s!mmeri9e ro!ting information from the a!tonomo!s system
before passing it to another a!tonomo!s system.
Tr!e
alse
""""""""""""" was especially concerned abo!t the lack of high powered comp!ters.
I222
)P+) =wrong spelling>
2I)
*one
,issing eot indicates sending comp!ter crashed in frame format.
Tr"e
(alse
The """""""""""""term refers to the general concept of a small block of data.
Pac+ets
*ata
(rame
None of gi#en
C+C can detect more errors than a simple checks!m.
Tr"e
(alse
The network that !ses a """"""""""""", !s!ally consist of a single long cable to which comp!ter
attach.
'tar topology
,"s topolo-y
+ing topology
None of the gi#en
)N that !se )T, technology ha#e a """""""""""""
'tar topology
$!s topology
+ing topology
*one o# the -iven
) bridge !ses """"""""""""""" to determine which comp!ter is connected to which segment, and
!ses the """"""""""""""" to determine whether to forward a copy of frame.
www.vustudents.ning.com
""""""""""""""" has a ?itter 9ero
@irt!al Pri#ate Network
Isochrono"s *et$or+
)synchrono!s Network
None of the gi#en
The network with Thro!ghp!t T and *elay * has a total """"""""""""""" bits in transit at a time.
* A T
* B T
D . T
* / T
&ne repeater """"""""""""""", two repeaters """"""""""""""" the ma-im!m cable length limitation.
Do"/le' triple
*o!ble, 3 time
half, triple
*o!ble, half
2nd"to"end deli#ery ser#ice is connection oriented.
Tr!e
alse
) single networking technology is best for all needs.
Tr!e
alse
Twice N)T allows a site to r!n ser#ers.
Tr"e
(alse
________ de#ice is !sed for m!lticasting.
C!b
'witch
Ro"ter
none of the gi#en
___________ does not depend on any partic!lar !nicast ro!ting protocol.
PI,"*,
PIM!SM
PI,"),
none of the gi#en
) ro!ting table contains_______
The destination network I*
The hop co!nt to reach the network
The ro"ter ID o# the ne0t hop
)ll of the gi#en
_______ can be !sed to propagate information abo!t remote networks.
Dyna1ic ro"tin-
'tatic ro!ting
)ddress resol!tion
None of the gi#en
________ protocol is designed to !se within an organi9ation.
&'P(
,2&'P(
M2SP
none of the gi#en
N)PT stands for ________________
Network )ddress and Protocol Translation
*et$or+ 3ddress and Port Translation
Network )ddress and Packet Translation
None of the gi#en
In dynamic ro!ting, the ro!ting table is initiali9ed when system boots.
Tr"e
(alse
&'P( incl!des ________ address mask with each address.
.8$it
%&,it
.3$it
none of the gi#en
Twice N)T fails if an application !ses the IP addresses instead of *omain Name.
Tr"e
(alse
_________ !ses window mechanism to control the flow of data.
IP
D*P
TCP
none of the gi#en
TCP !ses _______ mechanism to control the flow of data.
door
$indo$
acknowledgment
retransmission
I%Ps stand for _________
Internal %ateway Protocols
Interior 4ate$ay Protocols
Intermediate %ateway Protocols
None of the gi#en
________ protocol !ses distance #ector algorithm.
I%P
$%P
RIP
none of the gi#en
__________meas!res distance in network hops, where each network between the so!rce and
destination co!nts as single hop.
$%P
&'P(
RIP
Non of these
Network )ddress Translation =N)T> re1!ires de#ice to perform packet translation.
www.vustudents.ning.com
Tr"e
(alse
;e !se the term _______ to refer to a meas!re of the path that ro!ting software !se when
choosing a ro!te.
ro!ting path
ro"tin- 1etric
ro!ting
switching
Part of the ."way handshake !sed to create a connection, re1!ires each end to generate a
random _____ se1!ence n!mber.
%& /it
04 bit
5 bit
43 bit
+econstr!ction of original datagram is called reassembly.
Tr"e
(alse
+eliability is the responsibility of the ______ layer.
Transport
Network
Physical
Internet
_______ is ideal in a sit!ation where the gro!p is small and all members are attached to
contig!o!s ocal )rea Networks.
lood!and !Pr"ne
Config!ration"and "T!nneling
Core"$ased *isco#ery
None of the gi#en
In *irect point to point comm!nication adding the Nth comp!ter re1!ires"""""""""""" new
connections.
None of the gi#en
N
&
*!1
=N
&
BN>//
The n!mber of connections needed for N comp!ter in direct point to point comm!nication is
e1!al toE
5*
&
!*67&
N=N"0>
N
&
None of the gi#en
Cardware that calc!lates a C+C !ses two simple components.
)N* !nit and F&+ !nit
Shi#t re-ister and .2R "nit
'hift register and )N* !nit
None of the gi#en
The %igabit 2thernet hardware operates at a rate of """"""""
08 ,bps
088 ,bps
1000 M/ps
None of the gi#en
________ comp!tes shortest paths in a graph by !sing weights on edges as a meas!re of
distance. www.vustudents.ning.com
%reedy algorithm
*istance #ector algorithm
Di8+sta9s al-orith1
Non of the gi#en
$asic )N technologies s!ch as 2thernet, Token +ing, and (**I !se a _____.
Connectionless service paradi-1
Connection"oriented ser#ice paradigm
$oth Connectionless and Connection"oriented ser#ice paradigm
None of the gi#en
)n Internet )ddress =IP address> is a !ni1!e __________ binary n!mber assigned to a host
and !sed for all comm!nication with host
35"bit
%&!/it
/3"bit
None of the gi#en
The address __________ identifies the physical network to which the comp!ter is attached,
while the _______ identifies an indi#id!al comp!ter on that network.
pre#i0 ' s"##i0
s!ffi- , prefi-
s!ffi- , s!ffi-
None of the gi#en
___________ places the bo!ndary between the first and second octets
Class 3
Class $
Class C
Class *
___________ places the bo!ndary between the second and third octets.
Class )
Class ,
Class C
Class *
___________ places the bo!ndary between the third and fo!rth octets.
Class )
Class $
Class C
Class *
________ (ield of header indicates whether a datagram is a fragment or a complete datagram.
L34S
()%,2NT &(('2T
I*2NTI(IC)TI&N
None of the gi#en
______ pro#ides connectionless ser#ice.
TCP
UDP
IP
None of the gi#en
D*P and TCP are both_________ layer protocols
Physical
*ata link
Network
Transport
________identifies which application program on recei#ing comp!ter sho!ld recei#e the data
www.vustudents.ning.com
ogical address
'o!rce port
So"rce port
*estination Port
None of the gi#en
________ identifies the application program that sent the data.
*estination Port
So"rce port
ogical address
None of the gi#en
The $order %ateway Protocol =$%P> !ses_________ for all comm!nication
D*P
TCP
$oth D*P and TCP
None of the gi#en
;hich of the following protocols allows the sender and recei#er to enforce polices.
+IP
&'P(
,4P
+IP and &'P(
IC,P message transport is acted !pon by getting IC,P encrypted in IP.
Tr!e
alse
These IC,P message transport is acted !pon ________ as frames on ______
Intranet, )N
Internet, ;)N
Intranet, ;)N
Internet' L3*
)ddress mask defines how many bits of address are in s!ffi-:
Tr!e
alse
) comp!ter attached to a gi#en network can only comm!nicate with other comp!ters attached
to the same network. Is this a problem with m!ltiple networks:
Tr"e
(alse
The term self"identifying is !sed for Classf!l IP addresses beca!se the class of the address can be
comp!ted from the address__________.
itsel#
prefi-
s!ffi-
mask
(ind the class of the addressE
00008800 08800800 00000800 88880000
)
C
:
$
Th er e ar e thr e e standard i mpl e me ntati ons t o i mpr o v e c o mputati onal effi ci ency: Hashing, Dire ct Indexing
and Indir e ct
Indexing
+alse
A_____________ addr ess-bi nding tabl e is us e d f or e a c h physi cal net or !"
,ew
Similar
Separate
Old
______ layer #rovi des reliabl e d eli v ery of datagra m"
$et or !
Transport
Datalin!
n o ne of the gi v e n
Due t o re v oluti onali%ati on of I#-&' the spe e d has incr eas e d fr o m _______
512 to 1 GB
________ e nc apsulat es I#datagra m as data ar ea in hard ar e fra me"
.etwork %nter0ace -ayer
#atalink +ayer
,etwork +ayer
none of the given
_______ (iel d of h e ader indi cat es h et h er a datagra m is a frag me nt or a c o mpl et e datagra m"
+&A6ME.T F++SET
as the Internet gr e , the ori ginal )lassful addr essing s c h e me b e c a me a li mitati on" The I#addr ess spac e
a s b ei ng e xhaust ed b e c aus e all net or !s had t o c h o o s e o n e of f our possi bl e si%es"
www.vustudents.ning.com
+alse
As the Internet gr e , the ori gi nal )lassful addr essing s c h e me b e c a me a li mitati on" The I#addr ess spac e
a s b ei ng e xhaust ed b e c aus e all net or !s had t o c h o o s e o n e of ________ possi bl e si%es"
Three
Header c o ntains all inf or mati on ne e d e d t o deli v er datagra m t o the de stinati on c o mput er" *ut hi c h o n e of
the f oll o i ng is n ot include d:
&ecti0ier
______ c o ntains all inf or mati on ne e d e d t o deli v er datagra m t o the d estinati on"
1ea!er
o n e of the para met ers, hi c h m oti vat e d I#for c hang e is addr ess spac e" Th e _____________ addr ess
spac e all o s f or o v er a mi lli on net or !s" *ut m o st net or !s ar e cl ass )and t o o s mall f or ma ny
or gani%ati ons"
92#bit
)lass Ama s ! is + , ," -" -" - hi c h is us e d f or ______
Sub netting
#ostfix defines h o mu c h of addr ess us e d t o ide ntify net or !"
+alse
________ fi el d is us e d t o identify a spe cifi c path thr oug h the net or !
+-F/ -AHE-
_______ is a tec hni .ue us e d t o /i mit datagra m si%e t o s mall 0T1of any net or !
+ragmentation
Hashing is the transf or mati on of a string of c haract ers int o a usually sh ort er fixe d-l engt h value or a ! e y
that repr es ents the ori gi nal string"
True
In ______________, the pr ot o c ol addr ess assi gne d t o a c o mput er is c h os e n c ar efully s o that c o mput er2 s
hard ar e addr ess c an b e c o mput e d fr o m the pr ot o c ol addr ess using b asi c *ool ean and arith meti c
o perati ons"
(lose!#0orm (omputation
3out ers us e _______ t o f or ard datagra m al ong pr earrang e d path"
+low label
0apping b et e e n a pr ot o c ol addr ess and a hard ar e addr ess is c all e d Addr ess 3esoluti on"
True
#reli mi nary v ersi on of I#a s c all e d _________"
%' # .et 6eneration <%'ng=
_______ 4ourc e is responsi bl e f or frag me ntati on"
%'?4
5nd t o 5nd deli v ery 4ervi c e of I#datagra m is _____
(onnectionless
5very hard ar e tec hn ol o g y spe cifi cati on includes the d efiniti on of the ma xi mu m si%e of the fra me data
ar ea, hi c h is c all e d the ____________ Trans mi ssi on 1nit"
Maimum
I#&' addr ess es ar e _____ bits"
12;
0T14tands f or _______
Maimum transmission unit
_______ sh o s s e nders pr ef er enc e for l o lat ency, hi gh 3eliability"
SE&?%(E TE'E
$56T H5AD53fi el d in the bas e h e ader d efines type of h e ader it appears at the e nd of fixe d-si%e bas e
h e ader"
True
Th er e ar e t o standard i mpl e me ntati ons t o i mpr o v e c o mputati onal effi ci ency: Hashing and dir e ct
indexing
True
Adatagra m c ann ot b e lar g er than ________ of a net or ! o v er hi c h it is s ent"
%' hea!er
Th e pr ot o c ol addr ess of the next h op must b e _____________ t o an e .ui val ent hard ar e addr ess b ef or e a
pac ! et c an b e s e nt"
Translate! www.vustudents.ning.com
The physical addressing in a ;)N is similar as in )N in the way................
The data is transmitted in packets e1!i#alent to frames.
2ach packet has a format with header.
The packet header incl!des destination and so!rce addresses.
3ll o# the a/ove
In )synchrono!s Transfer ,ode @PI/@CI fields identify the cells""""""""""""""
;hich one of the following is a method for comp!ting ro!ting table information:
,an!al entry
$oot time ro!ting
Static ro"tin-
None of the abo#e
)ll destinations on same switch ha#e same
+o!ter
Information
*e0t hop
None of the abo#e
;hich of the following statement is wrong regarding )T,:
It is a single technology for #oice, #ideo and data
It has low ?itter and high capacity.
It !ses fi-ed si9e, small cells, and 35 octetGs data
*one o# the a/ove
;hich one of the following is the responsibility of *?ikstraG algorithm:
To co1p"te the shortest path /et$een t$o nodes
To e-tract ne-t hop information from path information
To insert ne-t hop information into ro!ting table
)ll of the abo#e
;hich of the following statement is tr!e regarding ink"state ro!ting:
Network topology is separated from ro!te comp!tation.
2ach switch b!ilds its own ro!ting tables.
ink"state ro!ting !ses *?ikstraGs algorithm.
3ll o# the a/ove
Hitter is significance for """"""""""""""""""
@oice
@ideo
*ata
3ll o# a/ove
The ro!ting table contains information abo!t the IIIIIIimmediately aro!nd it.
Topology of the network
Destination
$oth of the abo#e
None of the abo#e
=0> There are three types of C!bs that e-ist. ;hich of the following options correctly describes
these three:
a. Passi#e, dormant, special
b. )cti#e , dormant , passi#e
c. Passi#e, )cti#e, T!rbo
d. Passive' 3ctive' Intelli-ent
2. ) n!mber of different factors determine the cost of a C!b. ;hich of the following is
among these factors:
a. Speed ratin-
b. *!rability
c. $rand
d. Class
;hich of the following network topologies among the list below is incorrect:
a. 'tar
b. Internet
c. +ing
d. $!s
;hich of the following is not a feat!re of $ase band Coa-ial Cable:
a. $i"directional
b. (ew Jilometer range
c. Proton /ased
d. 2thernet=basis for 58/..> at 08 ,bps
;hich of the following is not a f!nction of a repeater:
Dses H!mper 'ettings
Transmits data in both directions
No $!ffering
;oins t$o 5&6 se-1ents o# ca/les
;hich le#el of the TCP/IP reference model ro!tes data/information across a network channel:
)pplication layer
*ata ink ayer
Transport ayer
*et$or+ Layer
The f!nction of a modem is to con#ert signals. Identify the correct signals it con#erts.
3nalo-"e to Di-ital
)nalog!e to $a!d rate
$a!d rate to )nalog!e
*igital to $inary
;hich of the following is not a )N B )rchitect!re:.
=a> Protocol architect!re
Media access control
ogical Protocol
ogical ink Control
Identify the statement which best describes TCP and D*P.
TCP is a connection oriented Protocol $hiles UDP is a data-ra1 service
TCP is a protocol for the Network ayer of the &'I
D*P and TCP co!ld be !sed interchangeably
TCP is an ad#anced protocol whiles D*P is a single protocol
;hich of the following characteristics best describes a frame:
Data lin+ layer5<eader' Trailer' Data6
Network ayer=Ceader, Trailer, *ata>
Transport ayer=Ceader, Trailer, *ata>
Physical ayer=Ceader, Trailer, *ata>
;hat does the terminology I'*N mean:
Internal *igital 'er#ices Network
Integrated 'ystems *igital Network
Integrated 'er#ices *igital Naming 'ystem
Inte-rated Services Di-ital *et$or+
;hat does the terminology )T, mean:
)!tomatic transfer mode
)!tomatic translation mode
3synchrono"s trans#er 1ode
)synchrono!s transformation mode
) simple )rchitect!re for (ile Transfer is made !p of E
(ile transfer applicationK Comm!nications ser#ice mod!leK Network access mod!le
(ile transfer applicationK transport layerK Network access mod!le
Network access layerK Transport layerK )pplication layer
3pplication layer= *et$or+ layer= Session layer
;hich of the following statements is tr!e abo!t standards:
'tandards create additional cost
Standards help individ"als9 "sers to increase e##ectiveness
'tandards allow prod!cts from m!ltiple #endors to comm!nicate
'tandards cannot free9e technology
;hich of the following statement is tr!e abo!t (&; C&NT+&:
lo$ control is a #"nction per#or1ed /y a receivin- entity to li1it the a1o"nt or
rate o# data on a net$or+>
(low control ad?!sts the weights on a network
(low control is a f!nction performed by the ,&*2,
(low control is an ad#anced form of network management
Identify the most s!itable description for 2++&+ C&NT+&:
:rror control is an activity that 1ana-es deadloc+>
2rror control is an ad#anced form of parity bit
2rror control is a s!b"f!nction of a modem and C!b
2rror control is needed to g!ard against loss or damage of data
;hat is the f!ll meaning of the terminology ',TP:
'tate ,ail Transfer Protocol
'imple ,ail Tailor Protocol
'imple ,anagement Transfer Protocol
Si1ple Mail Trans#er Protocol
'e#eral Comp!ters connected together is calledE
Client"ser#er
Client
Co1p"ter net$or+
C!b
In which of the following networks does the client s!bmit a task to the ser#er, then the ser#er
e-ec!tes and ret!rns the res!lt for the re1!esting client station:
=a> Peer"to"Peer
=b> Client"'er#er
'er#er"$ased
3ll o# the a/ove
In which network topology are all workstations connected in cascade form:
'tar
+ing
Mesh
$!s
;hich network topology !ses a C!b: www.vustudents.ning.com
Star
$!s
,esh
+ing
;hich of the following topologies is !sed for 2thernet:
'tar
$!s
+ing
3ll o# the a/ove
Comp!ters on a !ni#ersity camp!s are connected by a/anE
,)N
;)N
L3*
INT2+N2T
The primary f!nction of the network layer isE
2rror detection
'et !p a session
Ro"tin-
2ncryption
;hich of the following standards apply to logical link control:
I222 58/..
I::: )0&>&
I222 58/.L
I222 58/.3
;hich organi9ation defines standards for telecomm!nication:
ITD
I:::
2I)
I'&
;hich of the following statements is a tr!e description of fibre &ptic Cable:
(iber optic cables transfer data in a mesh
i/er optic ca/les trans#er data in li-ht #or1
(iber optic cables are similar to coa-ial cables
Non of the abo#e
;hich of the following is not tr!e of switching technology:
Packet 'witching
ink 'witching
Pac+ets are s$itched in the #or1 o# data-ra1
Circ!it switching techni1!es
;hich of the following is a tr!e description of ,!lti"stage 'witching:
,ore simple control
Increased n"1/er o# crossed points
,ore comple- control
+ed!ced +eliability
(looding in networks and data comm!nication has certain properties. ;hich of the options
below is a property of flooding:
)ll possible ro!tes are tried
3ll paths are loaded
)ll nodes are linked
Can not be !sed to set !p #irt!al circ!it
Identify any of the following statements which tr!ly describe a #irt!al circ!it.
=a> Packets are forwarded more 1!ickly and no ro!ting decisions
=b6 More relia/le in #"nctionality
=c> Call set !p phases are present
Packets are centrali9ed at random and more ro!ting decisions are made
;hich of the following operating systems software is most s!itable for wide area network:
*&'
&'//
;IN*&;' NT
*2?:LL *:T@3R:
$inding is an important f!nction in establishing comm!nication between a Client and a 'er#er.
;hich of the following statements tr!ly describes binding in protocols:
=a> ,indin- protocols to net$or+ inter#aces speci#ies that the selected protocol can
/e sent and received thro"-h the selected L3* inter#ace card>
=b> $inding is a f!nction of the Network &perating 'ystems 'oftware
$inding is a config!ration process in mail ser#er management.
$inding ser#es as a sec!rity layer in operating systems.
=.4> In config!ring ;indows NT 3.8 for Network )ccess. There are se#en =7> areas to be
addressed. Identify from the options below the area that sho!ld not be addressed.
Protocols
$indings
IP )ddress
3"toe0ec Mana-e1ent www.vustudents.ning.com
;hich of the following is not a network adapter:
. com P III
. com 2ther link III I')
. com 2ther link II )dapter
% co1 %CA0) IS3 16 ,IT
;hich of the following statement is tr!e abo!t an IP address:
IP address is /ased on yo"r co1p"ter net$or+ card
IP address is iss!ed by a comp!ter #endor
IP address is a Transport Protocol
IP address is not !sed on the internet
;hich of the following is not associated with the session layer:
Control of dialog!e between applications
*ialog!e discipline
Data co1pression
'ynchroni9ation
C' 408 'ol#ed =Correct> ,CM' =+eferences are gi#en in $l!e
(ont>
The $rotocol address of the next ho$ must be @@@@@@@@@@@@@ to an e%uivalent hardware address
before a $acket can be sent.
5ncry$ted
#ecry$ted
Translated
,on of these
A @@@@@@@@@@@@@ address"binding table is used for each $hysical network.
,ew
Similar
Separate
Old
?#8 $rovides connection"oriented service.
True
(alse
T<8 $rovides connection oriented reliable data streaming service& whereas ?#8 $rovides connection"
less unreliable messaging service.
The ?#8 stands for@@@@@@@@@@.
?niversal #atagram 8rotocol
Gser Batagram 'rotocol
?nited #atagram 8rotocol
,one of the given
In ;"way handshake T<8 re%uires to generate a random @@@@@@@@ se%uence number.
;9 bit
92 bit
;/ bit
none of the given
T<8 stands for @@@@@@@
Trans$ort control $rotocol
Transmission control protocol
Terminal control $rotocol
,one of the given
)s the Internet grew, the original Classf!l addressing scheme became a limitation. The IP
address space was being e-ha!sted beca!se all networks had to choose one of three possible
si9es.
'elect correct optionE
Tr"e
(alse
M!estion N 3 of /8 = 'tart timeE 84E33E87 P, >
Total , a r k sE 0
Twice N)T allows a site to r!n ser#ers.
'elect correct optionE
Tr"e
(alse
Preliminary #ersion of IP was called _________.
'elect correct optionE
IP " New %eneration =IPng>
IP ! *e0t 4eneration 5IPn-6
IP " Net %eneration =IPng>
None of the gi#en
)s the Internet grew, the original Classf!l addressing scheme became a limitation. The IP
address space was being e-ha!sted beca!se all networks had to choose one of two possible si9es.
'elect correct optionE
Tr!e
alse
_________ !ses window mechanism to control the flow of data.
'elect correct optionE
IP
D*P
TCP
none of the gi#en
TCP !ses window mechanism to control the flow of data.
The Internet ser#ice pro#iders coordinate with the Internet assigned n!mber a!thority to obtain
their network n!mbers.
'elect correct optionE
Tr"e
(alse
;hich protocol is !sed to test different tools.
'elect correct optionE
ICMP
I%,P
TCP/IP
none of the gi#en
?SI,C I<)8 TO T5ST 75A<FA0I+ITP!
I<)8 can also be used to test different tools. An Internet host A& is reachable from another host 0& if
datagramNs can be delivered from A to 0. 8ing $rogram tests reach ability. It sends datagram from 0 to
A& that echoes back to 0. it uses I<)8 echo re%uest and echo re$ly messages. Internet layer includes
code to re$ly to incoming I<)8
echo re%uest messages.
________ identifies the application program that sent the data.
'elect correct optionE
*estination Port
So"rce port
ogical address
None of the gi#en
The 'o!rce can config!re o!tgoing datagramGs to a#oid _________
'elect correct optionE
'egmentation
*efragmentation
ra-1entation
None of the gi#en
6ragmentation should be avoided. Source can configure outgoing datagrams to avoid fragmentation.
Source determines $ath )T?" smallest network )T? on $ath from source to destination.
M!estion N 05 of /8 = 'tart timeE 84EL7E0/ P, >
Total , a r k sE 0
The time for acknowledgement to arri#e depends on __________
'elect correct optionE
*istance to destination
C!rrent traffic conditions
,oth a and /
None of the gi#en
The time for acknowledgement to arrive de$ends on!
U #istance to destination
U <urrent traffic conditions
which is not the type of error messages defined by IC,P.
'elect correct optionE
'o!rce 1!ench
Time e-ceeded
*estination !nreachable
*one o# the -iven
2++&+ ,2'')%2'E
These are as followsE
O 'o!rce 1!ench
O Time e-ceeded
O *estination !nreachable
O +edirect
O (ragmentation re1!ired
@@@@@@@@@ is used to attach two autonomous systems.
Select correct o$tion!
0C8
IC8
:4P
none of the given
Question D 2 o0 2@
#ue to revolutionali'ation of I8"A: the s$eed has increased from @@@@@@@
Select correct o$tion!
4:kb$s to 432kb$s
432kb$s to 3gb$s
A6+/ps to 1-/ps
none of the given
Scale is also dramatically changed. Si'e from a few tens to a few tens of millions
Of com$uters has been revolutioni'ed. S$eed has increased from 4:Ib$s to 3Cb$s. Also
There is an increased frame si'e in hardware
Question D 9 o0 2@
Whenever it handles a $acket& I8 software needs to se$arate the destination address into a $refix.
Select correct o$tion!
True
alse
<O)8?TI,C TF5 <+ASS O6 A, A##75SS!
Whenever it handles a $acket& I8 software needs to se$arate the destination
Address into a $refix and suffix.
Question D 3 o0 2@
TT+ stands for @@@@@@@@@@
Select correct o$tion!
Time to +earn
Time to +eave
Ti1e to Live
none of the given
Question D 5 o0 2@
IC8s stand for @@@@@@@@@
Select correct o$tion!
Internal Cateway 8rotocols
Interior 4ate$ay Protocols
Intermediate Cateway 8rotocols
,one of the given
Question D 4 o0 2@
8888888888888identifies which a$$lication $rogram on receiving com$uter should receive the data
Select correct o$tion!
+ogical address
Source $ort
Destination Port
,one of the given
6ield #estination 8ort identifies which a$$lication $rogram on receiving com$uter should receive the
data. While field source $ort identifies the a$$lication $rograms that sent the data.
Question D : o0 2@
@@@@@@@@@@@@@@@@@@enca$sulates I8 datagram as data area in hardware frame.
Select correct o$tion!
*et$or+ Inter#ace Layer
#atalink +ayer
,etwork +ayer
,one of the given
The network interface layer enca$sulates an entire datagram in the data area of a hardware frame
vu's.net
Question D ; o0 2@
<lass A mask is 244.9.9.9 which is used for @@@@@@@@@@@@@@@@
Select correct o$tion!
?nicasting
)ulticasting
S"/nettin-
All of the given
class A mask is 244.9.9.9 which is used for subnetting.
Question D > o0 2@
,AT is not useful at a residence with <able )odem or #S+ connectivity.
Select correct o$tion!
True
+alse
Question D 1@ o0 2@
Autonomous System chooses a routing $rotocol to exchange routing information which is $assed before
being summari'ed to another grou$.
Select correct o$tion!
True
6alse
Question D 11 o0 2@
@@@@@@ layer 8rovides reliable delivery of datagram.
Select correct o$tion!
,etwork
Transport
#atalink
none of the given
Trans$ort layer $rovides reliable delivery. ,etwork layer S I8 S can detect and
re$ort errors without actually fixing them. It focuses on datagram delivery. A$$lication
layer is not interested in differentiating among delivery $roblems at intermediate routers
Question D 12 o0 2@
The $rocess of using a routing table to select a next ho$ for a given datagram is called@@@@@@@@@.
Select correct o$tion!
5nca$sulation
7eassembling
Ro"tin- or #or$ardin-
,one of the given
The $rocess of using a routing table to select a next ho$ for a given datagram is called routing or
forwarding.
Question D 19 o0 2@
The $rocess of learning the $ath )T? is known as $ath )T? discovery.
Select correct o$tion!
Tr"e
6alse
The $rocess of learning the $ath )T? is known as $ath )T? discovery.
Question D 13 o0 2@
As the Internet grew& the original <lassful addressing scheme became a limitation. The I8 address s$ace
was being exhausted because all networks had to choose one of @@@@@@@@ $ossible si'es.
Select correct o$tion!
three
two
four
five
Three
As the Internet grew& the original <lassful addressing scheme became a limitation.
The I8 address s$ace was being exhausted because all networks had to choose one of
Three $ossible si'es. )any addresses were unused.
Two new mechanisms were invented to overcome the limitations& which are as
6ollows!
U Subnet addressing
U <lassless addressing
Question D 15 o0 2@
5nd to 5nd delivery Service of I8 datagram is @@@@@
Select correct o$tion!
<onnection oriented
Connectionless
both a and b
none of the given
Question D 14 o0 2@
5C8 stands for @@@@@@@@@
Select correct o$tion!
5xtension Cateway 8rotocol
:0terior 4ate$ay Protocol
5x$licit Cateway 8rotocol
none of the given
Question D 1: o0 2@
Fashing is the transformation of a string of characters into a usually shorter fixed"length value or a key
that re$resents the original string.
Select correct o$tion!
Tr"e
6alse
Fashing is the transformation of a string of characters into a usually shorter fixed"length value or a key
that re$resents the original string. Fashing is used to index and retrieve items in a database because it is
faster to find the item using the shorter hashed key than to find it using the original value. It is also used
in many encry$tion algorithms.
Question D 1; o0 2@
Although the A78 message format is sufficiently general to allow arbitrary $rotocol and hardware
addresses. A78 is almost always used to bind a ;2"bit I8 address to a @@@@ 5thernet address.
Select correct o$tion!
3:"bit
()!/it
:/"bit
322"bit
Although the A78 message format is sufficiently general to allow arbitrary $rotocol and hardware
addresses. A78 is almost always used to bind a ;2"bit I8 address to a /2"bit 5thernet address
Question D 1> o0 2@
7eliability is not the res$onsibility of the Trans$ort layer.
Select correct o$tion!
True
+alse
7eliability is the res$onsibility of the Trans$ort layer. In T<8HI8& T<8 $rovides reliable trans$ort service.
)ost Internet a$$lications use T<8 as no other $rotocol has $roved to work better.
Question D 2@ o0 2@
I8A: address with @@@@@@ leading 'eros is inter$reted to hold an I8A/ address.
Select correct o$tion!
httpE//#!st!dents.ning.com//
>4
399
329
none of the given
I8v: address with =: leading 'eros is inter$reted to hold an I8v/ addressQuestion D 1 o0 2@
,AT software does not allow a 8< to connect with the Internet and act as a ,AT device at the same time.
Select correct o$tion!
True
+alse
Question D 2 o0 2@
T<8 uses the term segment to refer to a @@@@@@@@.
Select correct o$tion!
$acket
message
both *a- and *b-
,one of the given
both a and b
T<8 uses single format for all messages. T<8 uses the term segment to refer to a message. 5ach message
sent from T<8 on one machine to T<8 on another machine uses this format including data and
acknowledgement.
Question D 9 o0 2@
The ?niversal #atagram 8rotocol is a message"oriented $rotocol.
Select correct o$tion!
True
6alse
?#8 has the following characteristics.
U It is an end"to"end $rotocol. It $rovides a$$lication"to"a$$lication communication.
U It $rovides connectionless service.
U It is a )essage"Oriented $rotocol.
U It uses best"effort delivery service.
U It follows arbitrary interaction.
U It is o$erating system inde$endent
Question D 3 o0 2@
@@@@@@@@@@@@@@field tells the receiver how to order fragments within a given datagram.
Select correct o$tion!
6+ACS
6+AC)5,T O66S5T
I#5,TI6I<ATIO,
.one o0 the given
The 67AC)5,T O66S5T field tells a receiver how to order fragments within a given datagram
Question D 5 o0 2@
I8 datagram can contains @@@@@@@@ octets.
Select correct o$tion!
9":4&4;4
1#45,595
3":4&4;:
none of the given
#atagrams can have different si'es i.e.
Feader area is usually fixed *29 octets- but can have o$tions. #ata area can contain
between 3 octet and :4.4;4 octets *23:"3-.
?sually& data area is much larger than header.
Question D 4 o0 2@
The amount of buffer s$ace available at any time is called the window.
Select correct o$tion!
True
6alse
Question D : o0 2@
@@@@@@@ Source is res$onsible for fragmentation.
Select correct o$tion!
I8A/
%'?4
I8v: source *not intermediate routers- is res$onsible for fragmentation. 7outers
sim$ly dro$ datagrams larger than network )T? *)aximum Transmission ?nit-. So
source must fragment datagram to reach destination.
Question D ; o0 2@
7outers use @@@@@@@ to forward datagrams along $rearranged $ath.
Select correct o$tion!
Traffic class
+low label
#estination address
none of the given
7outers use flow label to forward datagrams along $rearranged $ath
Question D > o0 2@
@@@@@@@ $rotocol uses three way handshake to begin a connection.
Select correct o$tion!
?#8
T('
I8
none of the given
Question D 1@ o0 2@
Ty$ical internet routing uses uses a combination of two metrics@@@@@@@@@@@@@@@@@@.
Select correct o$tion!
routing metrics
administrative cost and routing metrics
ho$ cost
a!ministrative cost an! hop count
Question D 13 o0 2@
,etwork Address and 8ort Translation *,A8T- is by far the most $o$ular form of @@@@@@@
Select correct o$tion!
,etwork Address Transmission
.etwork A!!ress Translation
,etwork Address Transformation
,one of the given
Question D 15 o0 2@
The routers within an autonomous system use a @@@@@@@@@@@@@ to exchange routing information.
Select correct o$tion!
%nterior 6ateway protocols<%6's=
5xterior Cateway $rotocol *5C8s-
0oth Interior Cateway $rotocols*IC8s- and 5xterior Cateway $rotocol *5C8s-
,one of the given
It is used among routers within autonomous system. The destinations lie within IC8.
Question D 1: o0 2@
Interior Cateway 8rotocols *IC8s- and 5xterior Cateway 8rotocols *5C8s- two broad classes of Internet
7outing 8rotocol.
Select correct o$tion!
True
6alse
Question D 1; o0 2@
The ,etwork +ayer 8rotocol I<)8 stands for@@@@@@@@@@@@
Select correct o$tion!
Instant <ontrol )essage 8rotocol
%nternet (ontrol Message 'rotocol
Initial <ontrol )essage 8rotocol
,one of the given
Question D 1> o0 2@
The <urrent version of I8"Aersion / is @@@@@ old
Select correct o$tion!
32 years
2@ years
22 years
none of given
T<8 is a connectionless and reliable trans$ort $rotocol.
Select correct o$tion!
True
+alse
ATM hea!er is about the8888888888888888o0 the cell.
Select correct o$tion!
34V
1@J page 44
29V
4V
$itter is signi0icance 0or 88888888888888
Select correct o$tion!
Aoice
Aideo
#ata
Al o0 above page 44
1ow many metho!s eist 0or buil!ing routing table5
Select correct o$tion
3
2 pages
; /
The process o0 0orwar!ing the packets o0 in0ormation is calle! routing
The routing table contains in0ormation about the 8888888888888 imme!iately aroun! it
Select correct o$tion!
To$ology of the network
Bestination page 5;
0oth of the above
,one of the above
Asynchronous Trans0er Mo!e uses the concept o0 88888888888888
Select correct o$tion!
<onnection"less networking
(onnection#oriente! networking page 44
/hich o0 the 0ollowing statement is true regar!ing ATM5
Select correct o$tion!
It is a single technology for voice& video and data
It has low (itter and high ca$acity
It uses fixed si'ed small cells. /2 octet1s data
All o0 the above page 45
A 8888 can 0orwar! or block messages base! on the in0ormation in the message itsel0
Select correct o$tion
)essage digest
8roxy firewall
'acket 0ilter 0irewall not 0oun! in han!outs
8rivate Iey
Pou can use an I8 $acket filter firewall to create a set of rules that either discards or acce$ts traffic over
a network connection.*Source to confirm
htt$!HH$ublib.boulder.ibm.comHinfocenterH$owersysHv;r3m4Hindex.(s$
to$icTHi$ha4H$acketfilterfirewall.htm-
Transmission me!ia are usually categorize! as
Select correct o$tion!
6ui!e! or ungui!e!
6ixed or unfixed
#eterminate or indeterminate
)etallic or nonmetallic
/hich o0 the 0ollowing is not a gui!e! me!ium5
Select correct o$tion!
Twisted"$air cable
6iber"o$tic cable
Atmosphere
<oaxial <able
/hich multipleing techniAue transmits !igital signals5
Select correct o$tion!
W#)
6#)
TBM
,one of the above
All !estinations on same switch have same 888888888
Select correct o$tion!
7outer
Information
.et 1op page 5;
,one of the above
/hich o0 the 0ollowing statement is true regar!ing Bistance#?ector &outing5
Select correct o$tion!
It is very sim$le to im$lement.
'acket switch up!ates its own routing table 0irst. 'age 43
It is used in 7I8.
All of the above
An eterior switch is one with which 888888888888888
Select correct o$tion!
(omputers are attache! page 5>
,o com$uter is attached
Fubs are attached externally ,one of the above
+rame relay is 88888888888888888888888
Select correct o$tion!
(onnection oriente! service page 43
<onnectionless service It is ty$ically ranges from 4)b$s to 3999)b$s. ,one of the above
An interior switch is one with which 88888888888
Select correct o$tion!
<om$uters are attached
.o computer is attache! page 5>
<om$uters are attached internally
,one of the above
/hich o0 the 0ollowing is not a bene0it o0 source in!epen!ence5
Select correct o$tion!
It allows fast and efficient routing.
'acket switch !o not nee! to have complete in0ormation about all !estinations
,etwork functions even if to$ology changes
,one of the above
/hich o0 the 0ollowing statement regar!ing ATM is true5
Select correct o$tion!
<onnections in AT) are called virtual channels
The A< is identified by a 2/"bit value formed from the A8I
Hoth <a= an! <b=
,one of the above
ATM hea!er is about the ########## o0 the cell.
Select correct o$tion!
34V
1@J
29V
4V
1ow many metho!s eist 0or computing routing table5
Select correct o$tion!
4
/
;
2
/hich o0 the 0ollowing statement is true regar!ing Bistance#vector routing5
Select correct o$tion!
It is very sim$le to im$lement.
'acket switch up!ates its own routing table 0irst.
It is used in 7I8.
All of the above
/hich one o0 the 0ollowing is a property o0 static routing5
Select correct o$tion!
It is inflexible
It is done at boot time
It has low network overload
All o0 the above
Asynchronous Trans0er Mo!e uses the concept o0 ####################.
Select correct o$tion!
<onnection"less networking
(onnection#oriente! networking
/hich multipleing techniAue shi0ts each signal to a !i00erent carrier 0reAuency5
Select correct o$tion!
T#)
+BM
0oth a and b
,one of the above
An interior switch is one with which KKKKKKK.
Select correct o$tion!
<om$uters are attached
.o computer is attache!
<om$uters are attached internally
,one of the above
-A. networks can not be eten!e! to very large networks because o0 the limitations o0...........
Select correct o$tion!
Area
Bistance
7outers
Technology
/hich o0 the 0ollowing statement is wrong regar!ing ATM5
Select correct o$tion!
It is a single technology for voice& video and data
It has low (itter and high ca$acity.
It uses fixed si'e& small cells& and /2 octetNs data
.one o0 the above
/hich one o0 the 0ollowing is the responsibility o0 BCikstraI algorithm5
Select correct o$tion!
To compute the shortest path between two no!es
To extract next ho$ information from $ath information
To insert next ho$ information into routing table
All of the above
/hich one o0 the 0ollowing is a property o0 !ynamic routing5
Select correct o$tion!
It is inflexible
It has low network overload
%t can work aroun! network 0ailure
All of the above
/hich o0 the 0ollowing statement is true regar!ing ATM5
Select correct o$tion!
AT) is a single technology that is designed to meet the goals of both +A,s and WA,s.
AT) uses the conce$t of connection"oriented networking.
Hoth <a= an! <b=
,one of the above
Source in!epen!ence is a phenomena in which net hop to !estination !oes not !epen! on the
WWWWWWW
Select correct o$tion!
Source o0 packet
#estination of $acket
,o of ho$s
Source of $rotocol
%0 a computer on the network shares resources 0or others to use, it is calle! 8888
a. Server
b. (lient
c. Main0rame
Answer" a
2. Terminators are use! in 888888 topology.
a. Hus
b. Star
Answer" a
9. %n 88888 topology, i0 a computerIs network cable is broken, whole network goes !own.
a. Hus
b. Star
Answer" a
3. +or large networks, 8888888 topology is use!.
a. Hus
b. Star
c. &ing
Answer" b
5. %SF stan!s 0or
a. %nternational Stan!ar! Frganization
b. %nternational Stu!ent Frganization
c. %ntegrate! Services Frganization
Answer" a
4. %SF FS% mo!el is use! in
a. Stan! alone '(
b. .etwork environment
Answer" b
:. .etwork cable lies on 88888 layer
a. Application
b. .etwork
c. 'hysical
Answer" c
;. 8888 -ayer !eci!es which physical pathway the !ata shoul! take.
a. Application
b. .etwork
c. 'hysical
Answer" c
>. %SB. is an eample o0 888888 network
a. (ircuit switche!
b. 'acket switche!
Answer" a
1@. L.25 is an eample o0 888888 network
a. (ircuit switche!
b. 'acket switche!
Answer" b
11. 8888888888888 allows -A. users to share computer programs an! !ata.
a. (ommunication server
b. 'rint server
c. +ile server
Answer" c
12. 'rint server uses 88888888 which is a bu00er that hol!s !ata be0ore it is sen! to the printer.
a. Queue
b. Spool
c. .o!e
Answer" b
19. A stan!alone program that has been mo!i0ie! to work on a -A. by inclu!ing concurrency controls
such as 0ile an! recor! locking is an eample o08888
a -A. intrinsic so0tware
b. -A. aware so0tware
c. 6roupware
!. -A. ignorant so0tware
Answer" a
13. The 888888 portion o0 -A. management so0tware restricts access, recor!s user activities an! au!it
!ata etc.
a. (on0iguration management
b. Security management
c. 'er0ormance management
Answer " b
15. /hat is the ma cable length o0 ST'5
a. 1@@ 0t
b. 2@@ 0t
c. 1@@ m
!. 2@@ m
Answer " !
14. /hat is the ma !ata capacity o0 ST'5
a. 1@ mbps
b. 1@@ mbps
c. 1@@@ mbps
!. 1@@@@ mbps
Answer" b
1:. /hich connector ST' uses5
a. H.(
b. &$#11
c. &$#35
!. &$#4>
Answer " c
1;. /hat is the central !evice in star topology5
a. ST' server
b. 1ub7switch
c. 'B(
!. &outer
Answer " b
1>. /hat is ma !ata capacity 0or optical 0iber cable5
a. 1@ mbps
b. 1@@ mbps
c. 1@@@ mbps
!. 1@@@@ mbps
Answer " c
In #irect $oint to $oint communication adding the ,th com$uter re%uires"""""""""""" new connections.
,one of the given
,2
,"3
*,2 S,-H2
disadvantage In Direct point to point communication is that adding a new computer to the network
requires N-1 new connections .(P# 23
Question .o" 2 < M a r k s" 1 = http"77vustu!ents.ning.com7
In 8oint"to"8oint to$ology there are two to$ologies.
Tree and 7ing
Star and 7ing
Star and Tree
,one of the given
8OI,T"TO"8OI,T!
In Point-to-Point to$ology there are two to$ologies.
3- STA7 to$ology
2- T755 to$ology
Question .o" 9 < M a r k s" 1 =
%n #############, network occupies the smaller area like a room a 0loor or a buil!ing
+A,
WA,
)A,
,one of the given
In !"N network occupies the sma##er area #ike a room a $#oor or a %ui#ding.(P# &
1ar!ware that calculates a (&( uses two simple components.
A,# unit and XO7 unit
Shift register and XO7 unit
Shift register and A,# unit
none of the given
<7< uses (ust two hardware com$onents!
U Shift register
U 5xclusive O7 * XO7 unit - .(P# 2'
Question .o" 4 < M a r k s" 1 = http"77vustu!ents.ning.com7
The Cigabit 5thernet hardware o$erates at a rate of """"""""
39 )b$s
399 )b$s
3999 )b$s
,one of the given
(iga%it )thernet that operates at 1 (%ps (1''' *%ps over $i%er optics and twisted pair )thernet ca%#es.
http"77vustu!ents.ning.com7
0ormally name! 8888888888 in0ormally known as the twiste! pair Ethernet or T' Ethernet.
39 0ase 2
39 0ase 4
39 0ase T
none of the given
1'+",)--.
-his is another standard o$ wiring scheme. It is common#/ ca##ed 1'+ase--0 -wisted Pair or -P )thernet.
(P# &3
.net
An inter0ace 0or thin Ethernet must have an 888888888888 connector , an! must generate signals
accor!ing to the8888888888888 speci0ication.
7."/4& 39 0ase T
7."/4& 39 0ase 4
0,<& 39 0ase 2
0,<& 39 0ase T
A system with re!un!ant bri!ges might have a problem with8888888 in the system.
+oo$
6ilters
S$anning Trees
All given choices
http"77vustu!ents.ning.com7
88888888 computes shortest paths in a graph by using weights on e!ges as a measure o0 !istance.
Creedy algorithm
#istance vector algorithm
#i(kstaNs algorithm
none of the given
D1ikstra2s a#gorithm can accommodate weights on edges in graph. -he shortest
Path is then the path with #owest tota# weight (sum o$ the weight with a## edges. It shou#d
%e noted that the shortest path is not necessari#/ with $ewest edges (or hops.
Hasic -A. technologies such as Ethernet, Token &ing, an! +BB% use a 88888.
<onnectionless service $aradigm
<onnection"oriented service $aradigm
0oth <onnectionless and <onnection"oriented service $aradigm
,one of the given
8888888 protocols o0 T('7%' layering mo!el speci0y how to ensure reliable trans0er.
8hysical +ayer
,etwork Interface +ayer
Internet +ayer
Trans$ort +ayer
!"3)4 &. ensure re#ia%#e trans$er #a/er & in -5P #a/ering mode# is transport #a/er.
"77vuzs.net
An %nternet A!!ress <%' a!!ress= is a uniAue 8888888888 binary number assigne! to a host an! use!
0or all communication with host
/2"bit
;2"bit
2/"bit
,one of the given
"n Internet address (IP address is a unique 32-%it %inar/ num%er assigned to a
6ost and used $or a## communication with the host
the a!!ress 8888888888 i!enti0ies the physical network to which the computer is attache!, while the
8888888 i!enti0ies an in!ivi!ual computer on that network.
8refix& suffix
suffix& $refix
suffix& suffix
none of the given
PREFIX:
It identi$ies the ph/sica# network to which the computers are attached.
SUFFIX:
It identi$ies an individua# computer on the network.
88888888888 places the boun!ary between the 0irst an! secon! octets
<lass A
<lass 0
<lass <
<lass #
<lass A $laces the boundary between the first and second octets. <lass 0 $laces the boundary between
the second and third octets& and class < $laces the boundary between the third and fourth octets.
88888888888 places the boun!ary between the thir! an! 0ourth octets.
<lass A
<lass 0
<lass <
<lass #
<lass A $laces the boundary between the first and second octets. <lass 0 $laces the boundary between
the second and third octets& and class < $laces the boundary between the third and fourth octets.
http"77vustu!ents.ning.com7
88888888 0iel! o0 hea!er in!icates whether a !atagram is a 0ragment or a complete !atagram.
6+ACS
6+AC)5,T O66S5T
I#5,TI6I<ATIO,
,one of the given
74"(*)N-"-I8N.
I8 uses fragmentation i.e. datagramNs can be s$lit into $ieces to fit in network with small )T?. 5ach
fragment is an inde$endent datagram. It includes all header fields. 0it in header indicates that the
datagram is a fragment
tp"77vuzs.net
888888 provi!es connectionless service.
T<8
?#8
I8
none of the given
9DP has the $o##owing characteristics.
: It is an end-to-end protoco#. It provides app#ication-to-app#ication communication.
: It provides connection#ess service.
: It is a *essage-8riented protoco#.
: It uses %est-e$$ort de#iver/ service.
: It $o##ows ar%itrar/ interaction.
: It is operating s/stem independent
"77vuzs.net
GB' an! T(' are both888888888 layer protocols
8hysical
#ata link
,etwork
Trans$ort
(onnection#oriente! service, 'oint#to#point, (omplete reliability, +ull#!uple communication, Stream
inter0ace, &eliable connection start#up an! 6race0ul connection shut!own are the services provi!e!
by8888888888
I8
,one of the given
T<8
?#8
S57AI<5 87OAI#5# 0P T<8!
6ollowing are the services $rovided by T<8!
U <onnection"oriented service
U 8oint"to"$oint
U <om$lete reliability
U 6ull"du$lex communication
U Stream interface
U 7eliable connection start"u$
U Craceful connection shutdown
8888888 protocols o0 T('7%' layering mo!el speci0y how to ensure reliable trans0er.
8hysical +ayer
,etwork Interface +ayer
Internet +ayer
Trans$ort +ayer
!"3)4 &. ensure re#ia%#e trans$er #a/er & in -5P #a/ering mode# is transport #a/er
88888888i!enti0ies which application program on receiving computer shoul! receive the !ata
+ogical address
Source $ort
#estination 8ort
,one of the given
7ie#d Destination Port identi$ies which app#ication program on receiving computer shou#d receive the
data $ie#d source port identi$ies the app#ication programs that sent the data.
Question .o" 29 < M a r k s" 1 = http"77vustu!ents.ning.com7
@@@@@@@@ identifies the a$$lication $rogram that sent the data.
#estination 8ort
Source $ort
+ogical address
,one of the given
7ie#d Destination Port identi$ies which app#ication program on receiving computer shou#d receive the
data ;hi#e $ie#d source port identi$ies the app#ication programs that sent the data. (4e$erence $rom )-
%ooks
The Hor!er 6ateway 'rotocol <H6'= uses888888888 0or all communication
?#8
T<8
0oth ?#8 and T<8
none of the given
0O7#57 CAT5WAP 87OTO<O+!
It is most $o$ular 5xterior Cateway 8rotocol in Internet. It has following characteristics!
QIt $rovides routing among autonomous systems *5C8-.
QIt $rovides $olicies to control routes advertised.
QIt uses reliable trans$ort *T<8-.
"77vuzs.net
888888888888 uses !istance vector approach to !e0ine routing
0C8
OS86
7I8
,one of the given
7O?TI,C I,6O7)ATIO, 87OTO<O+ *7I8-!
It has the following characteristics!
QIt is used for routing within an autonomous system *IC8-.
QFo$ <ount )etric! 7I8 measures distance in network ho$s& where each network between the source
and destination counts as a single ho$.
QIt uses ?#8 for all message transmissions.
Q7I8 is used over +A,. Aersion 3 of 7I8 uses hardware broadcast and version 2 allows #elivery via
multicast.
QIt can be used to advertise default route $ro$agation. An organi'ation can use 7I8 to
Install a default route in each router.
QIt uses distance vector algorithm.
"77vuzs.net
%(M' message transport is acte! upon by getting %(M' encrypte! in %'.
True
6alse
I5*P message transport is acted upon %/ getting I5*P encapsu#ated in IP (P# 11<
'rotocol a!!resses are abstractions provi!e! by 88888888888.
hardware
software
o$erating system
internet
Protoco# addresses are a%stractions provided %/ so$tware (re$erence
These packets serve same purpose on 88888888 as 0rames on 888888
Intranet& +A,
Internet& WA,
Intranet& WA,
Internet& +A,
=I4-9"! P"5>)-,.
-hese packets serve same purpose in Internet as $rames on !"N
A!!ress mask !e0ines how many bits o0 a!!ress are in su00i5
True
6alse
Address mask defines how many bits of address are in $refix. 8refix defines how much of address used
to identify network.
http"77vustu!ents.ning.com7
a single networking technology is best 0or all nee!s.
True
6alse
-here is no sing#e networking techno#og/ that is %est $or a## needs
http"77vustu!ents.ning.com7
A computer attache! to a given network can only communicate with other computers attache! to the
same network. %s this a problem with multiple networks5
True
6alse
the chief $roblems with multi$le networks are as follows!
U A com$uter attached to a given network can only communicate with other
<om$uters attached to the same network.
"77vuzs.net
The term sel0#i!enti0ying is use! 0or (lass0ul %' a!!resses because the class o0 the a!!ress can be
compute! 0rom the a!!ress8888888888.
Itself
$refix
suffix
mask
5#ass$u# IP addresses are se#$-identi$/ing %ecause the c#ass o$ the address can %e computed $rom the
address itse#$
+in! the class o0 the a!!ress.
1@1@@111 11@11@11 1@@@1@11 @11@1111
A
0
5
<
7eference table handouts 8 K 2>
vuzs.net
+in! the class o0 the a!!ress"
1111@@11 1@@11@11 11111@11 @@@@1111
A
<
5
0
7eference table handouts 8 K 2>
"77vuzs.net
%n which metho! o0 A!!ress &esolution 'rotocol the protocol a!!ress is !etermine! by har!ware
a!!ress5
/ere MTM stan!s 0or Table lookup, M(M 0or (lose!#0orm (omputation an! MBM 0or Bata Echange5
T
#
<
T& <
7eference table handouts 8 K =>
"77vuzs.net
/hich metho! o0 A!!ress &esolution 'rotocol reAuires har!ware broa!cast5
/ere MTM stan!s 0or Table lookup, M(M 0or (lose!#0orm (omputation an! MBM 0or Bata Echange5
#
T
<
T& #
7eference table handouts 8 K =>
"77vuzs.net
/hich metho! o0 A!!ress &esolution 'rotocol resolution with minimum !elay5
/ere MTM stan!s 0or Table lookup, M(M 0or (lose!#0orm (omputation an! MBM 0or Bata Echange5
T& #
c
T
T& <
7eference table handouts 8 K =>
%n which metho! o0 A!!ress &esolution 'rotocol the implimentation is more !i00icult5
/ere MTM stan!s 0or Table lookup, M(M 0or (lose!#0orm (omputation an! MBM 0or Bata Echange5
T& <
T
<
#
7eference table handouts 8 K =>"77vuzs.net
Fn o0 the !esign goals 0or unicast route propagation is 8888888888.
<onsistency
inconsistency
stability
dynamic addressing
8n o$ the design goa#s $or unicast route propagation is sta%i#it/?continua# changes in route are
undesira%#e %ecause the/ #ead to higher 1itter and datagram arriving out o$ order. -hus0 once a unicast
routing protoco# $inds a shortest path0 it usua##/ retains the route unti# a $ai#ure makes the path
unusa%#e. (4e$erence $rom )-%ook
vuzs.net
'ropagation multicast routing in0ormation !i00ers !ramatically 0rom unicast route propagation5
True
6alse
Propagating multicast routing information differs dramatically from unicast route
propagation. -he di$$erence arises %ecause internet mu#ticast a##ows d/namic group mem%ership and
autonomous senders
http"77vustu!ents.ning.com7
To save tra00ic, an E6' !oes not summarize routing in0ormation 0rom the autonomous system be0ore
passing it to another autonomous system.
True
6alse
-o save tra$$ic0 an )(P summari@e routing in$ormation $rom the autonomous s/stem %e$ore passing it to
another autonomous s/stem. *ore important an )(P imp#ements po#ic/ constraint that a##ows a s/stem
manager to determine eAact#/ what in$ormation is re#eased outside the organi@ation. *4e$erence $rom )-
%ook-
"77vuzs.net
%n %'v4 the type o0 a!!ress use! 0or collection o0 computers with same pre0i. Are known
as888888888.
Anycast
?nicast
)ulticast
,on of the given
7o##owing are specia# t/pes o$ addresses0 IPvB uses.
Unicast: It is used $or sing#e destination computer.
Multicast: It is used $or mu#tip#e destinationsC possi%#/ not at same site.
Cluster: -his t/pe o$ address is used $or co##ection o$ computers with same pre$iA0
Datagram is de#ivered to one out o$ c#uster.
Special types o0 a!!resses in %'v4 use! 0or multiple !estinationsN possibly not same site. Are known
as88888888
?nicast
Anycast
)ulticast
none of the given
6ollowing are s$ecial ty$es of addresses& I8v: uses!
Gnicast" It is used for single destination com$uter.
Multicast" It is used for multi$le destinationsM $ossibly not at same site.
(luster" This ty$e of address is used for collection of com$uters with same $refix&
#atagram is delivered to one out of cluster.
"77vuzs.net
GB' o00ers application programs a Message#Friente! %nter0ace, applications can !epen! on protocol
to preserve !ata boun!aries.
True
6alse
9DP o$$ers app#ication programs a *essage-8riented Inter$ace. It does not divide messages into packets
$or transmission and does not com%ine messages $or de#iver/.
"D="N-"(),.
: "pp#ications can depend on protoco# to preserve data %oundaries.
"77vuzs.net
&eliability is the responsibility o0 the 888888888 layer
,etwork
#ata link
Trans$ort
A$$lication
4e#ia%i#it/ is the responsi%i#it/ o$ the -ransport #a/er
vuzs.net
T(' uses 8888888 mechanism to control the 0low o0 !ata.
door
window
acknowledgment
retransmission
%n Birect point to point communication a!!ing the .th computer reAuires############ new connections.
,one of the given
,2
,"3
*,2 S,-H2
disadvantage In Direct point to point communication is that adding a new computer to the network
requires N-1 new connections .(P# 23
net
%n 'oint#to#'oint topology there are two topologies.
Tree and 7ing
Star and 7ing
Star and Tree
,one of the given
8OI,T"TO"8OI,T!
In Point-to-Point to$ology there are two to$ologies.
3- STA7 to$ology
2- T755 to$ology
http"77vustu!ents.ning.com7
%n #############, network occupies the smaller area like a room a 0loor or a buil!ing
+A,
WA,
)A,
,one of the given
In !"N network occupies the sma##er area #ike a room a $#oor or a %ui#ding.(P# &
.net
1ar!ware that calculates a (&( uses two simple components.
A,# unit and XO7 unit
Shift register and XO7 unit
Shift register and A,#unit
none of the given
<7< uses (ust two hardware com$onents!
U Shift register
U 5xclusive O7 * XO7 unit - .(P# 2'
http"77vustu!ents.ning.com7
http"77vustu!ents.ning.com7
The 6igabit Ethernet har!ware operates at a rate o0 ########
39 )b$s
399 )b$s
3999 )b$s
,one of the given
(iga%it )thernet that operates at 1 (%ps (1''' *%ps over $i%er optics and twisted pair )thernet ca%#es.
.net
0ormally name! 8888888888 in0ormally known as the twiste! pair Ethernet or T' Ethernet.
39 0ase 2
39 0ase 4
39 0ase T
none of the given
1'+",)--.
-his is another standard o$ wiring scheme. It is common#/ ca##ed 1'+ase--0 -wisted Pair or -P )thernet.
(P# &3 net
An inter0ace 0or thin Ethernet must have an 888888888888 connector , an! must generate signals
accor!ing to the8888888888888 speci0ication.
7."/4& 39 0ase T
7."/4& 39 0ase 4
0,<& 39 0ase 2
0,<& 39 0ase T
"77vuzs.net
A system with re!un!ant bri!ges might have a problem with8888888 in the system.
+oo$
6ilters
S$anning Trees
All given choices
"77vuzs.net
88888888 computes shortest paths in a graph by using weights on e!ges as a measure o0 !istance.
Creedy algorithm
#istance vector algorithm
#i(kstaNs algorithm
none of the given
D1ikstra2s a#gorithm can accommodate weights on edges in graph. -he shortest
Path is then the path with #owest tota# weight (sum o$ the weight with a## edges. It shou#d
+e noted that the shortest path is not necessari#/ with $ewest edges (or hops.
Hasic -A. technologies such as Ethernet, Token &ing, an! +BB% use a 88888.
<onnectionless service $aradigm
<onnection"oriented service $aradigm
0oth <onnectionless and <onnection"oriented service $aradigm
none of the given
vuzs.net
8888888 protocols o0 T('7%' layering mo!el speci0y how to ensure reliable trans0er.
8hysical +ayer
,etwork Interface +ayer
Internet +ayer
Trans$ort +ayer
!"3)4 &. ensure re#ia%#e trans$er #a/er & in -5P #a/ering mode# is transport #a/er.
An %nternet A!!ress <%' a!!ress= is a uniAue 8888888888 binary number assigne! to a host an! use!
0or all communication with host
/2"bit
;2"bit
2/"bit
,one of the given
"n Internet address (IP address is a unique 32-%it %inar/ num%er assigned to a
host and used $or a## communication with the host
http"77vustu!ents.ning.com7
The a!!ress 8888888888 i!enti0ies the physical network to which the computer is attache!, while the
8888888 i!enti0ies an in!ivi!ual computer on that network.
$refix & suffix
suffix & $refix
suffix & suffix
,one of the given
PREFIX:
It identi$ies the ph/sica# network to which the computers are attached.
SUFFIX:
It identi$ies an individua# computer on the network.
http"77vustu!ents.ning.com7
88888888888 places the boun!ary between the 0irst an! secon! octets
<lass A
<lass 0
<lass <
<lass #
<lass A $laces the boundary between the first and second octets. <lass 0 $laces the boundary between
the second and third octets& and class < $laces the boundary between the third and fourth octets.
http"77vustu!ents.ning.com7
88888888888 places the boun!ary between the thir! an! 0ourth octets.
<lass A
<lass 0
<lass <
<lass #
<lass A $laces the boundary between the first and second octets. <lass 0 $laces the boundary between
the second and third octets& and class < $laces the boundary between the third and fourth octets.
http"77vustu!ents.ning.com7
88888888 0iel! o0 hea!er in!icates whether a !atagram is a 0ragment or a complete !atagram.
6+ACS
6+AC)5,T O66S5T
I#5,TI6I<ATIO,
,one of the given
74"(*)N-"-I8N.
"77vuzs.net
888888 provi!es connectionless service.
T<8
?#8
I8
none of the given
9DP has the $o##owing characteristics.
: It is an end-to-end protoco#. It provides app#ication-to-app#ication communication.
: It provides connection#ess service.
: It is a *essage-8riented protoco#.
: It uses %est-e$$ort de#iver/ service.
: It $o##ows ar%itrar/ interaction.
: It is operating s/stem independent
GB' an! T(' are both888888888 layer protocols
8hysical
#ata link
,etwork
Trans$ort
http"77vustu!ents.ning.com7
(onnection#oriente! service, 'oint#to#point, (omplete reliability, +ull#!uple communication, Stream
inter0ace, &eliable connection startup an! 6race0ul connection shut!own are the services provi!e!
by8888888888
I8
,one of the given
T<8
?#8
S57AI<5 87OAI#5# 0P T<8!
6ollowing are the services $rovided by T<8!
U <onnection"oriented service
U 8oint"to"$oint
U <om$lete reliability
U 6ull"du$lex communication
U Stream interface
U 7eliable connection start"u$
U Craceful connection shutdown
http"77vustu!ents.ning.com7
8888888 protocols o0 T('7%' layering mo!el speci0y how to ensure reliable trans0er.
8hysical +ayer
,etwork Interface +ayer
Internet +ayer
Trans$ort +ayer
!"3)4 &. ensure re#ia%#e trans$er #a/er & in -5P #a/ering mode# is transport #a/er
"77vuzs.net
88888888i!enti0ies which application program on receiving computer shoul! receive the !ata
+ogical address
Source $ort
#estination 8ort
,one of the given
http"77vustu!ents.ning.com7
88888888 i!enti0ies the application program that sent the !ata.
#estination 8ort
Source $ort
+ogical address
,one of the given
The 0order Cateway 8rotocol *0C8- uses@@@@@@@@@ for all communication
?#8
T<8
0oth ?#8 and T<8
,one of the given
0O7#57 CAT5WAP 87OTO<O+!
It is most $o$ular 5xterior Cateway 8rotocol in Internet. It has following characteristics!
QIt $rovides routing among autonomous systems *5C8-.
QIt $rovides $olicies to control routes advertised.
QIt uses reliable trans$ort *T<8-.
.
http"77vustu!ents.ning.com7
888888888888 uses !istance vector approach to !e0ine routing
0C8
OS86
7I8
,one of the given
7O?TI,C I,6O7)ATIO, 87OTO<O+ *7I8-!
It has the following characteristics!
QIt is used for routing within an autonomous system *IC8-.
QFo$ <ount )etric! 7I8 measures distance in network ho$s& where each network
between the source and destination counts as a single ho$.
QIt uses ?#8 for all message transmissions.
Q7I8 is used over +A,. Aersion 3 of 7I8 uses hardware broadcast and version 2 allows
delivery via multicast.
QIt can be used to advertise default route $ro$agation. An organi'ation can use 7I8 to
install a default route in each router.
QIt uses distance vector algorithm.
"77vuzs.net
%(M' message transport is acte! upon by getting %(M' encrypte! in %'.
True
6alse
I5*P message transport is acted upon %/ getting I5*P encapsu#ated in IP (P# 11<
"77vuzs.net
'rotocol a!!resses are abstractions provi!e! by 88888888888.
hardware
software
o$erating system
internet
Protoco# addresses are a%stractions provided %/ so$tware
These packets serve same purpose on 88888888 as 0rames on 888888
Intranet& +A,
Internet& WA,
Intranet& WA,
Internet& +A,
=I4-9"! P"5>)-,.
-hese packets serve same purpose in Internet as $rames on !"N
.net
A!!ress mask !e0ines how many bits o0 a!!ress are in su00i5
True
6alse
Address mask defines how many bits of address are in $refix. 8refix defines how much of address used
to identify network.
A single networking technology is best 0or all nee!s.
True
6alse
-here is no sing#e networking techno#og/ that is %est $or a## needs"77vuzs.net
A computer attache! to a given network can only communicate with other computers attache! to the
same network. %s this a problem with multiple networks5
True
6alse
the chief $roblems with multi$le networks are as follows!
U A com$uter attached to a given network can only communicate with other
<om$uters attached to the same network.
"77vuzs.net
The term sel0#i!enti0ying is use! 0or (lass0ul %' a!!resses because the class o0 the a!!ress can be
compute! 0rom the a!!ress8888888888.
Itself
$refix
suffix
mask
5#ass$u# IP addresses are se#$-identi$/ing %ecause the c#ass o$ the address can %e computed $rom the
address itse#$
+in! the class o0 the a!!ress.
1@1@@111 11@11@11 1@@@1@11 @11@1111
A
0
5
<
7eference table handouts 8 K 2>
http"77vustu!ents.ning.com7
+in! the class o0 the a!!ress"
1111@@11 1@@11@11 11111@11 @@@@1111
A
<
5
0
7eference table handouts 8 K 2>
%n which metho! o0 A!!ress &esolution 'rotocol the protocol a!!ress is !etermine! by har!ware
a!!ress5
/ere MTM stan!s 0or Table lookup, M(M 0or (lose!#0orm (omputation an! MBM 0or Bata Echange5
T
#
<
T& <
7eference table handouts 8 K =>
"77vuzs.net
/hich metho! o0 A!!ress &esolution 'rotocol reAuires har!ware broa!cast5
/ere MTM stan!s 0or Table lookup, M(M 0or (lose!#0orm (omputation an! MBM 0or Bata Echange5
#
T
<
T& #
7eference table handouts 8 K =>
vuzs.net
/hich metho! o0 A!!ress &esolution 'rotocol resolution with minimum !elay5
/ere MTM stan!s 0or Table lookup, M(M 0or (lose!#0orm (omputation an! MBM 0or Bata Echange5
T& #
c
T
T& <
7eference table handouts 8 K =>
%n which metho! o0 A!!ress &esolution 'rotocol the implementation is more !i00icult5
/ere MTM stan!s 0or Table lookup, M(M 0or (lose!#0orm (omputation an! MBM 0or Bata Echange5
T& <
T
<
#
7eference table handouts 8 K =>
Fn o0 the !esign goals 0or unicast route propagation is 8888888888.
<onsistency
inconsistency
stability
dynamic addressing
8n o$ the design goa#s $or unicast route propagation is sta%i#it/?continua# changes in route are
undesira%#e %ecause the/ #ead to higher 1itter and datagram arriving out o$ order. -hus0 once a unicast
routing protoco# $inds a shortest path0 it usua##/ retains the route unti# a $ai#ure makes the path
unusa%#e. (4e$erence $rom )-%ook
http"77vustu!ents.ning.com7
'ropagation multicast routing in0ormation !i00ers !ramatically 0rom unicast route propagation5
True
6alse
Propagating multicast routing information differs dramatically from unicast route
propagation. -he di$$erence arises %ecause internet mu#ticast a##ows d/namic group mem%ership and
autonomous senders
to save tra00ic an E6' !oes not summarize routing in0ormation 0rom the autonomous system be0ore
passing it to another autonomous system.
True
6alse
to save tra$$ic0 an )(P summari@e routing in$ormation $rom the autonomous s/stem %e$ore passing it to
another autonomous s/stem. *ore important an )(P imp#ements po#ic/ constraint that a##ows a s/stem
manager to determine eAact#/ what in$ormation is re#eased outside the organi@ation. *4e$erence $rom )-
%ook-
http"77vustu!ents.ning.com7
%n %'v4 the type o0 a!!ress use! 0or collection o0 computers with same pre0i. Are known as88888
Anycast
?nicast
)ulticast
none of the given
7o##owing are specia# t/pes o$ addresses0 IPvB uses.
Unicast: It is used $or sing#e destination computer.
Multicast: It is used $or mu#tip#e destinationsC possi%#/ not at same site.
Cluster: -his t/pe o$ address is used $or co##ection o$ computers with same pre$iA0
Datagram is de#ivered to one out o$ c#uster.
vuzs.net
Special types o0 a!!resses in %'v4 use! 0or multiple !estinationsN possibly not at same site. 888888888.
?nicast
Anycast
)ulticast
none of the given
6ollowing are s$ecial ty$es of addresses& I8v: uses!
Gnicast" It is used for single destination com$uter.
Multicast" It is used for multi$le destinationsM $ossibly not at same site.
(luster" This ty$e of address is used for collection of com$uters with same $refix&
#atagram is delivered to one out of cluster.
GB' o00ers application programs a Message#Friente! %nter0ace, applications can !epen! on protocol
to preserve !ata boun!aries.
True
6alse
9DP o$$ers app#ication programs a *essage-8riented Inter$ace. It does not divide messages into packets
$or transmission and does not com%ine messages $or de#iver/.
"D="N-"(),.
: "pp#ications can depend on protoco# to preserve data %oundaries.
http"77vustu!ents.ning.com7
&eliability is the responsibility o0 the 888888888 layer
,etwork
#ata link
Trans$ort
A$$lication
4e#ia%i#it/ is the responsi%i#it/ o$ the -ransport #a/er
"77vuzs.net
T(' uses 8888888 mechanism to control the 0low o0 !ata.
#oor
window
acknowledgment
retransmission
-5P uses window mechanism to contro# the $#ow o$ data.
http"77vustu!ents.ning.com7
the time 0or acknowle!gement to arrival o0 packet !epen!s on.
#istance to destination and <urrent traffic conditions
<urrent traffic conditions
#istance to destination
non of these
-he time $or acknow#edgement to arrive depends on.
: Distance to destination
: 5urrent tra$$ic conditions
"77vuzs.net
+BB% can transmits !ata at a rate o0 ##########
399 million bits $er second
39 million bits $er second
3999 million bits $er second
,one of the given
http"77vustu!ents.ning.com7
the time 0or acknowle!gement to arrival o0 packet !epen!s on.
#istance to destination and <urrent traffic conditions
<urrent traffic conditions
#istance to destination
non of these
-he time $or acknow#edgement to arrive depends on.
: Distance to destination
: 5urrent tra$$ic conditions"77vuzs.net
+BB% can transmits !ata at a rate o0 ##########
399 million bits $er second
39 million bits $er second
3999 million bits $er second
,one of the given
Guestion!"!
Sub(ect! i$v:
Sir&
su$$ose I8v: scheme is de$loyed in com$uter network of medical com$any. In I8v:& who is
res$onsible for fragmentation of I8 datagram
9
"
Answer!"
I8v: source *not intermediate routers- is res$onsible for fragmentation. 7outers sim$ly dro$
datagrams larger than network )T? *)aximum Transmission ?nit-. So source must fragment
datagram to reach destination.
Guestion!"!
Sub(ect! routing
7outing of a $acket from source to destination does not de$end on source address of a $acket. Sir&
what whould be the advantages of this in"de$endency.
9
"
Answer!"
,ext ho$ to destination does not de$end on source of $acket. This $henomenon is called YSource
Inde$endenceN. It has several benefits. It allows fast and efficient routing.
8acket switch need not hove com$lete information about all destinations in s$ite it (ust has next
ho$ so reduces total information and increases dynamic robustness. The network can continue to
function even if to$ology changes without notifying entire network.
why the internet multicast routing is difficult
Internet multicast routing is difficult because internet multicast allows arbitrary com$uter to (oin
multicast grou$ at any time. It allows arbitrary member to leave multicast grou$ at any time. It
also allows arbitrary com$uter to send message to a grou$ *even if not a member-.
Sub(ect! collisions in network
Sir& can network be totally $rotected from collisions with the hel$ of ex$onential back off
9
"
Answer!"
5X8O,5,TIA+ 0A<I O66
It reduces likely hood of se%uence of collision.
Sub(ect! tc$Hi$
T<8HI8 su$$orts different a$$roaches of address resolution algorithm in a real environment. Sir&
what are their names
9
"
Answer!"
Address 7esolution Techni%ues
Address resolution algorithms can be grou$ed into three basic categories!
Z Table looku$
Z <losed"form com$utation
Z )essage 5xchange
Sub(ect! ,AT
Su$$ose an organi'ation wants to share the transmission of multi$le devices of its network with
single $ublicly routable I8 address. To achieve this goal it uses ,AT. Sir it is re%uested to tell what
would be the alternative of ,AT.
9
"
Answer!"
,A8T *,etwork Address and 8ort Translation- or T<8 Slicing
TWI<5 ,AT
<AT
Sub(ect! gateway
7eliability is the base need of communication systems but some gateway $rotocols are considered
unreliable. Sir it is re%uested to convey us which gateway $rotocol is unreliable $rotocol for
trans$ortation of messages
9
Answer!"
We have unreliable transmission in 7outing Information 8rotocol *7I8-.
Sub(ect! A78
Su$$ose in a com$uter network of multinational com$any& network administratorNs system
receives some A78 messages while communication with other system. <onsidering this scenario
Sir it is re%uested to to tell how does system deal these incoming A78 messages
9
Answer!"
When an A78 message arrives& the $rotocol s$ecifies that the receiver must $erform two basic
ste$s.
6irst the receiver extracts the senderNs addresses binding and checks to see if it is $resent in the
cache. If not& it u$dates the cache.
The receiver examines the o$eration field of the message to determine whether the message is a
re%uest or a res$onse. If the message is a re%uest& the receiver com$ares the field TA7C5T 8A##7
with the local $rotocol address. If the two are identical& the com$uter is the target of the re%uest
and must send an A78 res$onse.
22
Sub(ect! multicast
"
Answer!"
Several multicast $rotocols exist. Some of the $ro$osed $rotocols are!
#istance Aector )ulticast 7outing 8rotocol *#A)78-
<ore 0ased Trees *<0T-
8rotocol Inde$endent )ulticast@ S$arse )ode *8I)"S)-
8rotocol Inde$endent )ulticast @ #ense )ode *8I)"#)-
)ulticast 5xtensions to the O$en Shortest 8ath 6irst 8rotocol *)OS86-
=2
Sub(ect! )?+TI<ASTI,C
.
Guestion!"! >2
Sub(ect! 5C8
What gateway $rotocol mostly used as 5C8 with some $ro$erties.
9
"
0order Cateway 8rotocol *0C8- is most $o$ular 5xterior Cateway 8rotocol in Internet. It has following
characteristics!
U It $rovides routing among autonomous systems *5C8-.
U It $rovides $olicies to control routes advertised.
U It uses reliable trans$ort *T<8-.
U It gives $ath of autonomous systems for each destination.
U <urrently the 5C8 is of choice in the Internet.
U It $rovides facilities for Transit 7outing.
>>
Sub(ect! #5+AP
What ty$e of Trans$ort 8rotocol is used when 8acket dro$$ing is $roffered than #elay.
9
"
Answer!"
?#8 *?ser datagram $rotocol- is used in this case.
>:
Sub(ect! I8 #ATAC7A)
What is the right $lace in I8 #atagram Feader to add extra o$tions
9
"
Answer!"
Several o$tions can be added in I8 o$tions field.
Sub(ect! #5+AP
,etworking <om$onents take sometime while forwarding data over network medium. Identify the
ty$e of delay
9
"
Answer!"
There are following ty$es of delay!
87O8ACATIO, #5+AP!
It defined as the time to travel across medium.
SWIT<FI,C #5+AP!
It is the time re%uired for network com$onent *hub& bridge& $acket switch- to forward data.
A<<5SS #5+AP!
It is the time re%uired to get control of medium *<S)AH<#& token-.
G?5?I,C #5+AP!
It is the time en%uired in $acket switches.
>/
Sub(ect! OS86
Which characteristics OS86 have
9
"
Answer!"
6ollowing are the characteristics of O$en Shortest 8ath 6irst *OS86-!
3. To satisfy demand for a routing $rotocol that can scale to large organi'ations& the I5T6
devised an IC8 known as the O$en Shortest 8ath
6irst 8rotocol *OS86-.
2. OS86 allows subdivision of Autonomous System into areas.
;. The link status information is $ro$agated within an area.
/. The routes are summari'ed before being $ro$agated to another area.
4. It reduces overhead *less broadcast traffic-.
:. 0ecause it allows a manager to $artition the routers and networks in an autonomous
system into multi$le areas
>. OS86 can scale to handle a larger number of routers than other IC8s.
>;
Sub(ect! A78
,etwork administrator receives some messages on his system. Fow does com$uter deal this
incoming A78 messages*
9
"
Answer!"
6ollowing se%uence of ste$s will be $erformed!
3. 6irst the receiver extracts the senderNs addresses binding and checks to see if it is
$resent in the cache.
2. If not& it u$dates the cache.
;. The receiver examines the o$eration field of the message to determine whether the
message is a re%uest or a res$onse.
/. If the message is a re%uest& the receiver com$ares the field TA7C5T 8A##7 with the
local $rotocol address.
4. If the two are identical& the com$uter is the target of the re%uest and must send an A78
res$onse.
>2
Sub(ect! tc$
Fow congestion is controlled by T<8*
9
"
Answer!"
T<8 uses a number of mechanisms to achieve high $erformance and avoid
where network $erformance can fall by several orders of magnitude. These mechanisms control the
rate of data entering the network& kee$ing the data flow below a rate that would trigger colla$se.
They also yield an a$$roximately max"min fair allocation between flows.
Acknowledgments for data sent& or lack of acknowledgments& are used by senders to infer network
conditions between the T<8 sender and receiver. <ou$led with timers& T<8 senders and receivers
can alter the behavior of the flow of data. This is more generally referred to as congestion control
andHor network congestion avoidance.
)odern im$lementations of T<8 contain four intertwined algorithms!
avoidance& fast retransmit& and fast recovery *76< 4:23-.
>3
Sub(ect! snuffer
What are the o$erations of network snuffer
9
"
Answer!"
The basic idea behind the o$eration of network analy'er *,etwork Sniffer- is a com$uter with a
network interface that receives all frames& which is called $romiscuous mode. )any deskto$
com$uters have interface that can be configured for $romiscuous mode. When combined with
software com$uter can examine any frame on +A,. In this way the communication across +A, is
guaranteed to be $rivate. This com$uter receives and dis$lays *but does not res$ond to- frames on
the +A,. ,etwork analy'er can be configured to filter and $rocess frames. It can count frames of
s$ecific ty$e of si'e. It dis$lays only frames from or to s$ecific com$uters. In general it can be
configured to match any value of any field and ca$ture only these frames meeting the filter
s$ecifications.
>9
Sub(ect! reachbility
Fow can we test any website for exam$le www.vu.edu.$k
9
"
Answer!"
This is done through 8I,C command for $robing the Internet.
:=
Sub(ect! $rotocol
which $rotocol is used within organi'ation. Which $rotocol is used to handle traffic in com$uter
network over countries
9
Answer!"
An autonomous system can be thought of as a set of networks and routers under one
administrative authority *organi'ation-. Interior Cateway 8rotocol *IC8- is used among routers
within autonomous system *organi'ation-. 6ollowing are the Internet routing $rotocols!
0order Cateway $rotocol
7outing Information 8rotocol
O$en Shortest 8ath 6irst 8rotocol
6or secure data communication in an organi'ation Airtual 8rivate ,etwork *A8,- is used.
Question No: 31 ( Marks: 2 )
What are the advantages of a multipoint connection over a point-
to-point connection?
Answer:
Point-to-point connection is limited to two devices, were else
more tan two devices sare a sin!le link in multipoint
connection" Multipoint connection can #e used $or $ail-over
and relia#ilit%"
Question No: 32 ( Marks: 2 )
What's the name of the telephone service in which there is no
need of dialing.
Answer:
&'(( (di!ital data service) is te telepone service in wic
tere is no need o$ dialin!"
Question No: 33 ( Marks: 2 )
Which type of frames are present in BSC frames?
Answer:
)ere are two t%pes o$ $rames tat are present in *(+"
1" +ontrol ,rames and
2" 'ata ,rames
Question No: 3- ( Marks: 2 )
.at metods o$ line discipline are used $or peer to peer and
primar% secondar% communication/
Answer:
Line discipline is done in two ways:
. !"#$%C& '!n(uiry %c)nowledgement*
+his is used for peer to peer communication.
,. -oll$ Select
+his method is used for primary secondary communication.
Question No: 30 ( Marks: 3 )
1ow does te cecksum cecker know tat te received data
unit is undama!ed/ 233
Answer:
Chec)sum Chec)er or generator:
+he sender su.divides data units into e(ual segments of /n0
.its'1 .its*
. +hese segments are added together using one0s complement.
,. +he total 'sum* is then complemented and appended to the
end of the original data unit as redundancy .its called
C2!C&S34.
5. +he e6tended data unit is transmitted across the networ).
7. +he receiver su.divides data unit and adds all segments
together and complement the result.
8. 9f the intended data unit is intact: total value found .y adding
the data segments and the chec)sum field should .e ;ero.
1. 9f the result is not ;ero: the pac)et contains an error < the
receiver re=ects it.
Question No: 34 ( Marks: 3 )
.ic one as more overead, a repeater or a #rid!e/ 56plain
%our answer" 233
Answer:
% .ridge has more overhead than a repeater. % .ridge processes
the pac)et at two
layers > a repeater processes a frame at only one layer. % .ridge
needs to search a
ta.le and find the forwarding port as well as to regenerate the
signal> a repeater
only regenerates the signal. 9n other words: a .ridge is also a
repeater 'and more*> a
repeater is not a .ridge.
Question No: 37 ( Marks: 3 )
.rite down disadvanta!es o$ 8in! )opolo!%"
Answer:
?isadvantages of @ing +opology
3nidirectional +raffic
% .rea) in a ring that is a disa.led station can disa.le the entire
networ)
Can .e solved .y using:
?ual @ing or
% switch capa.le of closing off the Brea)
Question No: 39 ( Marks: 3 )
1ow parit% #its are counted in :8+ error detection metod
tecni;ue in case o$ odd parit% !enerator/
Answer:
Aor e6ample:
We want to +B the .inary data unit CCCC
%dding together the num.er of 0s gives us 5: an odd num.er
Before +B: we pass the data unit through a parity generator:
which counts the 0s and appends the parity .it '* to the end
+he total num.er of 0s is now 7: an even num.er +he system
now transfers the entire e6panded across the networ) lin) When
it reaches its destination: the @B puts all D .its through an even
parity chec)ing function
9f the @B sees CCCC: it counts four ones: an even num.er and
the data unit passes
When the parity chec)er counts the 0s: it gets 8 an odd num.er
+he receiver )nows that an error has occurred somewhere and
therefore re=ects the whole unit Some systems may also use E??
parity chec)ing +he principal is the same as even parity
Question No: -< ( Marks: 0 )
56plain Protocol 'ata =nit (P'=)/
Answer: -rotocol data unit '-?3* is an ES9 term that refers
generically to a group of information added or removed .y a
particular layer of the ES9 model. 9n specific terms: an L6-?3
implies the data and headers defined .y layer 6. !ach layer uses
the -?3 to communicate and e6change information. +he -?3
information is only read .y the peer layer on the receiving device
and then stripped off: and data is handed over to the ne6t upper
layer.
#uestion "o: , ' 4ar)s: , *
9s there a comparison .etween +C-$9- reference model and
ES9 reference model.
Both the +C-$9- and ES9 are international standards for data
communication. Both use the concept of protocol layering. +hese
are the conceptual tools that is often used to show how various
protocols and technologies fit together to implement networ)s.
+he functions that the model represents are much the same. +his
means that the +C-$9- and the ES9 models are really (uite similar
in nature even if they don't carve up the networ) functionality
pie in precisely the same way. +here is a fairly natural
correspondence .etween the +C-$9- and ES9 layers> it =ust isn't
always a Fone-to-oneG relationship. Since the ES9 model is used
so widely: it is common to e6plain the +C-$9- architecture .oth in
terms of the +C-$9- layers and the corresponding ES9 layers
#uestion "o: ,, ' 4ar)s: , *
Fow can a datagram be transmitted across a $hysical network that does not understand the
datagram format
5nca$sulate[
L The network interface layer enca$sulates an entire datagram in the data area
of a hardware frame.
L The network hardware ignores the datagram format.
L The hardware treats a frame containing a datagram like any other frame.
L The sender $laces a frame ty$e in the frame header indicating that the frame
contains a datagram.
L The receiver reads the frame ty$e and knows the frame contains a datagram.
"o: ,1 ' 4ar)s: 5 *
Why does 9-v1 use separate !6tension 2eaders?
9-v1 use separate !6tension 2eaders. Aragmentation information
is )ept in separate e6tension header. !ach fragment has .ase
header and 'inserted* fragmentation header. !ntire datagram
including original header may .e fragmented.
#uestion "o: ,H ' 4ar)s: 8 *
Consider the 9- addresses: HD.,CC.,H.8 and the
corresponding su.net mas)s ,88.,88.,88.C: then find out the
following:
a. +he num.er of .its used for su.netting '%nswer D .its*
.. +otal num.er of host in the su.net '%nswer ,87 *
c. +he networ) address of the
su.net. '%nswer HD.,CC.,H.C*
d. +he su.net address of the 9- address.
2ere is the online calculator for su.netting
"E+!. +his is =ust for concept not included in the answer
+he su.net mas) determines what portion of the +C-$9- address
represents your networ) and what portion can .e used for your
hosts. +he networ) num.er represents the street 9 live on: and
the host portion is used for the num.ers on all the houses on my
street.
% su.net mas) of ,88.,88.,88.C means that the first three octets
of the address will .e used for the networ): and thus our networ)
num.er is I,.1D.. +his means we can have ,87 computers on
this networ): .ecause the fourth octet is not .eing used .y the
networ) portion of the address. We )now this .ecause of the C in
the su.net mas) ',88.,88.,88.C*.
#uestion "o: ,D ' 4ar)s: 8 *
2ow does 9- software reassem.le fragments that arrive out of
order?
% uni(ue 9? num.er of each outgoing datagram
When a router fragments the datagram: the router copies the 9?
num.er into each fragment.
+he fragment EAAS!+ field tells a receiver how to order fragments
within a given datagram
+he process of creating a copy of the original datagram from
fragments is called reassem.ly.
#uestion "o: ,I ' 4ar)s: 8 *
Write down the comparison of ?istance- vector and Lin) J state
algorithm?
CE4-%@9SE":
?9S+%"C!-K!C+E@ @E3+9"L:
M 9t is very simple to implement.
M -ac)et switch updates its own routing ta.le first.
M 9t is used in @9-.
L9"&-S+%+! %LLE@9+24:
M 9t is much more comple6.
M Switches perform independent computations.
M 9t is used in ES-A.
#uestion "o: 5C ' 4ar)s: C *
?esci.e in detail what is the purpose of the following ta.le? What
sort of information can .e e6tracted?
6irst 6our 0its Of
address
Table index in
decimal
<lass of Address
9999 9 A
9993 3 A
9939 2 A
9933 ; A
9399 / A
9393 4 A
9339 : A
9333 > A
3999 2 0
3993 = 0
3939 39 0
3933 33 0
3399 32 <
3393 3; <
3339 3/ #
3333 34 5
+he ta.le shows in the figure: how the class of address can .e
computed.
#uestion "o: 5 ' 4ar)s: C *
List down and descri.e at least five characteristics of @outing
9nformation -rotocol.
@E3+9"L 9"AE@4%+9E" -@E+ECEL '@9-*:
9t has the following characteristics:
N9t is used for routing within an autonomous system '9L-*.
N2op Count 4etric: @9- measures distance in networ) hops: where
each networ)
Between the source and destination counts as a single hop.
N9t uses 3?- for all message transmissions.
N@9- is used over L%". Kersion of @9- uses hardware .roadcast
and version , allows
?elivery via multicast.
N9t can .e used to advertise default route propagation. %n
organi;ation can use @9- to
9nstall a default route in each router.
N9t uses distance vector algorithm.
N@9- allows hosts to listen passively and update its routing ta.le