Download CN Question Bank-3 - E

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

RapidIO wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

TCP congestion control wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Net bias wikipedia , lookup

AppleTalk wikipedia , lookup

Zigbee wikipedia , lookup

Distributed firewall wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Wake-on-LAN wikipedia , lookup

CAN bus wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Computer network wikipedia , lookup

Deep packet inspection wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

IEEE 1355 wikipedia , lookup

Internet protocol suite wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
NEHRU ARTS AND SCIENCE COLLEGE - COIMBATORE - 641 105
Class
: III BSC Computer Science
Semester
: V
Batch
: 2014 - 2017
COMPUTER NETWORKS
UNIT I
1 How many digits of the DNIC (Data Network Identification Code) identify the country
(1) first three (2) first four (3) first four
2 A station in a network forwards incoming packets by placing them on its shortest output
queue. What routing algorithm is being used?
(1) hot potato routing (2) flooding (3) static routing
3 Which of the following condition is used to transmit two packets over a medium at the
same time?
(1) Contention (2) Collision (3) Synchronous
4 The network layer concerns with
(1) bits (2) frames (3) packets
5 Which one of the following is not a function of network layer 1) (2) (3)
(1) routing (2) inter-networking (3) none of the mentioned
6 The 4 byte IP address consists of (1) (2) (3)
(1) network address (2) host address (3) both (a) and (b)
7 In virtual circuit network each packet contains
(1) full source and destination address (2) a short VC number (3) both a and b
8 Which of the following devices is a PC component that connects the computer to the
network?
(1) Bridge (2) NIC (3) DNS Server
9 Which of the following devices modulates digital signals into analog signals that can be
sent over traditional telephone lines?
(1) Router (2) Modem (3) Gateway
10 Which of the following devices takes data sent from one network device and forwards it
to all devices on the network regardless of the intended recipient?
(1) DNS Server (2) Switch (3) Hub
11 Which of the following devices takes data sent from one network device and forwards it
to the destination node based on MAC address?
(1) Hub (2) Switch (3) Gateway
12 Which of the following devices direct network traffic based not by MAC addresses but
by software-configured network addresses?
(1) Router (2) Hub (3) linker
13 Which of the following network devices/systems translates data from one format to
another?
(1) DHCP Server (2) Gateway (3) NIC
14 Which of the following terms is used to describe a hardware- or software-based device
that protects networks from outside threats?
(1) Gateway (2) Firewall (3) Hub
15 Which of the following devices assigns IP address to devices connected to a network
that uses TCP/IP
(1) DHCP Server (2) NIC (3) Gateway
16 Which of the following devices translates hostnames into IP address
(1) DNS Server (2) Hub (3) DHCP Server
17 What could cause a fixed disk error.
(1) No-CD installed (2) bad ram (3) None of the above
18 Missing slot covers on a computer can cause
(1) over heat (2) power surges (3) incomplete path for ESD
19 When installing PCI NICS you can check the IRQ availability by looking at
(1) dip switches (2) jumper settings (3) none
20 With respect to a network interface card, the term 10/100 refers to (1) (2) (3)
(1) protocol speed (2) a fiber speed (3) megabits per seconds
21 A hard disk is divided into tracks which are subdivided into:
(1) clusters (2) sectors (3) vectors
22 A wrist grounding strap contains which of the following:
(1) Capacitor (2) Voltmeter (3) none
23 What product is used to clean smudged keys on a keyboard
(1) TMC solvent (2) Denatured alcohol (3) none of the above
24 The physical layer concerns with
(1) bit-by-bit delivery (2) process to process delivery(3) none of the mentioned
25 Which transmission media has the highest transmission speed in a network
(1) coaxial cable (2) twisted pair cable (3) optical fiber
5 MARKS
1.
2.
3.
4.
5.
Write short notes on LAN and WAN
Explain MAN
Explain wireless networks.
Discuss about service primitivies
Differentiate connection-oriented and connectionless services
8 MARKS
1.
2.
3.
4.
Explain in detail about OSI Layer
Explain in detail about TCP/IP Layer
List and explain the design issues for the layers
Differentiate OSI and TCP/IP layer
UNIT II
1 physical layer provides
(1) mechanical specifications of electrical connectors and cables (2) electrical specification of
transmission line signal level (3) all of the mentioned
2 A group of computers and other devices connected together is called …………….
(1) network (2) networking (3) internet
3 Which of the following network is used to connect a number of computers to each other
by cables in a single location?
(1) LAN (2) WAN (3) MAN
4 Transmission Lines are also called as………………….
(1) circuits, channel &trunks (2) none (3) channels
5 The Switching Elements are also called as …
(1) host (2) interface message processors (3) th a and b
6 The signal which has infinitely many levels of intensity over a period of time is called
(1) digital signal (2) analog (3) sound signal
7 The distance a simple signal can travel in one period is called ……
(1) wave length (2) frequency (3) propogation
8 A noise where foreign signal enters the path of the transmitted signal is called ……
(1) cross talk (2) impulse (3) none
9 Which type of channel it is where the number of users are stable and the traffic is not
bursts?
(1) static (2) dynamic (3) both a and b
10 With Slotted Aloha, a …………. sends out small clock tick packets to the outlying
stations.
(1) centralized clock (2) decentralized clock (3) none
11 If there is only one station with a packet to send, this guarantees that there will
………….. For that packet.
(1) never to be collision (2) cohension (3) directions
12 The _______ layer provides a well defined service interface to the network layer,
determining how the bits of the physical layer are grouped into frames
(1) Datalink (2) Physical (3) Transport
13 ________ is the process in which the receiver tries to guess the message by using
redundant bits
(1) Forward error correction (2) connection oriented(3) confirm
14 In ______ type of service, no connection is established before hand or afterwards.
(1) unacknowledged connectionless service (2)point to point (3) acknowledged
connectionless service
15 The range of sequence number which is the concern of the receiver is called the receive
sliding window.
(1) receiving sliding window (2) sliding window (3)frame buffer
16 Data Link Control Protocol (HDLC) is implemented at the ………
(1) Data link layer (2) Physical layer (3) transport
17 The maximum size of the window in a Sliding Window Protocol is _______
(1) 2m-1 (2) 2m+1 (3) 2m
18 The _______ layer is the topmost layer in the subnet.
(1) network (2) transport (3) datalink
19 The subnet gets increasingly loaded with packets causing increase in delay in the
delivery of packets, which can lead to more retransmission, and ultimately increasing more
and more traffic. This is a concept called as _________
(1) Traffic jam (2) congestion (3) blockage
20 ______ is a static algorithm in which every incoming packet is sent out on every
outgoing line except the one it arrives on. This method usually generates vast number of
duplicate packets..
(1) Flooding (2) Block and wait (3) congestion
21 The Internet addresses are ______ bits in length in IPV4 addressing scheme
(1) 16 (2) 64 (3) 32
22 In addresses for _______ networks, the first 16 bits specify a particular network, and the
last 16 bits specify a particular host.
(1) class A (2) class c (3) class B
23 The number of network segments on which the datagram is allowed to travel before a
router should discard it is called _______.
(1) Time to live (2) Time to die (3) self regonition
24 An application process is assigned a process identifier number (process ID), which is
likely to be _______ each time that process is started.
(1) different (2) similar (3) smaller
25 A ________ is a 16-bit number used by the host-to-host protocol to identify to which
higher-level protocol or application program (process) it must deliver incoming messages
(1) connection (2) UDP (3) port
5 MARKS
1.
2.
3.
4.
5.
Write short note on twisted pair
Write short note on fibre optics
Differentiate between microwave and light wave transmission
Differentiate between satellites and fibre
Explain about low-earth orbit satellites
8 MARKS
1. Explain briefly about transmission media
2. Explain any two wireless transmission
3. Explain in detail about communication satellites
UNIT III
1 A UDP datagram of _____ bytes is acceptable to all implementations
(1) 516 (2) 1024 (3) 450
2 The service access points in Session Layer are called ________________
(1) session service (2) accessing (3) activation
3 Sessions are ended with ________ primitive
(1) S- RELEASE REQUEST (2) R- RELEASE REQUEST(3) B- RELEASE REQUEST
4 A procedure included in the caller’s address space by the linker is known as
(1) local (2) universe (3) addressing linker
5 The ______ protocol is based on end-to-end delivery.
(1) SMTP (2) HTTP (3) FTP
6 The sender SMTP establishes a TCP connection with the destination SMTP and then
waits for the server to send a ____ Service ready message..
(1) 220 (2) 420 (3) 320
7 There is _____ number of standard content types in MIME
(1) 7 (2) 5 (3) 3
8 To avoid ambiguity, the names assigned to machines must be carefully selected from a
______ with complete control over the binding between the names and IP addresses
(1) name space (2) none (3) table
9 A name in the _______ name space is a sequence of characters without structure
(1) DNS (2) logical address (3) table
10 The ______ are programs that run on DNS clients and DNS servers and that create
queries to extract information from name servers.
(1) resolvers (2) transporters (3) none
11 The next header t is an _____ field of Authentication Header that identifies the type of
what follows.
(1) 8 bit (2) 16 bit (3) 64 bit
12 The client code recognizes the SSL request and establishes a connection through TCP
port ____ to the SSL code on the server
(1) 443 (2) 402 (3) 1042
13 A _____ should be considered as a means to divide the world into two or more
networks: one or more secure networks and one or more non-secure networks.
(1) firewall (2) ESP (3) SSL
14 The _______ is used to provide integrity check, authentication, and encryption to IP
datagram’s.
(1) ESP (2) UDP (3) Transport layer
15 In most Wide Area Networks, the subnet consists of two distinct components: which are
they?
(1) Transmission lines switching elements (2) host(3) subnet
16 There are two types of designs for communication subnets: they are …………..
(1) Point to point (2) Packets (3) Switched
17 The main hardware components of a graphics workstation are …………
(1) Thick coax thin coax (2) Fiber optics (3) Twisted Pair
18 The purpose of a proxy server is to control exchange of data between the two networks
at …………..
(1) an application level (2) network layer (3)Physical layer
19 PGP is one of the protocols used to provide security at the ……….. It is designed to
create authenticated and confidential ……….
(1) application layer (2) network (3) presentation
20 The Aloha protocol is an OSI _______ protocol for LAN networks with broadcast
topology
(1) layer 1 (2) layer 4 (3) layer 2
21 The _______ is a unidirectional protocol that has no flow or error control.
(1) simplest or simplex (2) TCP/IP (3) HTTP
22 Flooding is also a……... algorithm, usually generates ………... of duplicate packets.
(1) static vast number (2) dynamic less number (3)static less number
23 Each IP address can identify the ………... or ………... of IP packets.
(1) Source and destination (2) length and size (3)source and length
24 Distance Vector Routing is a……... routing algorithm, it consists of a data structure
called a …
(1) static routing table (2) dynamic routing table (3)dynamic look up
25 The ____ namespace is based on a hierarchical and logical tree structure
(1) DNS (2) LOGICAL ADDRESS (3) TABLE
5 MARKS
1.
2.
3.
4.
5.
6.
7.
Discuss about Error-correcting codes
Explain stop and wait protocol
Write short note on carrier sense multiple access protocols
Discuss on collision-free protocols
Explain fast Ethernet
Explain the 802.11 MAC sublayer protocol
Explain the 802.16 MAC sublayer protocol
8 MARKS
1.
2.
3.
4.
5.
Explain about error detection and correction
Explain about sliding window protocol
Explain about Ethernet
Explain about wireless LANS
Discuss in detail about Bluetooth
UNIT IV
1 The network layer concerns with
(1) bits (2) frames (3) packets
2 Which one of the following is not a function of network layer?
(1) routing (2) congestion control (3) none of the mentioned
3 The 4 byte IP address consists of
(1) network address (2) host address (3) both (a) and (b)
4 In virtual circuit network each packet contains
(1) full source and destination address (2) a short VC number (3) both (a) and (b)
5 Which one of the following routing algorithm can be used for network layer design?
(1) shortest path algorithm (2) distance vector routing(3) all the mentioned
6 Multidestination routing
(1) data is not sent by packets (2) is same as broadcast routing (3) contains the list of all
destinations
7 A subset of a network that includes all the routers but contains no loops is called
(1) spanning tree (2) spider structure (3) spider tree
8 Which one of the following algorithm is not used for congestion control?
(1) traffic aware routing (2) admission control (3)none of the mentioned
9 The network layer protocol of internet is
(1) ethernet (2) internet protocol (3) hypertext transfer protocol
10 ICMP is primarily used for
(1) error and diagnostic functions (2) addressing(3) forwarding
11 The data link layer takes the packets from _____ and encapsulates them into frames for
transmission.
(1) network layer (2) physical layer (3) transport layer
12 Which one of the following task is not done by data link layer?
(1) framing (2) error control (3) flow control
13 Which sublayer of the data link layer performs data link functions that depend upon the
type of medium?
(1) logical link control sublayer (2) media access control sublayer (3) network interface
control sublayer
14 Header of a frame generally contains
(1) synchronization bytes (2) addresses (3) all of the mentioned
15 Automatic repeat request error management mechanism is provided by
(1) logical link control sublayer (2) media access control sublayer (3) network interface
control sublayer
16 When 2 or more bits in a data unit has been changed during the transmission, the error is
called
(1) random error (2) burst error (3) inverted error
17 CRC stands for
(1) cyclic redundancy check (2) code repeat check(3) code redundancy check
18 Protocols are?
(1) rules (2) Logical communication channels for transferring data (3) ) Physical
communication channels sued for transferring data
19 Which data communication method is used to transmit the data over a serial
communication link?
(1) Simplex (2) Half-duplex (3) Full duplex
20 The method of communication in The method of communication in which transaction
takes place in both directions, but only in one direction at a time, is called?
(1) Simplex (2) Full duplex (3) Half-duplex
21 Error detection at the data link layer is achieved by?
(1) Bit stuffing (2) Cyclic redundancy codes (3)Hamming codes
22 The topology with highest reliability is ?
(1) Star topology (2) Ring Topology (3) Mesh Topology
23 Baud means?
(1) The number of bits transmitted per unit time (2)The rate at which the signal
changes (3) The number of bytes transmitted per unit time
24 In OSI model dialogue control and token management are responsibilities of ?
(1) Session Layer (2) Network layer (3) Transport layer
25 How long is an IPv6 address?
(1) 32 bits (2) 128 bits (3) 128 bytes
5 MARKS
1.
2.
3.
4.
5.
6.
Write short note on shortest path routing algorithm
Explain broadcast and multicast routing
Explain the general principles of congestion control
Short notes on flow control and buffering
Explain TCP Segment Header
Explain TCP transmission policy
8 MARKS
1. Explain in detail about any four routing algorithms
2. Discuss about congestion control algorithms
3. Discuss in detail about connection establishment and connection release
4. Explain about TCP
UNIT V
1 The ____ translates internet domain and host names to IP address.
(1) domain name system (2) routing information protocol (3) internet relay chat
2 How does CSMA/CD react to collisions?
(1) All systems jam the network, and then all begin transmitting again. (2) Hosts involved in
the collision send a jam signal, and then run an algorithm before retransmitting (3) Collisions
do not occur on CSMA/CD.
3 Which one of the following allows a user at one site to establish a connection to another
site and then pass keystrokes from local host to remote host?
(1) HTTP (2) FTP (3) Telnet
4 How is equal access to the wire managed in a collision-oriented environment such as
Ethernet?
(1) Hosts check the wire for activity before attempting to send; if a collision happens, they
wait a random time period before attempting to send again. (2) Hosts are given equal access
to the wire by being allowed to transmit at specified time intervals (3) Hosts are given
prioritized access to the wire based on their MAC address.
5 Application layer protocol defines
(1) types of messages exchanged (2) message format, syntax and semantics (3) all of the
mentioned
6 Which one of the following protocol delivers/stores mail to receiver server?
(1) simple mail transfer protocol (2) post office protocol (3) ) hypertext transfer protocol
7 The ASCII encoding of binary data is called
(1) base 64 encoding (2) base 32 encoding (3) base 16 encoding
8 Which one of the following is an internet standard protocol for managing devices on IP
network?
(1) media gateway protocol (2) simple network management (3) internet message access
protocol
9 Which one of the following is not an application layer protocol?
(1) media gateway protocol (2) dynamic host configuration protocol (3) resource reservation
protocol
10 Which protocol is a signaling communication protocol used for controlling multimedia
communication sessions?
(1) session initiation protocol (2) session modeling protocol (3) session maintenance protocol
11 Which one of the following is not correct?
(1) application layer protocols are used by both source and destination devices during a
communication session(2) application layer protocols implemented on the source and
destination host must match (3) both (a) and (b)
12 When displaying a web page, the application layer uses the
(1) HTTP protocol (2) FTP protocol (3) SMTP protocol
13 Which answer correctly lists the OSI PDUs in order?
(1) Data, Packet, Frame, Segment, Bit (2) Bit, Data, Packet, Segment, Frame (3) Data,
Segment, Packet, Frame, Bit
14 Which transport layer protocol provides connection-oriented, reliable transport?
(1) FTP (2) TCP (3) Ethernet
15 In which layer of the TCP/IP stack is framing found?
(1) Network Access (2) Data Link (3) Internet
16 Which of the following WAN technologies is considered packet switched?
(1) Application (2) Transport (3) Network
17 Logical addressing is found Logical addressing is found in the ________________ layer,
while physical addressing is found in the ________________ layer
(1) Physical, Network (2) Data Link, Network (3)Network, Data Link
18 The OSI Reference Model layers, in order from top to bottom, are:
(1) Application, Physical, Session, Transport, Network, Data Link,
Presentation (2) Application, Presentation, Session, Transport, Network, Data Link,
Physical(3) Physical, Data Link, Network, Transport, Session, Presentation, Application
19 In the OSI model, as a data packet moves from the lower to the upper layers, headers are
_______.
(1) added (2) removed (3) rearranged
20 In the OSI model, encryption and decryption are functions of the ________ layer.
(1) transport (2) presentation (3) application
21 The ______ layer is responsible for moving frames from one hop (node) to the next.
(1) physical (2) data link (3) transport
22 The ______ layer adds a header to the packet coming from the upper layer that includes
the logical addresses of the sender and receiver.
(1) data link (2) physical (3) network
23 The Internetworking Protocol (IP) is a ________ protocol.
(1) reliable (2) connection-oriented (3) None of the choices are correct
24 A port address in TCP/IP is ______ bits long.
(1) 32 (2) 16 (3) 48
25 TCP stands for ____________
(1) Transmission Control Protocol (2) Transfer Control Protocol (3) Transceiver Control
Protocol
5 MARKS
1.
2.
3.
4.
5.
6.
7.
Explain DNS name space
Explain the message formats in electronic mail
Write short note on cryptography
Discuss about transposition cipher
Discuss about the concept of DES
Explain cipher models
Explain message digests
8 MARKS
1.
2.
3.
4.
5.
6.
Explain Domain Name System
Explain electronic mail
Discuss in detail about substitution ciphers
Explain AES symmetric key algorithm
Explain RSA public key algorithm
Discuss on digital signatures