Sponsored Links


Results 1 to 3 of 3

Thread: CS610 Computer Network Paper May 2010

  1. #1
    Senior Member viki's Avatar
    Join Date
    May 2010
    Posts
    2,132
    :o:o--------------------------------------------------------------------------------------:o:o
    [B]The more knowledge you have, the greater will be your fear of Allah.[/B]

    Please Join My [B]Group Vuhelp[/B][B], Birthday Wishing, Daily Hadees[/B] [CODE][B]http://vuhelp.net/groups/vuhelp.html[/B]
    [B]http://vuhelp.net/groups/birthday-wishing.html[/B]
    [B]http://vuhelp.net/groups/daily-hadees.html[/B][/CODE]
    [CENTER][B][COLOR="Red"][SIZE="4"]Email: [email]viki@vuhelp.net[/email][/SIZE][/COLOR][/B][/CENTER]

  2. #2
    Senior Member viki's Avatar
    Join Date
    May 2010
    Posts
    2,132

    Icon2 CS610 Spring 2010

    MIDTERM EXAMINATION
    Spring 2010
    CS610- Computer Network
    Ref No: 1143600
    Time: 60 min
    Marks: 40



    Question No: 1 ( Marks: 1 ) - Please choose one
    In Point-to-Point topology there are two topologies.


    ► Star and Tree
    ► Tree and Ring
    ► Star and Ring
    ► Star and Tree
    ► None of the given



    Question No: 2 ( Marks: 1 ) - Please choose one
    ------ Program sends a message to a remote computer and reports whether the computer responds.


    ► Ping
    ► Ping
    ► Traceroute
    ► ICMP
    ► Non of the given



    Question No: 3 ( Marks: 1 ) - Please choose one
    ------ has no way to determine the cause of the problem.



    ► ICMP
    ► ICMP
    ► Non of the given
    ► Ping
    ► Trace route



    Question No: 4 ( Marks: 1 ) - Please choose one
    The term----- ------- refers to the general concept of a small block of data


    ► Packet
    ► Packet
    ► Frame
    ► Data
    ► None of the given



    Question No: 5 ( Marks: 1 ) - Please choose one
    ---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character


    ► Parity
    ► Parity
    ► Checksums
    ► CRC
    ► None of given



    Question No: 6 ( Marks: 1 ) - Please choose one
    Local Talk is a LAN technology that employs -------------



    ► Bus topology
    ► Bus topology
    ► Ring topology
    ► None of the given
    ► Star topology



    Question No: 7 ( Marks: 1 ) - Please choose one
    Most LANs that employ ring topology use an access mechanism known as-------



    ► TOKEN PASSING
    ► CSMA/CD
    ► CSMA/CA
    ► TOKEN PASSING
    ► None of the given



    Question No: 8 ( Marks: 1 ) - Please choose one
    Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.



    ► 64
    ► 64
    ► 48
    ► 32
    ► 8



    Question No: 9 ( Marks: 1 ) - Please choose one
    Formally named __________ informally known as the thick wire Ethernet or Thick net.


    ► 10 Base T
    ► 10 Base 2
    ► 10 Base 5
    ► 10 Base T
    ► None of the given




    Question No: 10 ( Marks: 1 ) - Please choose one
    Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.


    ► 10 Base 2
    ► 10 Base 2
    ► 10 Base 5
    ► 10 Base T
    ► None of the given



    Question No: 11 ( Marks: 1 ) - Please choose one
    The maximum size of an Ethernet segment is___________


    ► 500 meters
    ► 250 meters
    ► 500 meters
    ► 700 meters
    ► None of the given


    Question No: 12 ( Marks: 1 ) - Please choose one
    A Bridge can ________



    ► Do all the above
    ► Filter a frame
    ► Forward a frame
    ► Extend a LAN
    ► Do all the above



    Question No: 13 ( Marks: 1 ) - Please choose one
    _______ computes shortest paths in a graph by using weights on edges as a measure of distance.


    ► Dijksta’s algorithm
    ► Greedy algorithm
    ► Distance vector algorithm
    ► Dijksta’s algorithm
    ► Non of the given



    Question No: 14 ( Marks: 1 ) - Please choose one
    __________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.


    ► Constant Bit Rate (CBR) service
    ► Constant Bit Rate (CBR) service
    ► Variable Bit Rate (VBR) service
    ► Available Bit Rate (ABR) service
    ► None of the given




    Question No: 15 ( Marks: 1 ) - Please choose one
    Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.



    ► Connection-oriented service paradigm
    ► Connectionless service paradigm
    ► Connection-oriented service paradigm
    ► Both Connectionless and Connection-oriented service paradigm
    ► None of the given



    Question No: 16 ( Marks: 1 ) - Please choose one
    The product of delay and throughput measures the _____ of data that can be present on the network.



    ► None of the given
    ► Area
    ► Volume
    ► Length
    ► None of the given




    Question No: 17 ( Marks: 1 ) - Please choose one
    A network with throughput T and delay D has a total of ________ bit in transit at any time.



    ► T x D
    ► T / D
    ► T x D
    ► T + D
    ► None of the given




    Question No: 18 ( Marks: 1 ) - Please choose one
    One repeater _______, two repeaters ________ the maximum cable length limitation.


    ► doubles, triple
    ► doubles, triple
    ► square roots, cude roots
    ► and, triple
    ► doubles, cancel



    Question No: 19 ( Marks: 1 ) - Please choose one
    A network uses a ------ if all computers attach to a central point



    ► Star Topology
    ► Star Topology
    ► Ring Topology
    ► Bus Topology
    ► None of the given



    Question No: 20 ( Marks: 1 ) - Please choose one
    Computers attached to an ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.



    ► TOKEN PASSING
    ► CSMA/CD
    ► CSMA/CA
    ► TOKEN PASSING
    ► None of the given



    Question No: 21 ( Marks: 2 )
    What is the difference between LAN and WAN?


    Local area network (LAN)
    LAN is small in size covers the area within a room, building or cities.
    Wide area network (WAN)
    WAN is large in size and covers the area cities, countries and continents.

    Question No: 22 ( Marks: 2 )
    Define the term Jitter.

    The term Jitter is used for variance in transmission delays. Jitter is significance for voice, video and data. Jitter can occur when a packet is delayed because the network is busy.

    Question No: 23 ( Marks: 3 )
    GIve a comparision of wiring Schemes.
    Thick Ethernet wiring scheme.

    This uses thick coax cable. AUI cable or transceiver or drop cable connects from NIC to transceiver. AUI cable carries digital signal from NIC to transceiver. The transceiver generates analog signal on coax cable. The wires in AUI carry digital signals power and other control signals. Thick Ethernet also requires terminators to avoid signal reflectance.

    Thin Ethernet wiring scheme.

    Thin Ethernet uses thin coax cable that is cheaper and easier to install than thick Ethernet coax. In thin ethernet wiring scheme transceiver electronics are built into NIC and NIC connect directly to network medium. Coax cable use connector on NIC. Coax runs directly to back of each connected computer by T-connector. The T-connector directly attaches to NIC.

    Question No: 24 ( Marks: 3 )
    How can Switched Virtual Network be established?


    Most networks offer dynamic connections that last for a relatively short time. ATM can dynamically establish a switched virtual circuit SVC that allows it as long as necessary and then terminate it. The computer sends a connection request to the switch to which it is attached. Software in the switch finds a path to the destination and sends with the connection request. Each pair of switches in the path communicates to choose a VPI/VCI for their tables. Once the connection is established by the destination than a message is given back to the originating computer to indicate the SVC is ready.


    Question No: 25 ( Marks: 5 )
    Describe permanent virtual circuits (PVC).


    ATM can provide the virtual circuits that look like traditional leased digital circuits. The permanent virtual circuits PVC works as long as the customer pays the periodic fee for its use. The forwarding table enter configured the terms used by Telco Provisioning requires two steps.
    To determine a complete path.
    :o:o--------------------------------------------------------------------------------------:o:o
    [B]The more knowledge you have, the greater will be your fear of Allah.[/B]

    Please Join My [B]Group Vuhelp[/B][B], Birthday Wishing, Daily Hadees[/B] [CODE][B]http://vuhelp.net/groups/vuhelp.html[/B]
    [B]http://vuhelp.net/groups/birthday-wishing.html[/B]
    [B]http://vuhelp.net/groups/daily-hadees.html[/B][/CODE]
    [CENTER][B][COLOR="Red"][SIZE="4"]Email: [email]viki@vuhelp.net[/email][/SIZE][/COLOR][/B][/CENTER]

  3. #3
    Senior Member viki's Avatar
    Join Date
    May 2010
    Posts
    2,132

    CS610 OPKST Midterm Spring 2010 June

    Question No: 1 ( Marks: 1 ) - Please choose one


    No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

    ► True

    ► False



    Question No: 2 ( Marks: 1 ) - Please choose one


    ------ Program sends a message to a remote computer and reports whether the computer responds.

    ► Ping
    Ping

    ► Traceroute

    ► ICMP

    ► Non of the given



    Question No: 3 ( Marks: 1 ) - Please choose one


    ---------- was especially concerned about the lack of high powered computers.

    ► ARPA

    ► IEEE

    ► EIA

    ► Non of the given



    Question No: 4 ( Marks: 1 ) - Please choose one


    The term -------- is used to denote the definition of a packet used with a specific type of network.


    ► Packet


    ► Frame


    ► Data


    ► None of the given



    Question No: 5 ( Marks: 1 ) - Please choose one


    Computer networks are often called -------------- because they use packet technology.

    ► Ethernet


    ► Switch networks


    ► Packet networks


    ► None of the given



    Question No: 6 ( Marks: 1 ) - Please choose one


    -------------- have advantages arisen from the size and ease of computation.

    ► CRC

    ► Parity

    ► Checksums


    ► None of given



    Question No: 7 ( Marks: 1 ) - Please choose one


    Most LANs that employ ring topology use an access mechanism known as-------


    ► CSMA/CD

    ► CSMA/CA

    ► TOKEN PASSING


    ► None of the given



    Question No: 8 ( Marks: 1 ) - Please choose one


    IEEE LLC/SNAP header is --------, which is used to specify the type of data.

    ► 8 octets

    ► 8 bytes

    ► 8 bits

    ► None of the given



    Question No: 9 ( Marks: 1 ) - Please choose one


    Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

    ► 10 Base 2

    ► 10 Base 5

    ► 10 Base T

    ► None of the given



    Question No: 10 ( Marks: 1 ) - Please choose one


    An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.

    ► RJ-45, 10 Base T

    ► RJ-45, 10 Base 5

    ► BNC, 10 Base 2


    ► BNC, 10 Base T



    Question No: 11 ( Marks: 1 ) - Please choose one


    A bridges function in the _________ layers(s).

    ► Physical (MAC)

    ► Data link

    ► Network

    ► Physical (MAC) and Data link



    Question No: 12 ( Marks: 1 ) - Please choose one


    A Bridge can ________


    ► Filter a frame

    ► Forward a frame

    ► Extend a LAN

    ► Do all the above



    Question No: 13 ( Marks: 1 ) - Please choose one


    A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________

    ► Layer 2 source address

    ► Source node’s physical address

    ► Layer 2 destination address

    ► Layer 3 destination address



    Question No: 14 ( Marks: 1 ) - Please choose one


    ________ computes shortest paths in a graph by using weights on edges as a measure of distance.

    ► Greedy algorithm

    ► Distance vector algorithm

    ► Dijksta’s algorithm

    ► Non of the given



    Question No: 15 ( Marks: 1 ) - Please choose one


    ___________ is used for audio and video, since these have predefined maximum data rates

    ► Constant Bit Rate (CBR) service

    ► Variable Bit Rate (VBR) service

    ► Available Bit Rate (ABR) service

    ► None of the given



    Question No: 16 ( Marks: 1 ) - Please choose one


    Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .

    ► Connectionless service paradigm

    ► Connection oriented service paradigm

    ► Both Connectionless and Connection-oriented service paradigm


    ► None of the given



    Question No: 17 ( Marks: 1 ) - Please choose one


    A network with throughput T and delay D has a total of ________ bit in transit at any time.


    ► T / D

    ► T x D

    ► T + D

    ► None of the given




    Question No: 18 ( Marks: 1 ) - Please choose one


    ATM is designed to work on___________.

    ► Twisted Pair

    ► Coaxial

    ► Radio Frequency

    ► Fiber



    Question No: 19 ( Marks: 1 ) - Please choose one


    Computers attached to an ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.


    ► CSMA/CD

    ► CSMA/CA

    ► TOKEN PASSING


    ► None of the given



    Question No: 20 ( Marks: 1 ) - Please choose one


    FDDI can transmits data at a rate of ----------


    ► 100 million bits per second

    ► 10 million bits per second

    ► 1000 million bits per second

    ► None of the given



    Question No: 21 ( Marks: 2 )


    What is the difference between the physical and logical topologies?

    Every LAN has a topology, or the way that the devices on a network are arranged and how they communicate with each other.
    PHYSICL TOPOLOGY:
    The way that the workstations are connected to the network through the actual cables that transmit data -- the physical structure of the network -- is called the physical topology. It depends on the wiring scheme.
    LOGICAL TOPOLOGY:
    The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. We can say that it is defined by the specific network technology.


    Question No: 22 ( Marks: 2 )


    Define Vector-Distance Algorithm.


    Packet switches wait for next update message and they iterate through entries in message. If entry has shortest path to destination, insert source as next hop to destination and record distance as distance from next hop to destination plus distance from this switch to next hop.


    Question No: 23 ( Marks: 3 )


    What is the concept of store and forward technology?


    STORE AND FORWARD:
    Data delivery from one computer to another is accomplished through store and forward technology. In this technology packet switch stores incoming packet and also forwards that packet to another switch or computer. For this purpose packet switch has internal memory into which it can hold packet if outgoing connection is busy. Packets for each connection held on queue.


    Question No: 24 ( Marks: 3 )


    How can Switched Virtual Network be established?

    SWITCHED VIRTUAL CIRCUITS:

    Most networks offer dynamic connections, which last for a relatively short time.
    To handle this, ATM can dynamically establish a switched virtual circuit (SVC), allow it last as long as necessary and then terminate it.
    The terminology comes from the Telco’s where switching system normally refers to all switching.

    ESTABLISHING AN SVC:

    The computer sends a connection request to the switch to which it is attached.
    Software in the switch finds a network path to the destination and sends along the connection request.
    Each pair of switches in the path communicates to choose a VPI/VCI for their tables. Once the connection is established by the destination, a message is sent back to the originating computer to indicate the SVC is ready.
    If any switch or the destination computer does not agree to setting up the VC, an error message is sent back and the SVC is not established


    Question No: 25 ( Marks: 5 )
    How can a bridge know whether to forward frames?


    The bridge builds a list of MAC addresses on either side of the bridge. Therefore, it knows which packets should be forwarded to the other side and which should not. Most bridges are self-learning bridges. As soon as a frame arrives to a bridge, it extracts a source address from its header and automatically adds it in the list for that segment. In this way a bridge builds up address lists.
    In the example of a packet that uses a MAC address not in its table it can err on the side of caution by forwarding the packet.


    Question No: 26 ( Marks: 5 )
    Compare connection oriented and connectionless Service.


    Connection-Oriented vs. Connectionless Service
    This characteristic specifies whether conversations take place in a more or less structured manner. When using a connection-oriented protocol, you incur the overhead of setting up a virtual circuit (a defined communications path) between the sender and receiver, which is maintained until the sender and receiver have completed their entire conversation.
    When the conversation is completed, you incur the overhead of tearing down the virtual circuit. Connection-oriented protocols provide guaranteed delivery of messages in the order in which they were sent.
    Contrast this with Connectionless service, which does not require establishing a session and a virtual circuit. This can be found in the network layer or transport layer, depending on the protocol. You can think of a connectionless protocol as being akin to mailing a post card. You send it and hope that the receiver gets it. Common features of a connectionless service are:
    • Packets do not need to arrive in a specific order
    • Reassembly of any packet broken into fragments during transmission must be in proper order
    • No time is used in creating a session
    • No Acknowledgement is required.
    • The largest connectionless network in use today is the Internet
    :o:o--------------------------------------------------------------------------------------:o:o
    [B]The more knowledge you have, the greater will be your fear of Allah.[/B]

    Please Join My [B]Group Vuhelp[/B][B], Birthday Wishing, Daily Hadees[/B] [CODE][B]http://vuhelp.net/groups/vuhelp.html[/B]
    [B]http://vuhelp.net/groups/birthday-wishing.html[/B]
    [B]http://vuhelp.net/groups/daily-hadees.html[/B][/CODE]
    [CENTER][B][COLOR="Red"][SIZE="4"]Email: [email]viki@vuhelp.net[/email][/SIZE][/COLOR][/B][/CENTER]

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. CS610 Computer Network Assignment No.02 Fall 2013
    By vuassignments in forum Assignments & Solutions
    Replies: 0
    Last Post: 12-09-2013, 07:50 PM
  2. CS610 Computer Network GDB no 1 July 2012
    By Vuhelper in forum GDB Discussion
    Replies: 0
    Last Post: 07-04-2012, 11:40 PM
  3. SOLVED MIDTERM EXAMINATION spring 2010 CS610- Computer Network
    By desireforheaven in forum Solved Papers
    Replies: 8
    Last Post: 05-16-2012, 03:26 PM
  4. Replies: 0
    Last Post: 07-11-2011, 10:01 PM
  5. Replies: 0
    Last Post: 08-28-2010, 06:01 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
-: Vuhelp Disclaimer :-
None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site's users. The administrator's or staff of Vuhelp.net cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms. If you have any doubts about legality of content or you have any suspicions, feel free to contact us.
Online Education | JhelumSoft