CLICK HERE FOR VARIOUS NEW JOBS 
CLICK HERE FOR VARIOUS EDUCATIONAL NEWS 
CLICK HERE FOR NEW SCHOLARSHIPS 
CLICK HERE FOR ADMISSION NOTICES 
Click And Follow On Google+ To Get Updates
Please Wait 10 Seconds... OR You CanSkip

ADMISSION NOTICES
Scholarships

Scholarship-300x291

BUDGET 2014-15
budget_2014-2015
New Date Sheets
VU SOLVED ASSIGNMENTS
Recent Posts

Posts Tagged ‘VU CS610-’

VU CS610- Computer Network FinalTerm solved unsolved past papers Spring 2010

VU CS610- Computer Network FinalTerm Solved Unsolved Past Papers Spring 2010

Spring 2010

CS610- Computer Network

Dated:- 13-08-2010

Question No: 1      ( Marks: 1 ) – Please choose one

In Direct point to point communication adding the Nth computer requires———— new connections.
None of the given

N2

N-1

(N2 -N)/2

Question No: 2      ( Marks: 1 ) – Please choose one

In ————-, network occupies the smaller area like a room a floor or a building

LAN

WAN
MAN

None of the given

Question No: 3      ( Marks: 1 ) – Please choose one

The third field of the header consists of —— bit Ethernet frame type.
48

32

16

8

Question No: 4      ( Marks: 1 ) – Please choose one

The maximum size of an Ethernet segment is___________
250 meters

500 meters

700 meters ( may be I select )

None of the given

Question No: 5      ( Marks: 1 ) – Please choose one

The network with Throughput T and Delay D has a total ————— bits in transit at a time.
D + T

D – T

D X T

D / T

Question No: 6      ( Marks: 1 ) – Please choose one

___________ places the boundary between the first and second octets

Class A

Class B
Class C
Class D

Question No: 7      ( Marks: 1 ) – Please choose one

Router detects datagram ——— than network MTU and then it splits into pieces and each piece is ——
—-than outbound network MTU.

Larger, smaller

Larger, larger
Smaller, larger
Smaller, smaller

Question No: 8      ( Marks: 1 ) – Please choose one

 

Question No: 9      ( Marks: 1 ) – Please choose one

Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction &
operating system independent are the characteristics of ___________________
TCP

UDP

IP

None of the given

 

 

 

WWW.VUJUNGLE.COM

MNADEEM204@GMAIL.COM

Question No: 10      ( Marks: 1 ) – Please choose one

———– provide Application to application communication it also called end to end communication
IP

TP

RIP

None of the given

Question No: 11      ( Marks: 1 ) – Please choose one

A routing table contains_______

The destination network ID

The hop count to reach the network

The router ID of the next hop

All of the given

Question No: 12      ( Marks: 1 ) – Please choose one

Which of the following protocols allows the sender and receiver to enforce polices.
RIP

OSPF

BGP

RIP and OSPF

Question No: 13      ( Marks: 1 ) – Please choose one

__________measures distance in network hops, where each network between the source and destination counts as single hop.

BGP

OSPF

RIP

Non of these

Question No: 14      ( Marks: 1 ) – Please choose one

_______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted.

RIP

OSPF

BGP

None of the given

Question No: 15      ( Marks: 1 ) – Please choose one

One repeater —————, two repeaters ————— the maximum cable length limitation.

Double, triple

Double, 4 time
half, triple

Double, half

Question No: 16      ( Marks: 1 ) – Please choose one

ICMP message transport is acted upon by getting ICMP encrypted in IP.

True

False

Question No: 17      ( Marks: 1 ) – Please choose one

Like most application programs, a client and server use a transport protocol to communicate.

True

False

Question No: 18      ( Marks: 1 ) – Please choose one

Mapping between a protocol address and a hardware address is called Address Resolution.

True

False

Question No: 19      ( Marks: 1 ) – Please choose one

Address mask defines how many bits of address are in suffix?

True

False

Question No: 20      ( Marks: 1 ) – Please choose one

A single networking technology is best for all needs.

True

False

 

 

 

WWW.VUJUNGLE.COM

MNADEEM204@GMAIL.COM

Question No: 21      ( Marks: 1 ) – Please choose one

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.

False

True

Question No: 22      ( Marks: 1 ) – Please choose one

Router detects datagram———than network MTU

Larger

Smaller

None of given
Equal

Question No: 23      ( Marks: 1 ) – Please choose one

Information can flow in either or both direction between

Clients

Clients and servers

Servers

None of given

Question No: 24      ( Marks: 1 ) – Please choose one

On of the design goals for unicast route propagation is __________.

consistency
inconsistency

stability

dynamic addressing

Question No: 25      ( Marks: 1 ) – Please choose one

IPV6 address consists of ________

32 Bits
64 Bits

128 Bits

none of the given

Question No: 26      ( Marks: 1 ) – Please choose one

UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.

True

False

Question No: 27      ( Marks: 1 ) – Please choose one

In case TCP, retransmission, acknowledgment from a computer on LAN are expected to arrive within
Seconds

Micro seconds

Milliseconds( I think)

Nanoseconds

Question No: 28      ( Marks: 1 ) – Please choose one

Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.

True

False

Question No: 29      ( Marks: 1 ) – Please choose one

A network uses a ——arranges for computers to be connected in a closed loop.

Star Topology

Ring Topology

Bus Topology

None of the given

Question No: 30      ( Marks: 1 ) – Please choose one

Protocol addresses are abstractions provided by ___________.

hardware

software

operating system
internet

 

 

 

WWW.VUJUNGLE.COM

MNADEEM204@GMAIL.COM

Question No: 31      ( Marks: 2)

Does OSPF only share information within area or does it allow communication between areas? Solution

OSPF only share information within area

Question No: 32      ( Marks: 2 )

Define what is extension head in IPv6
Solution

Additional information is stored in optional extension headers, followed by data.

Question No: 33      ( Marks: 2 )

What is implementation of NAT?
Solution

NAT is useful at a residence with Cable Modem or DSL connectivity as it allows

the customer to have multiple computers at home without requiring an IP address for
each of them. Instead a single IP address is used for all the computers. NAT software
allows a PC to connect with the Internet and act as a NAT device at the same time.

Question No: 34      ( Marks: 2 )

Which wireless standard is used in WIFI technology? Solution

IEEE 802.11 is standard wireless LAN

Question No: 35      ( Marks: 2 )

How ICMP can be used to trace route?
Solution

 

 

Question No: 36      ( Marks: 3 )

Write a note on “limited connectivity” of Wireless LAN. Solution

 

 

Question No: 37      ( Marks: 3 )

In internet routing ho can a host join or leave group? Solution

 

 

 

Question No: 38      ( Marks: 3 )

Provide three characteristics of UDP?
Solution

• It is an end-to-end protocol. It provides application-to-application communication.

• It provides connectionless service.

• It is a Message-Oriented protocol.

• It uses best-effort delivery service.

• It follows arbitrary interaction.

• It is operating system independent

Question No: 39      ( Marks: 5 )

What is meant by massage oriented interface in UDP also give the advantages and disadvantages of interface

Solution

ADVANTAGES:

• Applications can depend on protocol to preserve data boundaries.

 

 

 

WWW.VUJUNGLE.COM

MNADEEM204@GMAIL.COM

DISADVANTAGES:

• Each UDP message must fit into a single IP datagram.

• It can result to an inefficient use of the underlying network

Question No: 40      ( Marks: 5 )

What is the role of OSPF?

 

VU CS610- Computer Network FinalTerm Solved Unsolved Past Papers Spring 2010

VU CS610- Computer Network FinalTerm solved unsolved past papers 2010

VU CS610- Computer Network FinalTerm Solved Unsolved Past Papers 2010

 

 

 

 

 

 

To solve the problem the routers and networks in the Internet are divided into groups. How large do you think are these groups?

 

 

Trace route continues to increment the Time To Live until the value is large enough for the datagram to reach its final destination. What happens when the TTL is sufficiently large for the datagram to reach its destination?

 

 

How can TCP monitor internet delays?

 

 

 

Which wireless standard is used in WIFI technology?

 

 

 

How does IP software reassemble fragments that arrive out of order?

 

 

 

What kind of information is in a routing table?

 

 

Define frames without type field?

What is the meaning of Facilities For Transit Routing as a characteristic of the Border Gateway Protocol?

 

 

What are the characteristics of the Border Gateway Protocol?

 

 

 

Describe how NAT can be useful for residence with cable modem or DSL?

 

 

 

In CRC there is no error if the remainder at the receiver is

 

Equal to the Remainder of the sender        Zero  Non Zero             The quotient at the sender

 

 

 

 

 

 

Router is __________ Device.

 

Layer one            Intelligent           Unintelligent                      None of above

 

 

The repeater works at _______ Layer of OSI model

 

Data Link layer  Physical layer                     Transport Layer Network Layer

 

 

Bridges are _________ Devices

 

Networking    Internetworking                  All of above        None of above

 

 

 

The address field of a frame in HDLC protocol contains the address of the ________ station.

 

 

PrimarySecondary                           Tertiary                Primary and secondary

 

 

 

WDM stands for

 

Wave Division Multiplexing                       Wrong Division Multiplexing

 

Well Division Multiplexing                            West Division Multiplexing

 

 

A traditional telephone line has a bandwidth of __________.

 

2000 Hz                 4000 Hz                 2000 MHz            4000 MHz

 

 

 

Time slots are dynamically allotted in _______________TDM technique.

 

FDM                      Asynchronous                   WDM                    Synchronous

 

 

 

A portion of the path that carries TX b/w a given pair of devices is known as __________.

 

Node                     Bridge                   Channel               Access Point

 

 

 

 

 

 

T Lines are ___________ lines designed for digital data

 

Analog                  Digital                   Composite          Telephone

 

 

Multiplexing has long been used as an essential tool in ______.

 

Electronic industry           Telephone industry        Space science   VLAN

 

Switched analog service is leased line.
True    False

 

 

If a T-1 carries 8000 frames, then data rate will be ___________

 

2.544 Mbps         1.544 Mbps         1.544 kbps           1.544 Gbps

 

 

Given a 10-bit sequence 1010011110 and a divisor of 1011, CRC will be

 

001         000         100         101

 

 

Asynchronous TDM is efficient only when the size of the time slot is kept relatively ________

 

Large   Small   Medium                   Zero

 

 

FTTC can be implemented in ______________.

 

Telephone system          Cable System   Telephone and Cable System  Non of the above

 

 

Europeans use a version of T-lines called _________

 

F-lines                   E-line                    D-lines                  S-lines

 

 

A prism can deflect the light depending upon the angle of ____________ and the frequency.

 

 

 

 

 

 

Deviation             Incident               Refraction           Reflection

 

 

Which error detection method can detect a single-bit error?

 

Simple parity check        Two-dimensional parity check   CRC         All of the given

 

 

Which of the following techniques takes data from one high speed line and breaks it into portions?

 

Inverse subtraction         Inverse addition               multiplexing                      inverse multiplexing

 

 

Telephone network is an example of a __________ network

 

Packet-switched              Circuit-switched               Message-switched          Tele-switched

 

 

FTTC stands for ___________

 

fiber to the center           fiber to the cable             fiber to the curb               flexible to the curb

 

 

 

Cable that connects the subscriber telephone to the nearest end office in a local loop is called

 

Twisted-pair cable          Coaxial cable                      Fiber-optic cable              Subscriber cable

 

In Synchronous TDM, Time slots are not same in number as input devices True    False

 

In Synchronous TDM, Time slots are not same in number as input devices. True    False

 

 

At the CRC checker, ________ means that the data unit is damaged

 

A string of 0s — A string of 1s –A string of alternating 1s and 0s -A nonzero-remainder

 

 

 

 

 

 

 

 

Which of the following best describes a single-bit error?

A single bit is inverted  A single bit is inverted per data unit
A single bit is inverted per transmission none of the given

 

 

Multiplexing is the set of techniques that allows simultaneous TX of multiple signals across a ___________ data link

 

Single                   Double                 Multi                     None of the given

 

 

 

If the ASCII character G is sent and the character D is received, what type of error is this?

 

Single-bit             Multiple-bit        Burst   Recoverable

 

 

Which error detection method involves polynomials?

 

Simple parity check         Two-dimensional parity check   CRC         Checksum

 

 

 

For point-to-point configuration, addressing is needed

 

True    False

 

 

 

Data link control is composed of ____________ important functions.

 

2              3              4              5

 

 

 

The checksum of 0000 and 0000 is __________

 

1111       0000       1110       0111

 

 

 

Question # 1 of 10 ( Start time: 09:46:21 PM )                                                                                        Total Marks: 1

 

 

 

_________ is used to attach two autonomous systems.
Select correct option:

 

 

BGP

 

 

IGP

 

EGP

 

 

none of the given

 

 

 

 

 

 

Question # 2 of 10 ( Start time: 09:47:49 PM )                                                                                        Total Marks: 1

The Border Gateway Protocol (BGP) uses_________ for all communication
Select correct option:

 

 

UDP

 

TCP

 

 

UDP and TCP

 

None of the given

 

 

 

 

 

 

Question # 3 of 10 ( Start time: 09:49:09 PM )                                                                                        Total Marks: 1

 

 

 

Routing inserts or changes values in _______
Select correct option:

 

 

MAC address

 

routing table

 

both (a) and (b)

 

 

None of the given

 

 

 

 

Question # 4 of 10 ( Start time: 09:50:37 PM )                                                                                        Total Marks: 1

___________ does not depend on any particular unicast routing protocol.
Select correct option:

 

 

PIM-DM

 

PIM-SM

 

PIM-AM

 

 

none of the given

 

 

 

 

 

 

 

 

Question # 5 of 10 ( Start time: 09:51:08 PM )                                                                                        Total Marks: 1

 

 

 

 

 

 

NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same
time.

 

Select correct option:

 

 

 

True

 

False

 

 

 

 

 

 

Question # 6 of 10 ( Start time: 09:51:42 PM )                                                                                        Total Marks: 1

Each autonomous system used to communicate among autonomous systems by chooses an IGP.
Select correct option:

 

True

 

False

 

 

 

 

Question # 7 of 10 ( Start time: 09:52:50 PM )                                                                                        Total Marks: 1

Which of the following protocols provide the routing information at the autonomous system level?
Select correct option:

 

 

BGP

 

 

OSPF

 

 

 

 

 

RIP

 

OSPF and RIP

 

 

 

 

Question # 8 of 10 ( Start time: 09:54:16 PM )                                                                                        Total Marks: 1

Which of the following protocols allows the sender and receiver to enforce polices.
Select correct option:

 

 

RIP

 

OSPF

 

BGP

 

BGP and RIP

 

 

 

 

Question # 9 of 10 ( Start time: 09:55:47 PM )                                                                                        Total Marks: 1

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.

 

Select correct option:

 

 

True

 

 

False

 

 

 

 

 

 

 

Question # 10 of 10 ( Start time: 09:56:52 PM )                                                                                     Total Marks: 1

The computer uses _________ to inform Local router about the last application when it leaves.
Select correct option:

 

 

ICMP

 

IGMP

 

 

SNMP

 

None of the given

 

 

 

 

 

 

 

Question # 1 of 10 ( Start time: 05:14:11 PM )                                                                                                         Total Marks: 1

 

We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

 

VU CS610- Computer Network FinalTerm Solved Unsolved Past Papers 2010

VU CS610- Computer Network FinalTerm solved unsolved past papers 2010

VU CS610- Computer Network FinalTerm Solved Unsolved Past Papers 2010

 

CS610-COMPUTER NETWORK

 

A popular LAN Technology that uses a shared Bus Topology is called.

WAN

CSMA

Ethernet

Multicast

 

An electronic device that connects LAN segments

Ethernet

10Baset

Bridge

10Base5

A form of addressing; in which a set of computers is assigned one address.

 

Broadcast

Multicast

Packet Switch
CRC

Bandwidth

 

A network technology that uses Collision Avoidance

 

Bridge

Broadcast
WAN

Wireless LAN

Formal name for Thick Ethernet..

 

TDM

Bandwidth

Network Analyzer

Broadcast

________ has a jitter zero

 

► None of the given

►          Virtual Private Network
► Isochronous Network
► Asynchronous Network

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______.

 

 

oriented service paradigm

 

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.

-bit
-bit
-bit

-bit

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________

 

 

 

 

 

The next hop to which a packet is sent depends only on

 

 

 

An interface for twisted pair Ethernet must have a ____________ connector, and must generate signals according to the_____________ specification.

 

T

 

 

 

When an application___________ data, it makes a copy of the data available to all other computers on the network.

 

 

 

 

 

____________ provide a mechanism that a customer can use to set a physical address.

 

c addressing scheme

 

 

 

FDDI can transmits data at a rate of ___________________

d

 

 

 

 

Computers attached to an ether use —— in which a computer waits for the ether to be idle before transmitting a frame.

 

 

 

 

 

 

________________ has advantages arisen from the size and ease of computation.

 

 

 

 

 

The term ___________ is used to denote the definition of a packet used with a specific type of network.

 

 

 

 

 

______________ has no way to determine the cause of the problem.

 

 

 

 

 

_____________ Program sends a message to a remote computer and reports whether the computer responds.

 

 

____________, network occupies the smaller area like a room a floor or a building.

 

 

 

 

 

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

False

True

A typical port on an ATM switch operates at __________ or higher.

 

► OC-2 speed (155Mbps)

► OC-3 speed (100Mbps)
► OC-3 speed (155Mbps)
► OC-3 speed (155Gbps)

The product of delay and throughput measures the _____ of data that can be present on the network.

► Area

► Volume
► Length

►          None of the given

 

__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

 

 

 

 

 

 

Which of the following is a connecting device?

 

 

 

 

 

A bridges function in the _________ layers(s).

 

 

 

) and Data link

 

IEEE LLC/SNAP header is ——–, which is used to specify the type of data.

 

 

 

 

 

The third field of the header consists of —— bit Ethernet frame type.

 

 

 

 

 

An ————method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

pe

 

e

 

 

Local Talk is a LAN technology that employs _____________

 

 

y

iven

The Fast Ethernet hardware operates at a rate of _______________

 

 

 

given

 

___________scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

 

 

 

en

 

Computer networks are often called ————– because they use packet technology.

 

 

 

 

 

_____________Program sends a message to a remote computer and reports whether the computer responds.

 

 

 

 

 

In ______________ network occupies larger areas like cities & countries.

 

 

 

 

 

 

In ————-, network occupies the smaller area like a room a floor or a building.

 

 

 

 

 

 

In Point-to-Point topology there are two topologies.

 

g

 

iven

 

Computer networks are often called ————– because they use packet technology.

► Ethernet

►          Switch networks
► Packet networks
► None of the given

 

A network uses a ——arranges for computers to be connected in a closed loop.

► Star Topology

►          Ring Topology
► Bus Topology
► None of the given

 

 

 

An ————method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

 

►          Explicit frame type

► Ideal frame type

► Implicit frame type
► None of the given

 

An interface for thin Ethernet must have a ____________ connector, and must generate signals according to the_____________ specification.

►          RJ-45, 10 Base T

► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T

 

A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________

 

► Layer 2 source address

►          Source node’s physical address
► Layer 2 destination address
► Layer 3 destination address

 

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________

► Hierarchal address

►          Default route
► Shortest path
► None of the given

________ of TCP/IP layering model corresponds to basic network hardware.

 

► Physical Layer

►          Network Interface Layer
► Internet Layer

► Transport Layer

 

_______ Protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer

► Network Interface Layer
► Internet Layer

► Transport Layer

 

________is called an end-to-end protocol because it provides a connection directly from an application on one computer to an application on a remote computer.

 

► IP

► UDP
► TCP

► None of the given

____________uses distance vector approach to define routing

► BGP

► OSPF
► RIP

► None of the given

 

_______      is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

► Flood-and -Prune

► Configuration-and -Tunneling
► Core-Based Discovery
► None of the given

 

 

 

Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source address

 

► 3

► 2
► 1
► 0

Protocol addresses are abstractions provided by ___________.

 

► Hardware

► Software

► Operating system
► Internet

 

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

► True

► False

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

 

► 32, 48

► 24, 32
► 32, 64
► 32, 128

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed
multiple screens, keyboards and computers.

 

► False

► True

 

In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were “T” stands for Table lookup, “C” for Closed-form Computation and “D” for Data
Exchange?

 

► T

► D
► C

► T, C

The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.

 

► True

► False

To save traffic, an EGP does not summarize routing information from the autonomous system before passing it to another autonomous system.

 

► True

► False

Which of the following is a correct representation of the IPv6?

 

►          105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255

► 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255

► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256 ► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255

 

 

 

A ________relies on the hardware manufacturer to assign a unique physical address to each network interface is called.

 

 

► Static addressing scheme

► Configurable addressing scheme
► Dynamic addressing scheme
► None of the given

A system with redundant bridges might have a problem with_______ in the system.

► Loop

►          Filters

► Spanning Trees
► All given choices

A Bridge can________

 

► Filter a frame

► Forward a frame
► Extend a LAN
► Do all the above

________ is used for typical data applications (where the data rate may be unknown and bursty) and allows use of whatever bandwidth is available at a given time.

► Constant Bit Rate (CBR) service

► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.

 

► 21-bit

► 22-bit
► 23-bit
► 24-bit

________ of TCP/IP layering model corresponds to basic network hardware.

 

► Physical Layer

► Network Interface Layer
► Internet Layer

► Transport Layer

___________ places the boundary between the second and third octets

 

► Class A

► Class B
► Class C
► Class D

UDP and TCP are both_________ layer protocols

► Physical

► Data link
► Network
► Transport

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided
by__________

► IP

► None of the given
► TCP

► UDP

_______protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer

► Network Interface Layer
► Internet Layer

► Transport Layer

 

 

 

________identifies which application program on receiving computer should receive the data

 

Destination port

Source port

Logical address
None of the given

________ identifies the application program that sent the data.

► Destination Port

► Source port

► Logical address
► None of the given

 

Which of the following are interior routing protocols?

► RIP

► OSPF
► BGP

► RIP and OSPF

The Border Gateway Protocol (BGP) uses_________ for all communication

 

► UDP

► TCP

► Both UDP and TCP
► None of the given

__________measures distance in network hops, where each network between the source and destination counts as single hop.

► BGP

► OSPF
► RIP

► None of the given

 

OSPF is based on——–

► Distance vector routing
► Link state routing
► Path vector routing

► Distance vector routing and Link state routing

 

_________ performs local multicast and uses IP-in-IP encapsulation to send multicast datagram’s from one site on the Internet to another.

 

► Distance Vector Multicast Routing Protocol (DVMRP) ► Core Based Trees (CBT)

► Protocol Independent Multicast_ Sparse Mode (PIM-SM)
► Protocol Independent Multicast _ Dense Mode (PIM-DM)

 

The length of time required to send a variable length packet is variable and does not require a complicated interrupt scheme to detect completion of transmission.

► True

► False

 

NEXT HEADER field in the base header defines type of header and it appears at end of fixed-size base header.

 

► True
► False

 

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

 

► True

► False

 

 

Address mask defines how many bits of address are in suffix?

 

► True

► False

 

A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?

 

 

► True

► False

 

The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.

 

► itsel

► prefix
► suffix
► mask

 

In which method of Address Resolution Protocol the protocol address independent of hardware address?

 

Were “T” stands for Table lookup, “C” for Closed-form Computation and “D” for Data Exchange?

 

► T, C

► D

► C

► T, D

 

Reconstruction of original datagram is called reassembly.

 

► True

► False

A computer needs a complete stack of protocols to run either a client or a server.

 

► True

► False

TCP uses _______ mechanism to control the flow of data.

 

► Door

► Window

► Acknowledgment
► Retransmission

Select correct option:    3

 

routing path

 

 

 

 

routing metric

 

 

 

 

 

routing

 

 

 

 

switching

 

 

 

 

Question # 2 of 10 ( Start time: 05:15:44 PM )                                                                                                                                         Total Marks: 1

_________ is a current version of BGP.

Select correct option:   3

 

 

 

2

 

 

 

 

 

3

 

 

 

 

 

4

 

 

 

 

none of the given

 

 

 

 

 

 

Question # 4 of 10 ( Start time: 05:17:18 PM )                                                                                                                                       Total Marks: 1

OSPF is based on——–

Select correct option:    2

 

Distance vector routing

 

 

 

 

Link state routing

 

 

 

 

 

Path vector routing

 

 

 

 

 

Distance vector routing and Link state routing

 

 

 

 

 

5 . OSPF is based

Question # 6 of 10 ( Start time: 05:19:14 PM )                                                                                                                                         Total Marks: 1

NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.

Select correct option: F

 

True

 

 

 

 

False

 

 

 

 

Question # 7 of 10 ( Start time: 05:20:05 PM )                                                                                                                                         Total Marks: 1

In _______ routing, the table is initialized when system boots and there is no further changes.

Select correct option:     2

Dynamic

 

 

 

 

 

Static

 

 

 

 

 

Both (a) and (b)

 

 

 

None of the given

 

 

 

 

Question # 8 of 10 ( Start time: 05:20:56 PM )                                                                                                                                         Total Marks: 1

OSPF does’nt allows a router to introduce routes learned from another means.

Select correct option:  F

 

True

 

 

 

 

 

False

 

 

 

 

Question # 9 of 10 ( Start time: 05:21:44 PM )                                                                                                                                         Total Marks: 1

Twice NAT fails if an application uses the IP addresses instead of Domain Name.

Select correct option:  T

 

True

 

 

 

 

 

False

 

 

 

 

Question # 10 of 10 ( Start time: 05:22:38 PM )                                                                                                                                       Total Marks: 1

A one-to-many communication between a source and a specific group of hosts is classified as a_______ communication.

Select correct option:  3

 

Unicast

 

 

 

 

 

Multicast

 

 

 

 

Broadcast

 

 

 

 

 

Unicast & Multicast

 

 

 

 

Question # 1 of 10 ( Start time: 05:25:34 PM )                                                                                                                                         Total Marks: 1

________ identifies the application program that sent the data.

Select correct option:    1

 

Destination Port

 

 

 

 

 

Source port

 

 

 

 

Logical address

 

 

 

None of the given

 

 

 

 

Question # 2 of 10 ( Start time: 05:26:21 PM )                                                                                                                                         Total Marks: 1

Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.

Select correct option: T

 

False

 

 

 

 

 

True

 

 

 

 

Question # 3 of 10 ( Start time: 05:27:12 PM )                                                                                                                                         Total Marks: 1

Which of the following protocols allows the sender and receiver to enforce polices.

Select correct option:     3

RIP

 

 

 

 

 

OSPF

 

 

 

 

BGP

 

 

 

 

 

BGP and RIP

 

 

 

 

Question # 4 of 10 ( Start time: 05:28:45 PM )                                                                                                                                         Total Marks: 1

OSPF includes ________ address mask with each address.

Select correct option:  2

 

30Bit

 

 

 

 

32Bit

 

 

 

 

 

34Bit

 

 

 

 

none of the given

 

 

 

 

Question # 5 of 10 ( Start time: 05:29:03 PM )                                                                                                                                         Total Marks: 1

Twice NAT allows a site to run servers.

Select correct option:   T

 

True

 

 

 

False

 

 

 

 

Question # 6 of 10 ( Start time: 05:29:58 PM )                                                                                                                                         Total Marks: 1

OSPF has designed as an Exterior Gateway Protocol used to pass routing information among routers within an autonomous system.

Select correct option:   F

 

True

 

 

 

 

 

False

 

 

 

 

Question # 7 of 10 ( Start time: 05:30:50 PM )                                                                                                                                         Total Marks: 1

In _______ routing, the table is initialized when system boots and there is no further changes.

Select correct option:     2

 

Dynamic

 

 

 

 

 

Static

 

 

 

 

Both (a) and (b)

 

 

 

 

 

None of the given

 

 

 

 

Question # 8 of 10 ( Start time: 05:31:28 PM )                                                                                                                                         Total Marks: 1

In IP routing, forwarding refers to ______ transfer.

Select correct option:     2

packet

 

 

 

 

 

datagram

 

 

 

 

message

 

 

 

 

 

None of the given

 

 

 

 

Question # 9 of 10 ( Start time: 05:32:20 PM )                                                                                                                                         Total Marks: 1

It allows ________ computer(s) to share _______ IP address(s).

Select correct option:     2

multiple , multiple

 

 

 

 

 

 

 

Question # 1 of 10 ( Start time: 04:33:55 PM )

________ encapsulates IP datagram as data area in hardware frame.

Select correct option:

Network Interface Layer

 

Datalink Layer

 

Network Layer

 

None of the given

 

multiple , single

 

 

 

 

single , single

 

 

 

 

 

None of the given

 

 

 

 

Question # 10 of 10 ( Start time: 05:33:35 PM )                                                                                                                                       Total Marks: 1

Network Address Translation (NAT) requires device to perform packet translation.

Select correct option:   T

 

True

 

 

 

 

 

False

 

 

CS610-Computer network

 

Question # 2 of 10 ( Start time: 04:35:26 PM )                                                                                                                                         Total Marks: 1

________ field is used to identify a specific path through the network

Select correct option:

FLOW LABEL

 

TRAFFIC CLASS

Both a and b

 

none of the given

 

Question # 3 of 10 ( Start time: 04:36:51 PM )                                                                                                                                         Total Marks: 1

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.

Select correct option:

96

 

100

 

120

 

none of the given

 

Question # 4 of 10 ( Start time: 04:38:19 PM )                                                                                                                                         Total Marks: 1

 

 

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.

Answer(48bit)

Select correct option:

 

 

Question # 5 of 10 ( Start time: 04:39:45 PM )                                                                                                                                         Total Marks: 1

For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.

Select correct option:

Efficiency

 

Security

Accuracy
Anomalies

 

 

Question # 6 of 10 ( Start time: 04:41:15 PM )                                                                                                                                         Total Marks: 1

_______ is a technique used to Limit datagram size to small MTU of any network

Select correct option:

 

Segmentation

Fragmentation

 

Encapsulation

 

none of the given

 

 

Question # 7 of 10 ( Start time: 04:42:37 PM )                                                                                                                                         Total Marks: 1

Class A mask is 255.0.0.0 which is used for ______

Select correct option:

 

Unicasting

 

Multicasting

Subnetting

 

All of the given

 

 

Question # 8 of 10 ( Start time: 04:44:08 PM )                                                                                                                                         Total Marks: 1

When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.

Select correct option:

 

True

False

 

 

Question # 9 of 10 ( Start time: 04:45:12 PM )                                                                                                                                         Total Marks: 1

Which one of these is not a main feature of connectionless service:

Select correct option:

 

It includes extension of LAN abstraction.

It has universal addressing and the data is delivered in packets frames), each with a header. It combines collection of physical networks into a single virtual network.

It has universal addressing and the data is delivered in packets frames), without a header.

 

 

 

Question # 10 of 10 ( Start time: 04:46:42 PM )                                                                                                                                       Total Marks: 1

 

 

Which protocol is used to test different tools.

Select correct option:

ICMP

 

IGMP

 

TCP/IP

 

none of the given

 

Question # 1 of 10 ( Start time: 04:49:54 PM )                                                                                                                                         Total Marks: 1

________ message is sent in response to incoming datagrams with problems.

Select correct option:

 

TCP/IP

 

IGMP

ICMP

 

none of the given

 

 

Question # 2 of 10 ( Start time: 04:50:45 PM )                                                                                                                                         Total Marks: 1

Which one is NOT the function of ping program

Select correct option:

Traceability

 

Reach ability

 

Both a and b

 

None of the given

 

Question # 3 of 10 ( Start time: 04:52:14 PM )                                                                                                                                         Total Marks: 1

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.

Select correct option:

96

100
120

 

none of the given

 

Question # 4 of 10 ( Start time: 04:52:32 PM )                                                                                                                                         Total Marks: 1

A datagram cannot be larger than ________ of a network over which it is sent.

Select correct option:

MTU

 

Size

 

IP header

 

None of the given

 

 

Question # 5 of 10 ( Start time: 04:52:55 PM )                                                                                                                                         Total Marks: 1

The Source can configure outgoing datagram’s to avoid _________

Select correct option:

 

Segmentation

 

Defragmentation

Fragmentation

 

None of the given

 

 

Question # 6 of 10 ( Start time: 04:54:24 PM )                                                                                                                                         Total Marks: 1

Which one of these is not a main feature of connectionless service:

Select correct option:

 

It includes extension of LAN abstraction.

It has universal addressing and the data is delivered in packets frames), each with a header. It combines collection of physical networks into a single virtual network.

It has universal addressing and the data is delivered in packets frames), without a header.

Question # 7 of 10 ( Start time: 04:55:27 PM )                                                                                                                                         Total Marks: 1

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.

Select correct option:

 

Least

Maximum

 

Fragment

 

Frame

 

Question # 8 of 10 ( Start time: 04:56:40 PM )                                                                                                                                         Total Marks: 1

_____ Protocol provides error reporting mechanism.

Select correct option:

 

IGMP

 

SNMP

ICMP

 

none of the given

 

Question # 9 of 10 ( Start time: 04:57:51 PM )                                                                                                                                         Total Marks: 1

_______ Source is responsible for fragmentation.

Select correct option:

 

IPV4

IPV6

Question # 10 of 10 ( Start time: 04:58:56 PM )                                                                                                                                       Total Marks: 1

MTU Stands for _______

Select correct option:

 

Mininum transmission unit

Maximum transmission unit

 

Multicast transmission unit

 

None of the given

 

TTL stands for __________

Time to Learn

Time to Leave
Time to Live

none of the given

H.LEN shows the header length in units of ____ Bits

 

34

32

30

None of the given

 

 

 

There are _______ possibilities to detect the destination using Trace-route

 

1

2

3

None of the given

_______ Source is responsible for fragmentation.

IPV4

IPV6

________ encapsulates IP datagram as data area in hardware frame.

 

Network Interface Layer

Data link Layer

Network Layer
none of the given

 

IPV6 address consists of ________

 

32 Bits

64 Bits

128 Bits

none of the given

_______ shows senders preference for low latency, high Reliability.

:

TYPE

SERVICE TYPE

SERVICE PRIORITY
None of the given

 

 

Class A mask is 255.0.0.0 which is used for ______

 

Unicasting

Multicasting

Subnetting

All of the given

_____ Protocol provides error reporting mechanism.

 

IGMP

SNMP

ICMP

none of the given

ICMP message transport is acted upon by getting ICMP _________ in IP.

De-encapsulated

Encapsulated

Segmented

none of the given

 

Which protocol is used to test different tools.

 

ICMP

IGMP
TCP/IP

none of the given

 

When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.

 

 

True

False

 

Preliminary version of IP was called _________.

IP – New Generation (IPng)

IP – Next Generation (IPng)

IP – Net Generation (IPng)
None of the given

 

Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included:

 

Destination address

Source address

Rectifier

Other delivery information

_______ Source is responsible for fragmentation.

IPV4

IPV6

 

______ layer Provides reliable delivery of datagram.

 

Network

Transport

Data link

none of the given

 

Which one of these is not a main feature of connectionless service:

 

It includes extension of LAN abstraction.

It has universal addressing and the data is delivered in packets frames), each with a header. It combines collection of physical networks into a single virtual network.

It has universal addressing and the data is delivered in packets frames), without a header.

 

 

The process of learning the path MTU is known as path MTU discovery.

 

True

False

 

IPv6 ______________ is responsible for fragmentation. Routers simply drop datagram’s larger than network

Destination

Intermediate routers

Source

Medium

IP datagram can contains ________ octets.

0-65,535

1-65,535

1-65,536

none of the given

 

 

_______ shows senders preference for low latency, high Reliability.

 

TYPE

SERVICE TYPE

 

 

SERVICE PRIORITY
None of the given

 

Computer networks are often called ————– because they use packet technology.
► Ethernet

► Switch networks
► Packet networks
► None of the given

 

A network uses a ——arranges for computers to be connected in a closed loop.

 

► Star Topology

► Ring Topology
► Bus Topology
► None of the given

 

 

 

An ————method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

► Explicit frame type

► Ideal frame type

► Implicit frame type
► None of the given

 

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________

► Hierarchal address

► Default route

► Shortest path

► None of the given

 

________ of TCP/IP layering model corresponds to basic network hardware.

► Physical Layer

► Network Interface Layer
► Internet Layer

► Transport Layer

_______Protocols of TCP/IP layering model specify how to ensure reliable transfer.

 

► Physical Layer

► Network Interface Layer
► Internet Layer

► Transport Layer

 

 

 

________is called an end-to-end protocol because it provides a connection directly from an application on one computer to an application on a remote computer.

 

► IP

► UDP
► TCP

► None of the given

____________uses distance vector approach to define routing

► BGP

► OSPF
► RIP

► None of the given

 

 

_______      is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

 

 

► Flood-and -Prune

► Configuration-and -Tunneling
► Core-Based Discovery
► None of the given

Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source address

► 3

► 2
► 1
► 0

Protocol addresses are abstractions provided by ___________.

► Hardware

► Software

► Operating system
► Internet

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

 

► True

► False

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

 

► 32, 48

► 24, 32
► 32, 64
► 32, 128

To save traffic, an EGP does not summarize routing information from the autonomous system before passing it to another autonomous system.

 

► True

► False

When an application_______data, it makes a copy of the data available to all other computers on the network.

 

► Broadcasting
► Multicasting
► Unicasting

► None of the given

 

Ethernet uses a _________ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.

► 64

► 48
► 32
► 8

The product of delay and throughput measures the _____ of data that can be present on the network.

 

► Area

► Volume
► Length

► None of the give

 

Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary interaction and operating system independent are the characteristics of _____________

► TCP

 

 

► UDP
► IP

► None of the given

 

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided
by__________

 

► None of the given
► TCP

► UDP
► IP

The process of using a routing table to select a next hop for a given datagram is called_________

► Encapsulation

► Reassembling

► Routing or forwarding
► None of the given

____________uses distance vector approach to define routing

► BGP

► OSPF
► RIP

► None of the given

A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called__________

 

► Distance Vector Multicast Routing Protocol (DVMRP) ► Core Based Trees (CBT)

► Protocol Independent Multicast_ Sparse Mode (PIM-SM)
► Protocol Independent Multicast _ Dense Mode (PIM-DM)

 

One repeater _______two repeaters ________ the maximum cable length limitation.

► doubles, cancel

► doubles, triple

► square roots, cude roots
► and, triple

 

Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.

 

► postfix, Infix
► non of these
► Infix, prefix
► prefix, suffix

 

End-to-end delivery service is connection oriented.

 

► True

► False

A single networking technology is best for all needs.

 

► True

► False

 

We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

 

► routing path
► routing metric
► routing

► switching

 

 

 

VU CS610- Computer Network FinalTerm Solved Unsolved Past Papers 2010

ALL NEW RESULTS
Educational News

Updated Educational News

Categories
POSTS BY DATE
December 2016
M T W T F S S
« Sep    
 1234
567891011
12131415161718
19202122232425
262728293031