* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download CN Question Bank-3 - E
Multiprotocol Label Switching wikipedia , lookup
TCP congestion control wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Distributed firewall wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Asynchronous Transfer Mode wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Computer network wikipedia , lookup
Deep packet inspection wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Internet protocol suite wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
NEHRU ARTS AND SCIENCE COLLEGE - COIMBATORE - 641 105 Class : III BSC Computer Science Semester : V Batch : 2014 - 2017 COMPUTER NETWORKS UNIT I 1 How many digits of the DNIC (Data Network Identification Code) identify the country (1) first three (2) first four (3) first four 2 A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? (1) hot potato routing (2) flooding (3) static routing 3 Which of the following condition is used to transmit two packets over a medium at the same time? (1) Contention (2) Collision (3) Synchronous 4 The network layer concerns with (1) bits (2) frames (3) packets 5 Which one of the following is not a function of network layer 1) (2) (3) (1) routing (2) inter-networking (3) none of the mentioned 6 The 4 byte IP address consists of (1) (2) (3) (1) network address (2) host address (3) both (a) and (b) 7 In virtual circuit network each packet contains (1) full source and destination address (2) a short VC number (3) both a and b 8 Which of the following devices is a PC component that connects the computer to the network? (1) Bridge (2) NIC (3) DNS Server 9 Which of the following devices modulates digital signals into analog signals that can be sent over traditional telephone lines? (1) Router (2) Modem (3) Gateway 10 Which of the following devices takes data sent from one network device and forwards it to all devices on the network regardless of the intended recipient? (1) DNS Server (2) Switch (3) Hub 11 Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address? (1) Hub (2) Switch (3) Gateway 12 Which of the following devices direct network traffic based not by MAC addresses but by software-configured network addresses? (1) Router (2) Hub (3) linker 13 Which of the following network devices/systems translates data from one format to another? (1) DHCP Server (2) Gateway (3) NIC 14 Which of the following terms is used to describe a hardware- or software-based device that protects networks from outside threats? (1) Gateway (2) Firewall (3) Hub 15 Which of the following devices assigns IP address to devices connected to a network that uses TCP/IP (1) DHCP Server (2) NIC (3) Gateway 16 Which of the following devices translates hostnames into IP address (1) DNS Server (2) Hub (3) DHCP Server 17 What could cause a fixed disk error. (1) No-CD installed (2) bad ram (3) None of the above 18 Missing slot covers on a computer can cause (1) over heat (2) power surges (3) incomplete path for ESD 19 When installing PCI NICS you can check the IRQ availability by looking at (1) dip switches (2) jumper settings (3) none 20 With respect to a network interface card, the term 10/100 refers to (1) (2) (3) (1) protocol speed (2) a fiber speed (3) megabits per seconds 21 A hard disk is divided into tracks which are subdivided into: (1) clusters (2) sectors (3) vectors 22 A wrist grounding strap contains which of the following: (1) Capacitor (2) Voltmeter (3) none 23 What product is used to clean smudged keys on a keyboard (1) TMC solvent (2) Denatured alcohol (3) none of the above 24 The physical layer concerns with (1) bit-by-bit delivery (2) process to process delivery(3) none of the mentioned 25 Which transmission media has the highest transmission speed in a network (1) coaxial cable (2) twisted pair cable (3) optical fiber 5 MARKS 1. 2. 3. 4. 5. Write short notes on LAN and WAN Explain MAN Explain wireless networks. Discuss about service primitivies Differentiate connection-oriented and connectionless services 8 MARKS 1. 2. 3. 4. Explain in detail about OSI Layer Explain in detail about TCP/IP Layer List and explain the design issues for the layers Differentiate OSI and TCP/IP layer UNIT II 1 physical layer provides (1) mechanical specifications of electrical connectors and cables (2) electrical specification of transmission line signal level (3) all of the mentioned 2 A group of computers and other devices connected together is called ……………. (1) network (2) networking (3) internet 3 Which of the following network is used to connect a number of computers to each other by cables in a single location? (1) LAN (2) WAN (3) MAN 4 Transmission Lines are also called as…………………. (1) circuits, channel &trunks (2) none (3) channels 5 The Switching Elements are also called as … (1) host (2) interface message processors (3) th a and b 6 The signal which has infinitely many levels of intensity over a period of time is called (1) digital signal (2) analog (3) sound signal 7 The distance a simple signal can travel in one period is called …… (1) wave length (2) frequency (3) propogation 8 A noise where foreign signal enters the path of the transmitted signal is called …… (1) cross talk (2) impulse (3) none 9 Which type of channel it is where the number of users are stable and the traffic is not bursts? (1) static (2) dynamic (3) both a and b 10 With Slotted Aloha, a …………. sends out small clock tick packets to the outlying stations. (1) centralized clock (2) decentralized clock (3) none 11 If there is only one station with a packet to send, this guarantees that there will ………….. For that packet. (1) never to be collision (2) cohension (3) directions 12 The _______ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames (1) Datalink (2) Physical (3) Transport 13 ________ is the process in which the receiver tries to guess the message by using redundant bits (1) Forward error correction (2) connection oriented(3) confirm 14 In ______ type of service, no connection is established before hand or afterwards. (1) unacknowledged connectionless service (2)point to point (3) acknowledged connectionless service 15 The range of sequence number which is the concern of the receiver is called the receive sliding window. (1) receiving sliding window (2) sliding window (3)frame buffer 16 Data Link Control Protocol (HDLC) is implemented at the ……… (1) Data link layer (2) Physical layer (3) transport 17 The maximum size of the window in a Sliding Window Protocol is _______ (1) 2m-1 (2) 2m+1 (3) 2m 18 The _______ layer is the topmost layer in the subnet. (1) network (2) transport (3) datalink 19 The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ (1) Traffic jam (2) congestion (3) blockage 20 ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. (1) Flooding (2) Block and wait (3) congestion 21 The Internet addresses are ______ bits in length in IPV4 addressing scheme (1) 16 (2) 64 (3) 32 22 In addresses for _______ networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host. (1) class A (2) class c (3) class B 23 The number of network segments on which the datagram is allowed to travel before a router should discard it is called _______. (1) Time to live (2) Time to die (3) self regonition 24 An application process is assigned a process identifier number (process ID), which is likely to be _______ each time that process is started. (1) different (2) similar (3) smaller 25 A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher-level protocol or application program (process) it must deliver incoming messages (1) connection (2) UDP (3) port 5 MARKS 1. 2. 3. 4. 5. Write short note on twisted pair Write short note on fibre optics Differentiate between microwave and light wave transmission Differentiate between satellites and fibre Explain about low-earth orbit satellites 8 MARKS 1. Explain briefly about transmission media 2. Explain any two wireless transmission 3. Explain in detail about communication satellites UNIT III 1 A UDP datagram of _____ bytes is acceptable to all implementations (1) 516 (2) 1024 (3) 450 2 The service access points in Session Layer are called ________________ (1) session service (2) accessing (3) activation 3 Sessions are ended with ________ primitive (1) S- RELEASE REQUEST (2) R- RELEASE REQUEST(3) B- RELEASE REQUEST 4 A procedure included in the caller’s address space by the linker is known as (1) local (2) universe (3) addressing linker 5 The ______ protocol is based on end-to-end delivery. (1) SMTP (2) HTTP (3) FTP 6 The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ____ Service ready message.. (1) 220 (2) 420 (3) 320 7 There is _____ number of standard content types in MIME (1) 7 (2) 5 (3) 3 8 To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses (1) name space (2) none (3) table 9 A name in the _______ name space is a sequence of characters without structure (1) DNS (2) logical address (3) table 10 The ______ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers. (1) resolvers (2) transporters (3) none 11 The next header t is an _____ field of Authentication Header that identifies the type of what follows. (1) 8 bit (2) 16 bit (3) 64 bit 12 The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server (1) 443 (2) 402 (3) 1042 13 A _____ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks. (1) firewall (2) ESP (3) SSL 14 The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. (1) ESP (2) UDP (3) Transport layer 15 In most Wide Area Networks, the subnet consists of two distinct components: which are they? (1) Transmission lines switching elements (2) host(3) subnet 16 There are two types of designs for communication subnets: they are ………….. (1) Point to point (2) Packets (3) Switched 17 The main hardware components of a graphics workstation are ………… (1) Thick coax thin coax (2) Fiber optics (3) Twisted Pair 18 The purpose of a proxy server is to control exchange of data between the two networks at ………….. (1) an application level (2) network layer (3)Physical layer 19 PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. (1) application layer (2) network (3) presentation 20 The Aloha protocol is an OSI _______ protocol for LAN networks with broadcast topology (1) layer 1 (2) layer 4 (3) layer 2 21 The _______ is a unidirectional protocol that has no flow or error control. (1) simplest or simplex (2) TCP/IP (3) HTTP 22 Flooding is also a……... algorithm, usually generates ………... of duplicate packets. (1) static vast number (2) dynamic less number (3)static less number 23 Each IP address can identify the ………... or ………... of IP packets. (1) Source and destination (2) length and size (3)source and length 24 Distance Vector Routing is a……... routing algorithm, it consists of a data structure called a … (1) static routing table (2) dynamic routing table (3)dynamic look up 25 The ____ namespace is based on a hierarchical and logical tree structure (1) DNS (2) LOGICAL ADDRESS (3) TABLE 5 MARKS 1. 2. 3. 4. 5. 6. 7. Discuss about Error-correcting codes Explain stop and wait protocol Write short note on carrier sense multiple access protocols Discuss on collision-free protocols Explain fast Ethernet Explain the 802.11 MAC sublayer protocol Explain the 802.16 MAC sublayer protocol 8 MARKS 1. 2. 3. 4. 5. Explain about error detection and correction Explain about sliding window protocol Explain about Ethernet Explain about wireless LANS Discuss in detail about Bluetooth UNIT IV 1 The network layer concerns with (1) bits (2) frames (3) packets 2 Which one of the following is not a function of network layer? (1) routing (2) congestion control (3) none of the mentioned 3 The 4 byte IP address consists of (1) network address (2) host address (3) both (a) and (b) 4 In virtual circuit network each packet contains (1) full source and destination address (2) a short VC number (3) both (a) and (b) 5 Which one of the following routing algorithm can be used for network layer design? (1) shortest path algorithm (2) distance vector routing(3) all the mentioned 6 Multidestination routing (1) data is not sent by packets (2) is same as broadcast routing (3) contains the list of all destinations 7 A subset of a network that includes all the routers but contains no loops is called (1) spanning tree (2) spider structure (3) spider tree 8 Which one of the following algorithm is not used for congestion control? (1) traffic aware routing (2) admission control (3)none of the mentioned 9 The network layer protocol of internet is (1) ethernet (2) internet protocol (3) hypertext transfer protocol 10 ICMP is primarily used for (1) error and diagnostic functions (2) addressing(3) forwarding 11 The data link layer takes the packets from _____ and encapsulates them into frames for transmission. (1) network layer (2) physical layer (3) transport layer 12 Which one of the following task is not done by data link layer? (1) framing (2) error control (3) flow control 13 Which sublayer of the data link layer performs data link functions that depend upon the type of medium? (1) logical link control sublayer (2) media access control sublayer (3) network interface control sublayer 14 Header of a frame generally contains (1) synchronization bytes (2) addresses (3) all of the mentioned 15 Automatic repeat request error management mechanism is provided by (1) logical link control sublayer (2) media access control sublayer (3) network interface control sublayer 16 When 2 or more bits in a data unit has been changed during the transmission, the error is called (1) random error (2) burst error (3) inverted error 17 CRC stands for (1) cyclic redundancy check (2) code repeat check(3) code redundancy check 18 Protocols are? (1) rules (2) Logical communication channels for transferring data (3) ) Physical communication channels sued for transferring data 19 Which data communication method is used to transmit the data over a serial communication link? (1) Simplex (2) Half-duplex (3) Full duplex 20 The method of communication in The method of communication in which transaction takes place in both directions, but only in one direction at a time, is called? (1) Simplex (2) Full duplex (3) Half-duplex 21 Error detection at the data link layer is achieved by? (1) Bit stuffing (2) Cyclic redundancy codes (3)Hamming codes 22 The topology with highest reliability is ? (1) Star topology (2) Ring Topology (3) Mesh Topology 23 Baud means? (1) The number of bits transmitted per unit time (2)The rate at which the signal changes (3) The number of bytes transmitted per unit time 24 In OSI model dialogue control and token management are responsibilities of ? (1) Session Layer (2) Network layer (3) Transport layer 25 How long is an IPv6 address? (1) 32 bits (2) 128 bits (3) 128 bytes 5 MARKS 1. 2. 3. 4. 5. 6. Write short note on shortest path routing algorithm Explain broadcast and multicast routing Explain the general principles of congestion control Short notes on flow control and buffering Explain TCP Segment Header Explain TCP transmission policy 8 MARKS 1. Explain in detail about any four routing algorithms 2. Discuss about congestion control algorithms 3. Discuss in detail about connection establishment and connection release 4. Explain about TCP UNIT V 1 The ____ translates internet domain and host names to IP address. (1) domain name system (2) routing information protocol (3) internet relay chat 2 How does CSMA/CD react to collisions? (1) All systems jam the network, and then all begin transmitting again. (2) Hosts involved in the collision send a jam signal, and then run an algorithm before retransmitting (3) Collisions do not occur on CSMA/CD. 3 Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? (1) HTTP (2) FTP (3) Telnet 4 How is equal access to the wire managed in a collision-oriented environment such as Ethernet? (1) Hosts check the wire for activity before attempting to send; if a collision happens, they wait a random time period before attempting to send again. (2) Hosts are given equal access to the wire by being allowed to transmit at specified time intervals (3) Hosts are given prioritized access to the wire based on their MAC address. 5 Application layer protocol defines (1) types of messages exchanged (2) message format, syntax and semantics (3) all of the mentioned 6 Which one of the following protocol delivers/stores mail to receiver server? (1) simple mail transfer protocol (2) post office protocol (3) ) hypertext transfer protocol 7 The ASCII encoding of binary data is called (1) base 64 encoding (2) base 32 encoding (3) base 16 encoding 8 Which one of the following is an internet standard protocol for managing devices on IP network? (1) media gateway protocol (2) simple network management (3) internet message access protocol 9 Which one of the following is not an application layer protocol? (1) media gateway protocol (2) dynamic host configuration protocol (3) resource reservation protocol 10 Which protocol is a signaling communication protocol used for controlling multimedia communication sessions? (1) session initiation protocol (2) session modeling protocol (3) session maintenance protocol 11 Which one of the following is not correct? (1) application layer protocols are used by both source and destination devices during a communication session(2) application layer protocols implemented on the source and destination host must match (3) both (a) and (b) 12 When displaying a web page, the application layer uses the (1) HTTP protocol (2) FTP protocol (3) SMTP protocol 13 Which answer correctly lists the OSI PDUs in order? (1) Data, Packet, Frame, Segment, Bit (2) Bit, Data, Packet, Segment, Frame (3) Data, Segment, Packet, Frame, Bit 14 Which transport layer protocol provides connection-oriented, reliable transport? (1) FTP (2) TCP (3) Ethernet 15 In which layer of the TCP/IP stack is framing found? (1) Network Access (2) Data Link (3) Internet 16 Which of the following WAN technologies is considered packet switched? (1) Application (2) Transport (3) Network 17 Logical addressing is found Logical addressing is found in the ________________ layer, while physical addressing is found in the ________________ layer (1) Physical, Network (2) Data Link, Network (3)Network, Data Link 18 The OSI Reference Model layers, in order from top to bottom, are: (1) Application, Physical, Session, Transport, Network, Data Link, Presentation (2) Application, Presentation, Session, Transport, Network, Data Link, Physical(3) Physical, Data Link, Network, Transport, Session, Presentation, Application 19 In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. (1) added (2) removed (3) rearranged 20 In the OSI model, encryption and decryption are functions of the ________ layer. (1) transport (2) presentation (3) application 21 The ______ layer is responsible for moving frames from one hop (node) to the next. (1) physical (2) data link (3) transport 22 The ______ layer adds a header to the packet coming from the upper layer that includes the logical addresses of the sender and receiver. (1) data link (2) physical (3) network 23 The Internetworking Protocol (IP) is a ________ protocol. (1) reliable (2) connection-oriented (3) None of the choices are correct 24 A port address in TCP/IP is ______ bits long. (1) 32 (2) 16 (3) 48 25 TCP stands for ____________ (1) Transmission Control Protocol (2) Transfer Control Protocol (3) Transceiver Control Protocol 5 MARKS 1. 2. 3. 4. 5. 6. 7. Explain DNS name space Explain the message formats in electronic mail Write short note on cryptography Discuss about transposition cipher Discuss about the concept of DES Explain cipher models Explain message digests 8 MARKS 1. 2. 3. 4. 5. 6. Explain Domain Name System Explain electronic mail Discuss in detail about substitution ciphers Explain AES symmetric key algorithm Explain RSA public key algorithm Discuss on digital signatures