cs610 collection of old papers

Upload: majidvacom

Post on 09-Apr-2018

238 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Cs610 Collection of Old Papers

    1/33

    WWW

    .vuja

    nnat.nin

    g.COM

    FINALTERM EXAMINATIONFall 2008

    CS610- Computer NetworkRef No: 325624

    Time: 120 min

    Marks: 70Student Info

    Student ID:

    Center:

    Exam Date:

    For Teacher's Use Only

    Q No. 1 2 3 4 5 6 7 8 Total

    Marks

    Q No. 9 10 11 12 13 14 15 16

    Marks

    Q No. 17 18 19 20 21 22 23 24

    Marks

    Q No. 25 26 27 28 29 30 31

    Marks

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    2/33

    WWW

    .vuja

    nnat.nin

    g.COM

    Question No: 1 ( Marks: 1 ) - Please choose one

    The number of connections needed for N computer in direct point to point communication isequal to:

    (N2 N)/2 N(N- 1) N2 None of the given

    Question No: 2 ( Marks: 1 ) - Please choose one

    When an application--------------- data, it makes a copy of the data available to all other

    computers on the network.

    Broadcasting Multicasting Unicasting None of the given

    Question No: 3 ( Marks: 1 ) - Please choose one

    Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique

    address by the manufacturer.

    64

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    3/33

    WWW

    .vuja

    nnat.nin

    g.COM

    48 32 8

    Question No: 4 ( Marks: 1 ) - Please choose one

    A system with redundant bridges might have a problem with_______ in the system.

    Loop

    Filters

    Spanning Trees All given choices

    Question No: 5 ( Marks: 1 ) - Please choose one

    The product of delay and throughput measures the _____ of data that can be present on the

    network.

    Area Volume Length None of the given

    Question No: 6 ( Marks: 1 ) - Please choose one

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    4/33

    WWW

    .vuja

    nnat.nin

    g.COM

    Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary

    interaction and operating system independent are the characteristics of _____________

    TCP UDP IP None of the given

    Question No: 7 ( Marks: 1 ) - Please choose one

    Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication,

    Stream interface, Reliable connection startup and Graceful connection shutdown are the services

    provided by__________

    None of the given TCP UDP IP

    Question No: 8 ( Marks: 1 ) - Please choose one

    The process of using a routing table to select a next hop for a given datagram is called_________

    Encapsulation Reassembling Routing or forwarding None of the given

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    5/33

  • 8/8/2019 Cs610 Collection of Old Papers

    6/33

    WWW

    .vuja

    nnat.nin

    g.COM

    square roots, cude roots and, triple

    Question No: 12 ( Marks: 1 ) - Please choose one

    Whenever it handles a packet, IP software needs to separate the destination address into a

    _________ and ___________.

    postfix, Infix non of these Infix, prefix prefix, suffix

    Question No: 13 ( Marks: 1 ) - Please choose one

    Although message exchange can be used to bind addresses, sending a request for each binding is

    hopelessly inefficient.

    True False

    Question No: 14 ( Marks: 1 ) - Please choose one

    ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

    32, 48 24, 32 32, 64

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    7/33

    WWW

    .vuja

    nnat.nin

    g.COM

    32, 128

    Question No: 15 ( Marks: 1 ) - Please choose one

    End-to-end delivery service is connection oriented.

    True False

    Question No: 16 ( Marks: 1 ) - Please choose one

    A single networking technology is best for all needs.

    True False

    Question No: 17 ( Marks: 1 ) - Please choose one

    In the 1970s large organizations began to acquire multiple networks. Each network in the

    organization formed island. Employees needed to choose a computer appropriate for each task.

    So they needed multiple screens, keyboards and computers.

    False True

    Question No: 18 ( Marks: 1 ) - Please choose one

    Which method of Address Resolution Protocol is useful with any hardware?

    Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data

    Exchange?

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    8/33

    WWW

    .vuja

    nnat.nin

    g.COM

    T C D C, D

    Question No: 19 ( Marks: 1 ) - Please choose one

    In which method of Address Resolution Protocol the protocol address is determined by hardware

    address?

    Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data

    Exchange?

    T D C

    T, C

    Question No: 20 ( Marks: 1 ) - Please choose one

    We use the term _______ to refer to a measure of the path that routing software usewhen choosing a route.

    routing path routing metric routing switching

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    9/33

    WWW

    .vuja

    nnat.nin

    g.COM

    Question No: 21 ( Marks: 2 )

    Is there a comparision between TCP/IP reference model and ISO reference model.

    Question No: 22 ( Marks: 2 )

    Does OSPF only share information within an area or does it allow communicationbetween areas?

    Question No: 23 ( Marks: 2 )

    What are the implimentations of Network Address Translation?

    Question No: 24 ( Marks: 3 )

    Describe the difference between static and dynamic routing?

    Question No: 25 ( Marks: 3 )

    What is the first address in the block if one of the addresses is 140.120.84.24/20?

    Question No: 26 ( Marks: 3 )

    Write three new features of IPV6.

    Question No: 27 ( Marks: 5 )

    What is the difference between an interior gateway protocol and an exterior gateway protocol?

    Name an example of each.

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    10/33

    WWW

    .vuja

    nnat.nin

    g.COM

    Question No: 28 ( Marks: 5 )

    As the Internet grew, the original Classful addressing scheme became a limitation, what is was

    the designed solution.

    Question No: 29 ( Marks: 5 )

    What are IPv6 ADDRESS NOTATION?

    Question No: 30 ( Marks: 10 )

    LIST SOME CHARACTERISTICS OF A CLIENT.

    Question No: 31 ( Marks: 10 )

    With help of the diagram below, explain TCP Segment Format:

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    11/33

    Given the following technologies, determine which characteristics apply by placingan 'X' in the appropriate place.

    Question No. 1 Marks : 10

    Total Marks: 75 Total Questions: 06

    **WARNING: Please note that Virtual University takes serious noteof unfair means. Anyone found involved in cheating will get an `F`grade in this course.

    b. If you believe that some essential piece of information is

    missing, make an appropriate assumption and use it to solvethe problem.

    a. If you think that there is something wrong with any of thequestions, attempt it to the best of your understanding.

    3. Do not ask any questions about the contents of this examination

    from anyone.

    b. You w ill have to answer correctly all questions in this

    examination to get the maximum possible marks.

    a. There is no choice.

    2. Answer all questions.1. This examination is closed book, closed notes, closed neighbors.

    Please read the following instructions carefully before attempting anyquestion:

    Time Allow ed: 150 Minutes

    Final Term Examination Spring 2005

    CS610 Computer Networks

    www.vujannat.ning.com

  • 8/8/2019 Cs610 Collection of Old Papers

    12/33

    Question No. 4 Marks : 10

    e) Differentiate between Static and Dynamic Routing?

    d) Name the three Address Resolution Techniques?

    c) What is the difference between a Bridge and a Repeater?

    b) Briefly define the function of a Network Analyzer with an elaboration of

    the term "Promiscuous Mode"?

    a) Briefly define the two main points of the "Locality of Reference

    Principle"?

    Answer the following questions briefly?

    Question No. 3 Marks : 25

    10. __________ is a measure of the rate at which data can be sent through the network.

    9. If congestion in a network persists, the entire network can become unusable. This condition isknown as ____________.

    8. 224.49.53.9 is a class _________ address.

    7. The Suffix part of a Class 'B' network contains _______ octets.

    6. TCP/IP protocol is organized into _______ conceptual layers.

    5. The basic hardware component used to connect heterogeneous networks is known as

    ________.

    4. The ________ field in frame header specifies that the frame contains an ARP message.

    3. The translation from a computer's protocol address to the equivalent hardware address is

    known as ____________.

    2. The process of using a routing table to select a next hop for a given datagram is called

    __________.

    1. TCP/IP protocols use the name ____________ to refer to an internet packet.Fill in the blanks.

    Question No. 2 Marks : 10

  • 8/8/2019 Cs610 Collection of Old Papers

    13/33

    c) What are the valid subnets?b) What is the number of hosts?

    a) What is the maximum number of subnets in the network?Given the IP address and subnet mask 192.168.10.0 and 255.255.255.224

    Question No. 6 Marks : 10

    Draw the OSPF Graph for the following network?

    Question No. 5 Marks : 10

    Convert the following 32-Bit Binary addresses into their equivalent Dotted Decimal

    Notation?

  • 8/8/2019 Cs610 Collection of Old Papers

    14/33

    WWW.vujannat.ning.COMConnecting VU Students

    CS610-COMPUTER NETWORKSFINAL SPRING 2007

    (1):Given the IP address 18.250.31.14 and subnet mask 255.240.0.0, what is the

    subnet address?

    18.9.0.14 18.240.0.0 18.31.0.14

    18.0.0.14

    Answer the following questions:

    a. Why would an internet need an Autonomous System? [3]b. What is the difference between an interior gateway protocol and an exterior gateway

    protocol? Name an example of each [4]

    c. What is the difference between unicast routing and multicast routing? [3]

    Answer the following questions:

    i. What is meant by Virtual Private Networks and how guarantee absolute privacyof packets in it? [3]

    ii. What information are obtained from network sniffer and in which mode Networksniffer operates? [3]

    iii. How does a bridge know on which segment a destination computer is attached?[2]

    iv. What is the difference between private network and public network? [2]Suppose an ISP has class B address i.e. 130.8.0.0/16. If the ISP has three customers

    with only six computers each then determine the following parameters:a. Network prefixes assigned to three customers?[3]b. Address Mask for each Network prefix?[3]c. Lowest Host Address and Highest Host Address of one customer?[4]

    In IP datagram header format, what is the value of the data field given H.LEN value

    of 12 and TOTAL LENGTH value of 40,000?

  • 8/8/2019 Cs610 Collection of Old Papers

    15/33

    39,952 10,048 40,012 39,988

    Which of the following is an exterior routing protocol?

    RIP and OSPF BGP OSPF RIP

    Given are the five networks connected to each other via routers.

    Networks1 is connected to Network 2 through R1-2, Network 2 is connected to the

    Network3 through R2-3 and so on. W represents the weights between network nodes.

    Host A belongs to Network 1 whereas Host B belongs to Network 5

    The MTU size of each network is as follows

    Network

    No.

    MTU size

    1 256 bits

    2 16 bits

    3 32 bits

  • 8/8/2019 Cs610 Collection of Old Papers

    16/33

    4 16 bits

    5 8 bits

    Host A sends a datagram of size 256 bits to Host B.

    a. Find out which path will the datagram be adopting in reaching to the destination Bby Distance Vector Routing algorithm. [4]

    b. Which of therouters in the path needs to fragment the datagram? [4]c. The original datagram is finally split into how many datagrams to reach at the

    destination? [4]

    An ARP reply is ------- to ----

    Unicast: one host Unicast: all hosts Multicast: one host Broadcast: all hosts

  • 8/8/2019 Cs610 Collection of Old Papers

    17/33

    WWW.vujannat.ning.COMConnecting VU Students

    CS610-Computer Networks

    MID FALL 2007

    a. Explain how the CSMA/CD protocol answers the following questions: (Marks:

    08) i. When should the station access the medium?ii. What should be done if the medium is busy?iii. How should the station determine the success or failure of the transmission?iv. What should the station do if there is an access conflict?

    b. Imagine the length of a 10Base5 cable is 2500 m. If the speed of propagation in a

    thick coaxial cable is 400,000,000 m/s, how long does it take for a bit to travel from

    the beginning to the end of the network? Ignore any propagation delay in the

    equipment. (Marks: 06)

    Ethernet uses a ____________ static addressing scheme in which each device is

    assigned a unique address by the manufacturer.

    64

    48

    328

    Consider the six computers connected to a pair of bridged LAN segments as shown

    below: (Marks:14)

    Fill the segments list as given below according to the events occurs (How a bridge can

    learn the locations of computers when a sequence of events occurs).

    Event Segment 1 List Segment 2 List

  • 8/8/2019 Cs610 Collection of Old Papers

    18/33

    Bridge bootsA sends to B

    B sends to A

    F broadcastE sends to B

    E sends to D

    D sends to C

    C sends to F

    a. Answer the following question: (Marks: 08)i. What are the main reasons for which PING command is not used for probing in

    the large network?

    ii. What is a ring network technology that is designed to overcome severe failure,explain its working briefly?

    iii. What is difference byte stuffing and bit stuffing?b. What is the ratio of useful data to the entire packet for the smallest Ethernet

    frame? What is the ratio for the largest frame? What is the average ratio?(Marks:

    06)

    An interface for twisted pair Ethernet must have a ____________ connector, and

    must generate signals according to the_____________ specification.

    BNC- t base 10Rj 45- t base 10

    BNC-t base 5Rj 45-t base 2

    A bridge uses the ___________ to determine which computers connect to which

    segment, and uses the __________ to determine whether to forward a copy of frame.

    Source , destinationSource , source

    Destination, source

    None from above

    A system with redundant bridges might have a problem with_______ in the system.

    Loop

    FiltersSpamming

    All above

  • 8/8/2019 Cs610 Collection of Old Papers

    19/33

    WWW

    .vuja

    nnat.nin

    g.COM

    MIDTERM EXAMINATION

    Fall 2008

    CS610- Computer Network (Session - 2)

    Time: 60 min

    Marks: 38Student Info

    StudentID:

    Center:OPKST

    ExamDate:12/5/2008 12:00:00 AM

    For Teacher's Use Only

    Q No. 1 2 3 4 5 6 7 8 Total

    Marks

    Q No. 9 10 11 12 13 14 15 16

    Marks

    Q No. 17 18 19 20 21

    Marks

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    20/33

    WWW

    .vuja

    nnat.nin

    g.COM

    Question No: 1 ( Marks: 1 ) - Please choose one

    A

    typical port on an ATM switch operates at __________ or higher. OC-2 speed (155Mbps)OC-3 speed (100Mbps) OC-3 speed (155Mbps) OC-3 speed (155Gbps)

    Question No: 2 ( Marks: 1 ) - Please choose one

    Theproduct of delay and throughput measures the _____ of data that can be present on the network.

    Area Volume LengthNone of the given

    Question No: 3 ( Marks: 1 ) - Please choose one

    __________is used for compressed audio and video where the data rate depends on the level of

    compression that can be achieved. Constant Bit Rate (CBR) service Variable Bit Rate (VBR) service Available Bit Rate (ABR) service None of the given

    Question No: 4 ( Marks: 1 ) - Please choose one

    Which of the following is a connecting device? Bridge Repeater Hub All the givenQuestion No: 5 ( Marks: 1 ) - Please choose one

    A

    bridges function in the _________ layers(s). Physical (MAC) Data link Network Physical (MAC) and Data linkQuestion No: 6 ( Marks: 1 ) - Please choose one

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    21/33

    WWW

    .vuja

    nnat.nin

    g.COM

    IEEE LLC/SNAP header is --------, which is used to specify the type of data. 8 octets 8 bytes 8 bits

    None of the given

    Question No: 7 ( Marks: 1 ) - Please choose one

    The

    third field of the header consists of ------ bit Ethernet frame type. 48 32 16 8Question No: 8 ( Marks: 1 ) - Please choose one

    An ------------method, the network hardware designers specify how type information is included in

    the frame and the value use to identify various frame types. Explicit frame type Ideal frame type Implicit frame type None of the givenQuestion No: 9 ( Marks: 1 ) - Please choose one

    Local Talk is a LAN technology that employs -------------

    Star topology Bus topology Ring topology None of the givenQuestion No: 10 ( Marks: 1 ) - Please choose one

    The

    Fast Ethernet hardware operates at a rate of -------- 10 Mbps 100 Mbps 1000 Mbps None of the givenQuestion No: 11 ( Marks: 1 ) - Please choose one

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    22/33

    WWW

    .vuja

    nnat.nin

    g.COM

    -

    --------- scheme, which is designed to help detect transmissions errors, send one extra bit of

    information with each character

    Parity Checksums CRC None of givenQuestion No: 12 ( Marks: 1 ) - Please choose one

    Computer networks are often called -------------- because they use packet technology.

    Ethernet Switch networks Packet networks None of the givenQuestion No: 13 ( Marks: 1 ) - Please choose one

    -----

    - Program sends a message to a remote computer and reports whether the computer responds. PingPing Traceroute ICMP Non of the givenQuestion No: 14 ( Marks: 1 ) - Please choose one

    In ---------, network occupies larger areas like cities & countries. LAN WAN MAN None of the givenQuestion No: 15 ( Marks: 1 ) - Please choose one

    In -------------, network occupies the smaller area like a room a floor or a building

    LAN WAN MAN None of the given

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    23/33

    WWW

    .vuja

    nnat.nin

    g.COM

    Question No: 16 ( Marks: 1 ) - Please choose one

    In

    Point-to-Point topology there are two topologies.

    Tree and Ring Star and Ring Star and Tree None of the given

    Question No: 17 ( Marks: 2 )

    Question No: 18 ( Marks: 2 )

    Question No: 19 ( Marks: 3 )

    Why 10-base T wiring scheme is called star shaped bus wiring scheme.

    Question No: 20 ( Marks: 5 )

    What are the main factors due to which mechanism of error detections schemes differ?

    Question No: 21 ( Marks: 10 )

    How much data can be present on an original Ethernet segment at one time? To find out,

    compute the delay-throughput product. The original Ethernet operate at 10 mega bits per second,

    and a segment was limited to 500 meters. Assume the signals propagate down the cable at 66percent of the speed of light.

    Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Studiscussions and many more.

    http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/http://www.virtualians.com/
  • 8/8/2019 Cs610 Collection of Old Papers

    24/33

    o

    o Multicast

    o

    Ethernet

    CSMAo

    WAN

    o Star

    A popular LAN Technology that uses a shared Bus Topology.

    Question No. 1 Marks : 03

    Total Marks: 100 Total Questions: 10

    **WARNING: Please note that Virtual University takes seriousnote of unfair means. Anyone found involved in cheating willget an `F` grade in this course.

    3. Exam is Closed Book. No handouts or extra material is allowed

    in exam hall other than rough sheet which will be provided by theexaminer.

    b. If you believe that some essential piece of information ismissing, make an appropriate assumption and use it tosolve the problem.

    a. If you think that there is something wrong with any ofthe questions, attempt it to the best of your understanding.

    2. Do not ask any questions about the contents of thisexamination from anyone.

    1. Attempt all questions. All Questions carry Different Marks.

    Please read the following instructions carefully beforeattempting any of the questions:

    Time Allow ed: 90 Minutes

    Mid Term Examination Spring 2005

    CS610 Computer Networks

    www.vujannat.ning.com

  • 8/8/2019 Cs610 Collection of Old Papers

    25/33

    Draw and label all the components for a 10Base5 Network.

    Question No. 5 Marks : 10

    Bandwidtho

    o CRC

    o Packet Switcho Multicasto Broadcast

    .A form of addressing in which a set of computers is assigned one address.

    Question No. 4 Marks : 03

    .b. Determine the collapsed routing table using default route.

    a. Determine the routing table.

    For the packet switched network below:[15 + 15 Marks]Question No. 3 Marks :30

    o 10Base5o Bridgeo 10Baseto NICo Ethernet

    An electronic device that connects LAN segments.

    Question No. 2 Marks : 03

  • 8/8/2019 Cs610 Collection of Old Papers

    26/33

    As discussed in the lecture, each ATM Switch rewrites or switched the Label. Assuming the

    sending computer 'S' uses a VPI/VCI value of 3 and the receiving computer 'R' uses a

    VPI/VCI value of 6, use a table containing the old VPI/VCI, the Interface and the new

    VPI/VCI to complete the tables for each of the switches below?

    [15 Marks]

    Question No. 9 Marks : 15

    Draw an example of 'Cycle of Bridges' with the segments. (At least 6 segments)

    Question No. 8 Marks : 15

    e. ATM (155Mbps)d. Local Talk (230Kbps)

    c. Token Ring (16Mbps)

    b. Fast Ethernet (100Mbps)

    a. Ethernet (10Mbps)

    Assume a 10Mega Byte file must be transmitted across a network. Ignoring delays caused

    by waiting for access and other overhead, how long will it take to send the file across?

    [15 Marks]

    Question No. 7 Marks : 15

    o Wireless LANo WANo Broadcasto CRCo Bridge

    A network technology that uses Collision Avoidance.

    Question No. 6 Marks : 03

  • 8/8/2019 Cs610 Collection of Old Papers

    27/33

  • 8/8/2019 Cs610 Collection of Old Papers

    28/33

    Connecting VU Students

    FINALTERM EXAMINATION

    SPRING 2006

    CS610 - COMPUTER NETWORK (Session - 1 )

    Marks: 60

    Time: 120min

    StudentID/LoginID: ______________________________

    Student Name: ______________________________

    Center Name/Code: ______________________________

    Exam Date: Tuesday, August 15, 2006

    Please read the following instructions carefully before attempting anyof the questions:

    1. Attempt all questions. Marks are written adjacent to each question.

    2. Do not ask any questions about the contents of this examinationfrom anyone.

    a. If you think that there is something wrong with any of thequestions, attempt it to the best of your understanding.

    b. If you believe that some essential piece of information ismissing, make an appropriate assumption and use it to solve theproblem.

    c. Write all steps, missing steps may lead to deduction of marks.

    **WARNING: Please note that Virtual University takes serious note ofunfair means. Anyone found involved in cheating will get an `F` gradein this course.

    For Teacher's use onlyQuestion 1 2 3 4 5 6 7 8 9 TotalMarks

    Question No: 1 ( Marks: 2 ) - Please choose one

    Two computers E and F are expected to communicate frequently, in a LAN. While designing a

    LAN which of the following is the way through which the traffic between E and F, will be least

    affected to the other computers/traffic on the network

  • 8/8/2019 Cs610 Collection of Old Papers

    29/33

    Connecting VU Students

    Make the two computers in different LAN segment and connect both the segments via

    bridge

    Make the computer in a single LAN segment

    Connect both the computers using switch in between them

    Make the two computers in different LAN segments and connect both the segmentsvia router

    Question No: 2 ( Marks: 2 ) - Please choose one

    In which of the following OSI reference layers, does repeater operates?

    Physical

    Data link

    Network

    Session

    Question No: 3 ( Marks: 2 ) - Please choose one

    Which of the following is not true about OSPF?

    Allows routers introduce routes learned from other means

    Similar to IGP

    An address mask is attached with each address

  • 8/8/2019 Cs610 Collection of Old Papers

    30/33

  • 8/8/2019 Cs610 Collection of Old Papers

    31/33

    Connecting VU Students

    Consider the above figure, in which there is a cloud of networks having various networks.

    Suppose there are 7 routers in between Host A and Host B.Identify

    a. How come host A knows the addresses of all the routers between A to B?b. What will be the value of the TTL field when the source host A sends the datagram 7th

    time towards the destination B, and the third router in the path receives that datagram?

    c. How many times does the source A needs to send the datagram so that it finally reaches atdestination host B?

    d. What will be the value of the TTL field when the source host A sends the datagram 4th

    time towards the destination B, and the second router in the path receives that datagram?

    e. What will be the value of the TTL field when the source host A sends the datagramfirsttime towards the destination B, and the first router in the path receives that datagram?

    Question No: 8 ( Marks: 15 )

  • 8/8/2019 Cs610 Collection of Old Papers

    32/33

  • 8/8/2019 Cs610 Collection of Old Papers

    33/33

    Connecting VU Students

    Consider the IP addresses and the corresponding subnet masks,

    i- 187.199.127.5 , 255.255.255.0

    ii- 72.32.10.4 , 255.240.0.0

    Find out the following against both of the above IP addresses

    a. The network class in which the IP address falls.b. The number of bits used for subnetting.c. Total number of host in the subnetd. The network address of the subnet.e. The subnet address of the IP address.