cs610 collection of old papers
TRANSCRIPT
-
8/8/2019 Cs610 Collection of Old Papers
1/33
WWW
.vuja
nnat.nin
g.COM
FINALTERM EXAMINATIONFall 2008
CS610- Computer NetworkRef No: 325624
Time: 120 min
Marks: 70Student Info
Student ID:
Center:
Exam Date:
For Teacher's Use Only
Q No. 1 2 3 4 5 6 7 8 Total
Marks
Q No. 9 10 11 12 13 14 15 16
Marks
Q No. 17 18 19 20 21 22 23 24
Marks
Q No. 25 26 27 28 29 30 31
Marks
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
2/33
WWW
.vuja
nnat.nin
g.COM
Question No: 1 ( Marks: 1 ) - Please choose one
The number of connections needed for N computer in direct point to point communication isequal to:
(N2 N)/2 N(N- 1) N2 None of the given
Question No: 2 ( Marks: 1 ) - Please choose one
When an application--------------- data, it makes a copy of the data available to all other
computers on the network.
Broadcasting Multicasting Unicasting None of the given
Question No: 3 ( Marks: 1 ) - Please choose one
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique
address by the manufacturer.
64
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
3/33
WWW
.vuja
nnat.nin
g.COM
48 32 8
Question No: 4 ( Marks: 1 ) - Please choose one
A system with redundant bridges might have a problem with_______ in the system.
Loop
Filters
Spanning Trees All given choices
Question No: 5 ( Marks: 1 ) - Please choose one
The product of delay and throughput measures the _____ of data that can be present on the
network.
Area Volume Length None of the given
Question No: 6 ( Marks: 1 ) - Please choose one
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
4/33
WWW
.vuja
nnat.nin
g.COM
Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary
interaction and operating system independent are the characteristics of _____________
TCP UDP IP None of the given
Question No: 7 ( Marks: 1 ) - Please choose one
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication,
Stream interface, Reliable connection startup and Graceful connection shutdown are the services
provided by__________
None of the given TCP UDP IP
Question No: 8 ( Marks: 1 ) - Please choose one
The process of using a routing table to select a next hop for a given datagram is called_________
Encapsulation Reassembling Routing or forwarding None of the given
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
5/33
-
8/8/2019 Cs610 Collection of Old Papers
6/33
WWW
.vuja
nnat.nin
g.COM
square roots, cude roots and, triple
Question No: 12 ( Marks: 1 ) - Please choose one
Whenever it handles a packet, IP software needs to separate the destination address into a
_________ and ___________.
postfix, Infix non of these Infix, prefix prefix, suffix
Question No: 13 ( Marks: 1 ) - Please choose one
Although message exchange can be used to bind addresses, sending a request for each binding is
hopelessly inefficient.
True False
Question No: 14 ( Marks: 1 ) - Please choose one
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
32, 48 24, 32 32, 64
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
7/33
WWW
.vuja
nnat.nin
g.COM
32, 128
Question No: 15 ( Marks: 1 ) - Please choose one
End-to-end delivery service is connection oriented.
True False
Question No: 16 ( Marks: 1 ) - Please choose one
A single networking technology is best for all needs.
True False
Question No: 17 ( Marks: 1 ) - Please choose one
In the 1970s large organizations began to acquire multiple networks. Each network in the
organization formed island. Employees needed to choose a computer appropriate for each task.
So they needed multiple screens, keyboards and computers.
False True
Question No: 18 ( Marks: 1 ) - Please choose one
Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
8/33
WWW
.vuja
nnat.nin
g.COM
T C D C, D
Question No: 19 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the protocol address is determined by hardware
address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
T D C
T, C
Question No: 20 ( Marks: 1 ) - Please choose one
We use the term _______ to refer to a measure of the path that routing software usewhen choosing a route.
routing path routing metric routing switching
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
9/33
WWW
.vuja
nnat.nin
g.COM
Question No: 21 ( Marks: 2 )
Is there a comparision between TCP/IP reference model and ISO reference model.
Question No: 22 ( Marks: 2 )
Does OSPF only share information within an area or does it allow communicationbetween areas?
Question No: 23 ( Marks: 2 )
What are the implimentations of Network Address Translation?
Question No: 24 ( Marks: 3 )
Describe the difference between static and dynamic routing?
Question No: 25 ( Marks: 3 )
What is the first address in the block if one of the addresses is 140.120.84.24/20?
Question No: 26 ( Marks: 3 )
Write three new features of IPV6.
Question No: 27 ( Marks: 5 )
What is the difference between an interior gateway protocol and an exterior gateway protocol?
Name an example of each.
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
10/33
WWW
.vuja
nnat.nin
g.COM
Question No: 28 ( Marks: 5 )
As the Internet grew, the original Classful addressing scheme became a limitation, what is was
the designed solution.
Question No: 29 ( Marks: 5 )
What are IPv6 ADDRESS NOTATION?
Question No: 30 ( Marks: 10 )
LIST SOME CHARACTERISTICS OF A CLIENT.
Question No: 31 ( Marks: 10 )
With help of the diagram below, explain TCP Segment Format:
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
11/33
Given the following technologies, determine which characteristics apply by placingan 'X' in the appropriate place.
Question No. 1 Marks : 10
Total Marks: 75 Total Questions: 06
**WARNING: Please note that Virtual University takes serious noteof unfair means. Anyone found involved in cheating will get an `F`grade in this course.
b. If you believe that some essential piece of information is
missing, make an appropriate assumption and use it to solvethe problem.
a. If you think that there is something wrong with any of thequestions, attempt it to the best of your understanding.
3. Do not ask any questions about the contents of this examination
from anyone.
b. You w ill have to answer correctly all questions in this
examination to get the maximum possible marks.
a. There is no choice.
2. Answer all questions.1. This examination is closed book, closed notes, closed neighbors.
Please read the following instructions carefully before attempting anyquestion:
Time Allow ed: 150 Minutes
Final Term Examination Spring 2005
CS610 Computer Networks
www.vujannat.ning.com
-
8/8/2019 Cs610 Collection of Old Papers
12/33
Question No. 4 Marks : 10
e) Differentiate between Static and Dynamic Routing?
d) Name the three Address Resolution Techniques?
c) What is the difference between a Bridge and a Repeater?
b) Briefly define the function of a Network Analyzer with an elaboration of
the term "Promiscuous Mode"?
a) Briefly define the two main points of the "Locality of Reference
Principle"?
Answer the following questions briefly?
Question No. 3 Marks : 25
10. __________ is a measure of the rate at which data can be sent through the network.
9. If congestion in a network persists, the entire network can become unusable. This condition isknown as ____________.
8. 224.49.53.9 is a class _________ address.
7. The Suffix part of a Class 'B' network contains _______ octets.
6. TCP/IP protocol is organized into _______ conceptual layers.
5. The basic hardware component used to connect heterogeneous networks is known as
________.
4. The ________ field in frame header specifies that the frame contains an ARP message.
3. The translation from a computer's protocol address to the equivalent hardware address is
known as ____________.
2. The process of using a routing table to select a next hop for a given datagram is called
__________.
1. TCP/IP protocols use the name ____________ to refer to an internet packet.Fill in the blanks.
Question No. 2 Marks : 10
-
8/8/2019 Cs610 Collection of Old Papers
13/33
c) What are the valid subnets?b) What is the number of hosts?
a) What is the maximum number of subnets in the network?Given the IP address and subnet mask 192.168.10.0 and 255.255.255.224
Question No. 6 Marks : 10
Draw the OSPF Graph for the following network?
Question No. 5 Marks : 10
Convert the following 32-Bit Binary addresses into their equivalent Dotted Decimal
Notation?
-
8/8/2019 Cs610 Collection of Old Papers
14/33
WWW.vujannat.ning.COMConnecting VU Students
CS610-COMPUTER NETWORKSFINAL SPRING 2007
(1):Given the IP address 18.250.31.14 and subnet mask 255.240.0.0, what is the
subnet address?
18.9.0.14 18.240.0.0 18.31.0.14
18.0.0.14
Answer the following questions:
a. Why would an internet need an Autonomous System? [3]b. What is the difference between an interior gateway protocol and an exterior gateway
protocol? Name an example of each [4]
c. What is the difference between unicast routing and multicast routing? [3]
Answer the following questions:
i. What is meant by Virtual Private Networks and how guarantee absolute privacyof packets in it? [3]
ii. What information are obtained from network sniffer and in which mode Networksniffer operates? [3]
iii. How does a bridge know on which segment a destination computer is attached?[2]
iv. What is the difference between private network and public network? [2]Suppose an ISP has class B address i.e. 130.8.0.0/16. If the ISP has three customers
with only six computers each then determine the following parameters:a. Network prefixes assigned to three customers?[3]b. Address Mask for each Network prefix?[3]c. Lowest Host Address and Highest Host Address of one customer?[4]
In IP datagram header format, what is the value of the data field given H.LEN value
of 12 and TOTAL LENGTH value of 40,000?
-
8/8/2019 Cs610 Collection of Old Papers
15/33
39,952 10,048 40,012 39,988
Which of the following is an exterior routing protocol?
RIP and OSPF BGP OSPF RIP
Given are the five networks connected to each other via routers.
Networks1 is connected to Network 2 through R1-2, Network 2 is connected to the
Network3 through R2-3 and so on. W represents the weights between network nodes.
Host A belongs to Network 1 whereas Host B belongs to Network 5
The MTU size of each network is as follows
Network
No.
MTU size
1 256 bits
2 16 bits
3 32 bits
-
8/8/2019 Cs610 Collection of Old Papers
16/33
4 16 bits
5 8 bits
Host A sends a datagram of size 256 bits to Host B.
a. Find out which path will the datagram be adopting in reaching to the destination Bby Distance Vector Routing algorithm. [4]
b. Which of therouters in the path needs to fragment the datagram? [4]c. The original datagram is finally split into how many datagrams to reach at the
destination? [4]
An ARP reply is ------- to ----
Unicast: one host Unicast: all hosts Multicast: one host Broadcast: all hosts
-
8/8/2019 Cs610 Collection of Old Papers
17/33
WWW.vujannat.ning.COMConnecting VU Students
CS610-Computer Networks
MID FALL 2007
a. Explain how the CSMA/CD protocol answers the following questions: (Marks:
08) i. When should the station access the medium?ii. What should be done if the medium is busy?iii. How should the station determine the success or failure of the transmission?iv. What should the station do if there is an access conflict?
b. Imagine the length of a 10Base5 cable is 2500 m. If the speed of propagation in a
thick coaxial cable is 400,000,000 m/s, how long does it take for a bit to travel from
the beginning to the end of the network? Ignore any propagation delay in the
equipment. (Marks: 06)
Ethernet uses a ____________ static addressing scheme in which each device is
assigned a unique address by the manufacturer.
64
48
328
Consider the six computers connected to a pair of bridged LAN segments as shown
below: (Marks:14)
Fill the segments list as given below according to the events occurs (How a bridge can
learn the locations of computers when a sequence of events occurs).
Event Segment 1 List Segment 2 List
-
8/8/2019 Cs610 Collection of Old Papers
18/33
Bridge bootsA sends to B
B sends to A
F broadcastE sends to B
E sends to D
D sends to C
C sends to F
a. Answer the following question: (Marks: 08)i. What are the main reasons for which PING command is not used for probing in
the large network?
ii. What is a ring network technology that is designed to overcome severe failure,explain its working briefly?
iii. What is difference byte stuffing and bit stuffing?b. What is the ratio of useful data to the entire packet for the smallest Ethernet
frame? What is the ratio for the largest frame? What is the average ratio?(Marks:
06)
An interface for twisted pair Ethernet must have a ____________ connector, and
must generate signals according to the_____________ specification.
BNC- t base 10Rj 45- t base 10
BNC-t base 5Rj 45-t base 2
A bridge uses the ___________ to determine which computers connect to which
segment, and uses the __________ to determine whether to forward a copy of frame.
Source , destinationSource , source
Destination, source
None from above
A system with redundant bridges might have a problem with_______ in the system.
Loop
FiltersSpamming
All above
-
8/8/2019 Cs610 Collection of Old Papers
19/33
WWW
.vuja
nnat.nin
g.COM
MIDTERM EXAMINATION
Fall 2008
CS610- Computer Network (Session - 2)
Time: 60 min
Marks: 38Student Info
StudentID:
Center:OPKST
ExamDate:12/5/2008 12:00:00 AM
For Teacher's Use Only
Q No. 1 2 3 4 5 6 7 8 Total
Marks
Q No. 9 10 11 12 13 14 15 16
Marks
Q No. 17 18 19 20 21
Marks
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
20/33
WWW
.vuja
nnat.nin
g.COM
Question No: 1 ( Marks: 1 ) - Please choose one
A
typical port on an ATM switch operates at __________ or higher. OC-2 speed (155Mbps)OC-3 speed (100Mbps) OC-3 speed (155Mbps) OC-3 speed (155Gbps)
Question No: 2 ( Marks: 1 ) - Please choose one
Theproduct of delay and throughput measures the _____ of data that can be present on the network.
Area Volume LengthNone of the given
Question No: 3 ( Marks: 1 ) - Please choose one
__________is used for compressed audio and video where the data rate depends on the level of
compression that can be achieved. Constant Bit Rate (CBR) service Variable Bit Rate (VBR) service Available Bit Rate (ABR) service None of the given
Question No: 4 ( Marks: 1 ) - Please choose one
Which of the following is a connecting device? Bridge Repeater Hub All the givenQuestion No: 5 ( Marks: 1 ) - Please choose one
A
bridges function in the _________ layers(s). Physical (MAC) Data link Network Physical (MAC) and Data linkQuestion No: 6 ( Marks: 1 ) - Please choose one
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
21/33
WWW
.vuja
nnat.nin
g.COM
IEEE LLC/SNAP header is --------, which is used to specify the type of data. 8 octets 8 bytes 8 bits
None of the given
Question No: 7 ( Marks: 1 ) - Please choose one
The
third field of the header consists of ------ bit Ethernet frame type. 48 32 16 8Question No: 8 ( Marks: 1 ) - Please choose one
An ------------method, the network hardware designers specify how type information is included in
the frame and the value use to identify various frame types. Explicit frame type Ideal frame type Implicit frame type None of the givenQuestion No: 9 ( Marks: 1 ) - Please choose one
Local Talk is a LAN technology that employs -------------
Star topology Bus topology Ring topology None of the givenQuestion No: 10 ( Marks: 1 ) - Please choose one
The
Fast Ethernet hardware operates at a rate of -------- 10 Mbps 100 Mbps 1000 Mbps None of the givenQuestion No: 11 ( Marks: 1 ) - Please choose one
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
22/33
WWW
.vuja
nnat.nin
g.COM
-
--------- scheme, which is designed to help detect transmissions errors, send one extra bit of
information with each character
Parity Checksums CRC None of givenQuestion No: 12 ( Marks: 1 ) - Please choose one
Computer networks are often called -------------- because they use packet technology.
Ethernet Switch networks Packet networks None of the givenQuestion No: 13 ( Marks: 1 ) - Please choose one
-----
- Program sends a message to a remote computer and reports whether the computer responds. PingPing Traceroute ICMP Non of the givenQuestion No: 14 ( Marks: 1 ) - Please choose one
In ---------, network occupies larger areas like cities & countries. LAN WAN MAN None of the givenQuestion No: 15 ( Marks: 1 ) - Please choose one
In -------------, network occupies the smaller area like a room a floor or a building
LAN WAN MAN None of the given
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
23/33
WWW
.vuja
nnat.nin
g.COM
Question No: 16 ( Marks: 1 ) - Please choose one
In
Point-to-Point topology there are two topologies.
Tree and Ring Star and Ring Star and Tree None of the given
Question No: 17 ( Marks: 2 )
Question No: 18 ( Marks: 2 )
Question No: 19 ( Marks: 3 )
Why 10-base T wiring scheme is called star shaped bus wiring scheme.
Question No: 20 ( Marks: 5 )
What are the main factors due to which mechanism of error detections schemes differ?
Question No: 21 ( Marks: 10 )
How much data can be present on an original Ethernet segment at one time? To find out,
compute the delay-throughput product. The original Ethernet operate at 10 mega bits per second,
and a segment was limited to 500 meters. Assume the signals propagate down the cable at 66percent of the speed of light.
Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.
http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/ -
8/8/2019 Cs610 Collection of Old Papers
24/33
o
o Multicast
o
Ethernet
CSMAo
WAN
o Star
A popular LAN Technology that uses a shared Bus Topology.
Question No. 1 Marks : 03
Total Marks: 100 Total Questions: 10
**WARNING: Please note that Virtual University takes seriousnote of unfair means. Anyone found involved in cheating willget an `F` grade in this course.
3. Exam is Closed Book. No handouts or extra material is allowed
in exam hall other than rough sheet which will be provided by theexaminer.
b. If you believe that some essential piece of information ismissing, make an appropriate assumption and use it tosolve the problem.
a. If you think that there is something wrong with any ofthe questions, attempt it to the best of your understanding.
2. Do not ask any questions about the contents of thisexamination from anyone.
1. Attempt all questions. All Questions carry Different Marks.
Please read the following instructions carefully beforeattempting any of the questions:
Time Allow ed: 90 Minutes
Mid Term Examination Spring 2005
CS610 Computer Networks
www.vujannat.ning.com
-
8/8/2019 Cs610 Collection of Old Papers
25/33
Draw and label all the components for a 10Base5 Network.
Question No. 5 Marks : 10
Bandwidtho
o CRC
o Packet Switcho Multicasto Broadcast
.A form of addressing in which a set of computers is assigned one address.
Question No. 4 Marks : 03
.b. Determine the collapsed routing table using default route.
a. Determine the routing table.
For the packet switched network below:[15 + 15 Marks]Question No. 3 Marks :30
o 10Base5o Bridgeo 10Baseto NICo Ethernet
An electronic device that connects LAN segments.
Question No. 2 Marks : 03
-
8/8/2019 Cs610 Collection of Old Papers
26/33
As discussed in the lecture, each ATM Switch rewrites or switched the Label. Assuming the
sending computer 'S' uses a VPI/VCI value of 3 and the receiving computer 'R' uses a
VPI/VCI value of 6, use a table containing the old VPI/VCI, the Interface and the new
VPI/VCI to complete the tables for each of the switches below?
[15 Marks]
Question No. 9 Marks : 15
Draw an example of 'Cycle of Bridges' with the segments. (At least 6 segments)
Question No. 8 Marks : 15
e. ATM (155Mbps)d. Local Talk (230Kbps)
c. Token Ring (16Mbps)
b. Fast Ethernet (100Mbps)
a. Ethernet (10Mbps)
Assume a 10Mega Byte file must be transmitted across a network. Ignoring delays caused
by waiting for access and other overhead, how long will it take to send the file across?
[15 Marks]
Question No. 7 Marks : 15
o Wireless LANo WANo Broadcasto CRCo Bridge
A network technology that uses Collision Avoidance.
Question No. 6 Marks : 03
-
8/8/2019 Cs610 Collection of Old Papers
27/33
-
8/8/2019 Cs610 Collection of Old Papers
28/33
Connecting VU Students
FINALTERM EXAMINATION
SPRING 2006
CS610 - COMPUTER NETWORK (Session - 1 )
Marks: 60
Time: 120min
StudentID/LoginID: ______________________________
Student Name: ______________________________
Center Name/Code: ______________________________
Exam Date: Tuesday, August 15, 2006
Please read the following instructions carefully before attempting anyof the questions:
1. Attempt all questions. Marks are written adjacent to each question.
2. Do not ask any questions about the contents of this examinationfrom anyone.
a. If you think that there is something wrong with any of thequestions, attempt it to the best of your understanding.
b. If you believe that some essential piece of information ismissing, make an appropriate assumption and use it to solve theproblem.
c. Write all steps, missing steps may lead to deduction of marks.
**WARNING: Please note that Virtual University takes serious note ofunfair means. Anyone found involved in cheating will get an `F` gradein this course.
For Teacher's use onlyQuestion 1 2 3 4 5 6 7 8 9 TotalMarks
Question No: 1 ( Marks: 2 ) - Please choose one
Two computers E and F are expected to communicate frequently, in a LAN. While designing a
LAN which of the following is the way through which the traffic between E and F, will be least
affected to the other computers/traffic on the network
-
8/8/2019 Cs610 Collection of Old Papers
29/33
Connecting VU Students
Make the two computers in different LAN segment and connect both the segments via
bridge
Make the computer in a single LAN segment
Connect both the computers using switch in between them
Make the two computers in different LAN segments and connect both the segmentsvia router
Question No: 2 ( Marks: 2 ) - Please choose one
In which of the following OSI reference layers, does repeater operates?
Physical
Data link
Network
Session
Question No: 3 ( Marks: 2 ) - Please choose one
Which of the following is not true about OSPF?
Allows routers introduce routes learned from other means
Similar to IGP
An address mask is attached with each address
-
8/8/2019 Cs610 Collection of Old Papers
30/33
-
8/8/2019 Cs610 Collection of Old Papers
31/33
Connecting VU Students
Consider the above figure, in which there is a cloud of networks having various networks.
Suppose there are 7 routers in between Host A and Host B.Identify
a. How come host A knows the addresses of all the routers between A to B?b. What will be the value of the TTL field when the source host A sends the datagram 7th
time towards the destination B, and the third router in the path receives that datagram?
c. How many times does the source A needs to send the datagram so that it finally reaches atdestination host B?
d. What will be the value of the TTL field when the source host A sends the datagram 4th
time towards the destination B, and the second router in the path receives that datagram?
e. What will be the value of the TTL field when the source host A sends the datagramfirsttime towards the destination B, and the first router in the path receives that datagram?
Question No: 8 ( Marks: 15 )
-
8/8/2019 Cs610 Collection of Old Papers
32/33
-
8/8/2019 Cs610 Collection of Old Papers
33/33
Connecting VU Students
Consider the IP addresses and the corresponding subnet masks,
i- 187.199.127.5 , 255.255.255.0
ii- 72.32.10.4 , 255.240.0.0
Find out the following against both of the above IP addresses
a. The network class in which the IP address falls.b. The number of bits used for subnetting.c. Total number of host in the subnetd. The network address of the subnet.e. The subnet address of the IP address.