CS610- Computer Network - Midterm Examination - Spring 2010
Time: 60 min
Marks = M = 40
Question No: 1 ( M - 1 ) http://vuzs.net
In Point-to-Point topology there are two topologies.
► Star and Tree
► Tree and Ring
► Star and Ring
► Star and Tree
► None of the given
In Point-to-Point topology there are two topologies.
1) STAR topology
2) TREE topology
Question No: 2 ( M - 1 ) http://vuzs.net
------ Program sends a message to a remote computer and reports whether the computer responds.
► Ping
► Traceroute
► ICMP
► Non of the given
Ping program tests reach ability. It sends datagram from B to A, that echoes back to B. it uses ICMP echo request and echo reply messages.
Question No: 3 ( M - 1 ) http://vuzs.net
------ has no way to determine the cause of the problem.
► ICMP
► Ping ► Non of the given
Ping has no way to determine the cause of the problem. Tracing A Route Network administrators use another tool, trace route.
Question No: 4 ( M - 1 ) http://vuzs.net
The term----- ------- refers to the general concept of a small block of data
► Packet
► Frame
► Data
► None of the given
Packet is a generic term that refers to small block of data. Packet have different format. Each hardware uses different packet format.
Question No: 5 ( M - 1 ) http://vuzs.net
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
► Parity
► Checksums
► CRC
► None of given
A parity scheme, which is designed to help detect transmission errors, sends one extra hit of information with each character. Although it allows receiver to determine if a single bit has been changed parity can not detect transmission errors that change an even number of bits.
Question No: 6 ( M - 1 ) http://vuzs.net
Local Talk is a LAN technology that employs -------------
► Bus topology
► Ring topology
► Star topology ► None of the given
LOCAL TALK:
Apple invented the LAN technology that uses bus topology. Its interface is included with all Macintosh computers.
Question No: 7 ( M - 1 ) http://vuzs.net
Most LANs that employ ring topology use an access mechanism known as-------
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
► None of the given
Most LANs that employ ring technology use an access mechanism known as token passing. A token ring operates as a single, shared medium. When a computer wants to send data, it must wait until it obtains the token, when it is in control of the ring
Question No: 8 ( M - 1 ) http://vuzs.net
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.
► 64
► 48
► 32
► 8
Ethernet uses a 48-bit static addressing scheme
Question No: 9 ( M - 1 ) http://vuzs.net
Formally named __________ informally known as the thick wire Ethernet or Thick net.
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
Thick Ethernet, officially known as 10 Base 5, is the oldest form of Ethernet. It was originally developed in the late 1970's by Digital Equipment Corporation, IBM, and Xerox, and became an international standard (IEEE 802.3) in 1983.
Question No: 10 ( M - 1 ) http://vuzs.net
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
twisted pair ethernet
Formally called 10 Base –T
- Also twisted pair Ethernet or simply TP Ethernet
Question No: 11 ( M - 1 ) http://vuzs.net
The maximum size of an Ethernet segment is___________
► 250 meters
► 500 meters
► 700 meters
► None of the given
One Ethernet cable is sometimes called a segment. This segment is limited to 500 meters in length. The minimum separation between connections is 3 meters. (P# 27)
Question No: 12 ( M - 1 ) http://vuzs.net
A Bridge can ________
► Filter a frame
► Forward a frame
► Extend a LAN
► Do all the above
A bridge is a hardware device also used to connect two LAN segments to extend a LAN. It listens to all traffic and recognizes frame format. It also forwards only correct complete frames and discards the collided and error frames.
The most important task a bridge performs is frame filtering.
Question No: 13 ( M - 1 ) http://vuzs.net
_______ computes shortest paths in a graph by using weights on edges as a measure of distance.
► Greedy algorithm
► Distance vector algorithm
► Dijksta’s algorithm
► Non of the given
Dijkstras algorithm computes shortest paths in a graph by using weights on edg as a measure of distance. A path with the fewest number of edges may not be the path with least weight. (P# 173 e-books)
Question No: 14 ( M - 1 ) http://vuzs.net
__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
VARIABLE BIT RATE (VBR):
It is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
Question No: 15 ( M - 1 ) http://vuzs.net
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
► Connectionless service paradigm
► Connection-oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a connectionless service paradigm. Although a computer needs to wait for access to a shared medium before sending a packet
(zh,vuzs,nov10)
Question No: 16 ( M - 1 ) http://vuzs.net
The product of delay and throughput measures the _____ of data that can be present on the network.
► Area
► Volume
► Length
► None of the given
DELAY THROUPUT PRODUCT:
It is computed as delay time multiplied by effective throughput. It measures
amount of data that can be present in the network (P# 80)
Question No: 17 ( M - 1 ) http://vuzs.net
A network with throughput T and delay D has a total of ________ bit in transit at any time.
► T / D
► T x D
► T + D
► None of the given
A network with throughput T and delay D has a total of T x D bits in transit at
any time. (e-books)
Question No: 18 ( M - 1 ) http://vuzs.net
One repeater _______, two repeaters ________ the maximum cable length limitation.
► doubles, triple
► square roots, cude roots
► and, triple
► doubles, cancel
One repeater doubles, two repeaters triple the maximum cable length limitation. (P# 49)
Question No: 19 ( M - 1 ) http://vuzs.net
A network uses a ------ if all computers attach to a central point
► Star Topology
► Ring Topology
► Bus Topology
► None of the given
STAR TOPOLOGY:
In this topology, all computers are attached to a central point, which is sometimes called the “Hub” (P# 25)
Question No: 20 ( M - 1 ) http://vuzs.net
Computers attached to an ethernet use ------ in which a computer waits for the other to be idle before transmitting a frame.
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
► None of the given
All computers attached to the Ethernet use CSMA/CD to co-ordinate their activities. A computer wishing to transmit checks for electrical activity on the cable, informally called a carrier. If there is no carrier, the computer can transmit. If a carrier is present, the computer waits for the sender to finish before proceeding.
Question No: 21 ( M - 2 )
What is the difference between LAN and WAN?
Question No: 22 ( M - 2 )
Define the term Jitter.
Question No: 23 ( M - 3 )
GIve a comparision of wiring Schemes.
Question No: 24 ( M - 3 )
How can Switched Virtual Network be established?
Question No: 25 ( M - 5 )
Describe permanent virtual circuits (PVC).