|
Question No: 23 ( Marks: 1 ) - Please choose one
________ identifies the application program that sent the data.
► DestinationPort
► Source port
► Logical address
► None of the given
FieldDestinationPort identifies which application program on receiving computer should receive the data. While field source port identifies the application programs that sent the data. (reference from E-books)
Question No: 24 ( Marks: 1 ) - Please choose one
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP
► Both UDP and TCP
► None of the given
BORDER GATEWAY PROTOCOL:
It is most popular Exterior Gateway Protocol in Internet. It has following characteristics:
"It provides routing among autonomous systems (EGP).
"It provides policies to control routes advertised.
"It uses reliable transport (TCP).
Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following protocols allows the sender and receiver to enforce polices.
► RIP
► OSPF
► BGP
► RIP and OSPF
Question No: 26 ( Marks: 1 ) - Please choose one
____________ uses distance vector approach to define routing
► BGP
► OSPF
► RIP
► None of the given
ROUTING INFORMATION PROTOCOL (RIP):
It has the following characteristics:
"It is used for routing within an autonomous system (IGP).
"Hop Count Metric: RIP measures distance in network hops, where each network
between the source and destination counts as a single hop.
"It uses UDP for all message transmissions.
"RIP is used over LAN. Version 1 of RIP uses hardware broadcast and version 2 allows
delivery via multicast.
"It can be used to advertise default route propagation. An organization can use RIP to
install a default route in each router.
"It uses distance vector algorithm.
Question No: 27 ( Marks: 1 ) - Please choose one
ICMP message transport is acted upon by getting ICMP encrypted in IP.
► True
► False
ICMP message transport is acted upon by getting ICMP encapsulated in IP (P# 117)
Question No: 28 ( Marks: 1 ) - Please choose one
Protocol addresses are abstractions provided by ___________.
► hardware
► software
► operating system
► internet
Protocol addresses are abstractions provided by software
Question No: 29 ( Marks: 1 ) - Please choose one
These packets serve same purpose on ________ as frames on ______
► Intranet, LAN
► Internet, WAN
► Intranet, WAN
► Internet, LAN
VIRTUAL PACKETS:
These packets serve same purpose in Internet as frames on LAN
vu.ysapak.com
free solved material for final mid term papers at vu.ysapak.com
Question No: 30 ( Marks: 1 ) - Please choose one
Address mask defines how many bits of address are in suffix?
► True
► False
Address mask defines how many bits of address are in prefix. Prefix defines how much of address used to identify network.
Question No: 31 ( Marks: 1 ) - Please choose one
A single networking technology is best for all needs.
► True
► False
There is no single networking technology that is best for all needs
Question No: 32 ( Marks: 1 ) - Please choose one
A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
► True
► False
The chief problems with multiple networks are as follows:
• A computer attached to a given network can only communicate with other
computers attached to the same network.
Question No: 33 ( Marks: 1 ) - Please choose one
The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
► itself
► prefix
► suffix
► mask
Classful IP addresses are self-identifying because the class of the address can be computed from the address itself
Question No: 34 ( Marks: 1 ) - Please choose one
Find the class of the address.
10100111 11011011 10001011 01101111
► A
► B
► E
► C
Reference table handouts P # 87
Question No: 35 ( Marks: 1 ) - Please choose one
Find the class of the address:
11110011 10011011 11111011 00001111
► A
► C
► E
► B
Reference table handouts P # 87
Question No: 36 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T
► D
► C
► T, C
Reference table handouts P # 97
Question No: 37 ( Marks: 1 ) - Please choose one
Which method of Address Resolution Protocol requires hardware broadcast?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► D
► T
► C
► T, D
Reference table handouts P # 97
vu.ysapak.com
free solved material for final mid term papers at vu.ysapak.com
Question No: 38 ( Marks: 1 ) - Please choose one
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, D
► c
► T
► T, C
Reference table handouts P # 97
Question No: 39 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, C
► T
► C
► D
Reference table handouts P # 97
Question No: 40 ( Marks: 1 ) - Please choose one
On of the design goals for unicast route propagation is __________.
► Consistency
► inconsistency
► stability
► dynamic addressing
On of the design goals for unicast route propagation is stability—continual changes in route are undesirable because they lead to higher jitter and datagram arriving out of order. Thus, once a unicast routing protocol finds a shortest path, it usually retains the route until a failure makes the path unusable. (Reference from E-book)
Question No: 41 ( Marks: 1 ) - Please choose one
Propagation multicast routing information differs dramatically from unicast route propagation?
► True
► False
Propagating multicast routing information differs dramatically from unicast route propagation. The difference arises because internet multicast allows dynamic group membership and autonomous senders
Question No: 42 ( Marks: 1 ) - Please choose one
The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.
► One or more
► only one
► no
► many
Question No: 43 ( Marks: 1 ) - Please choose one
To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
► True
► False
To save traffic, an EGP summerize routing information from the autonomous system before passing it to another autonomous system. More important an EGP implements policy constraints that allow a system manager to determine exactly what information is released outside the organization. (Reference from E-book)
Question No: 44 ( Marks: 1 ) - Please choose one
In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.
► Anycast
► Unicast
► Multicast
► Non of the given
Following are special types of addresses, IPv6 uses:
Unicast: It is used for single destination computer.
Multicast: It is used for multiple destinations; possibly not at same site.
Cluster: This type of address is used for collection of computers with same prefix,
datagram is delivered to one out of cluster.
Question No: 45 ( Marks: 1 ) - Please choose one
Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
► Unicast
► Anycast
► Multicast
► Non of the given
Following are special types of addresses, IPv6 uses:
Unicast: It is used for single destination computer.
Multicast: It is used for multiple destinations; possibly not at same site.
Cluster: This type of address is used for collection of computers with same prefix,
datagram is delivered to one out of cluster.
Question No: 46 ( Marks: 1 ) - Please choose one
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
► True
► False
UDP offers application programs a Message-Oriented Interface. It does not divide messages into packets for transmission and does not combine messages for delivery.
ADVANTAGES:
• Applications can depend on protocol to preserve data boundaries.
Question No: 47 ( Marks: 1 ) - Please choose one
Reliability is the responsibility of the _________ layer
► Network
► Datalink
► Transport
► Application
Reliability is the responsibility of the Transport layer
Question No: 48 ( Marks: 1 ) - Please choose one
TCP uses _______ mechanism to control the flow of data.
► door
► window
► acknowledgment
► retransmission
TCP uses window mechanism to control the flow of data.
Question No: 49 ( Marks: 1 ) - Please choose one
The time for acknowledgement to arrival of packet depends on.
► Distance to destination and Current traffic conditions
► Current traffic conditions
► Distance to destination
► non of these
The time for acknowledgement to arrive depends on:
• Distance to destination
• Current traffic conditions
Question No: 50 ( Marks: 1 ) - Please choose one
FDDI can transmits data at a rate of ----------
► 100 million bits per second
► 10 million bits per second
► 1000 million bits per second
► None of the given
FDDI: Fiber distributed data interconnect (FDDI) is another ring technology. Its most
important features are:
It uses fiber optics between stations and transmits data at 100Mbps.
Question No: 51 ( Marks: 2 )
How can we prove that we have 2,147,483,648 addresses in class A?
Question No: 52 ( Marks: 2 )
Why is internet multicast routing difficult?
Question No: 53 ( Marks: 2 )
Define what is the Extension Headers in IPv6.
Question No: 54 ( Marks: 3 )
How does IP software reassemble fragments that arrive out of order?
Question No: 55 ( Marks: 3 )
What is the first address in the block if one of the addresses is 167.199.170.82/27?
Question No: 56 ( Marks: 3 )
In internet routing how does a host join or leave a group?
Question No: 57 ( Marks: 5 )
What is the role of area in open shortest path first (OSPF)?
Question No: 58 ( Marks: 5 )
Write a note on Address Resolution.
Question No: 59 ( Marks: 10 )
What is the concept of classes for IP Addresses? Briefly describe each class.
http://ping.fm/r8fB7
________ identifies the application program that sent the data.
► DestinationPort
► Source port
► Logical address
► None of the given
FieldDestinationPort identifies which application program on receiving computer should receive the data. While field source port identifies the application programs that sent the data. (reference from E-books)
Question No: 24 ( Marks: 1 ) - Please choose one
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP
► Both UDP and TCP
► None of the given
BORDER GATEWAY PROTOCOL:
It is most popular Exterior Gateway Protocol in Internet. It has following characteristics:
"It provides routing among autonomous systems (EGP).
"It provides policies to control routes advertised.
"It uses reliable transport (TCP).
Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following protocols allows the sender and receiver to enforce polices.
► RIP
► OSPF
► BGP
► RIP and OSPF
Question No: 26 ( Marks: 1 ) - Please choose one
____________ uses distance vector approach to define routing
► BGP
► OSPF
► RIP
► None of the given
ROUTING INFORMATION PROTOCOL (RIP):
It has the following characteristics:
"It is used for routing within an autonomous system (IGP).
"Hop Count Metric: RIP measures distance in network hops, where each network
between the source and destination counts as a single hop.
"It uses UDP for all message transmissions.
"RIP is used over LAN. Version 1 of RIP uses hardware broadcast and version 2 allows
delivery via multicast.
"It can be used to advertise default route propagation. An organization can use RIP to
install a default route in each router.
"It uses distance vector algorithm.
Question No: 27 ( Marks: 1 ) - Please choose one
ICMP message transport is acted upon by getting ICMP encrypted in IP.
► True
► False
ICMP message transport is acted upon by getting ICMP encapsulated in IP (P# 117)
Question No: 28 ( Marks: 1 ) - Please choose one
Protocol addresses are abstractions provided by ___________.
► hardware
► software
► operating system
► internet
Protocol addresses are abstractions provided by software
Question No: 29 ( Marks: 1 ) - Please choose one
These packets serve same purpose on ________ as frames on ______
► Intranet, LAN
► Internet, WAN
► Intranet, WAN
► Internet, LAN
VIRTUAL PACKETS:
These packets serve same purpose in Internet as frames on LAN
vu.ysapak.com
free solved material for final mid term papers at vu.ysapak.com
Question No: 30 ( Marks: 1 ) - Please choose one
Address mask defines how many bits of address are in suffix?
► True
► False
Address mask defines how many bits of address are in prefix. Prefix defines how much of address used to identify network.
Question No: 31 ( Marks: 1 ) - Please choose one
A single networking technology is best for all needs.
► True
► False
There is no single networking technology that is best for all needs
Question No: 32 ( Marks: 1 ) - Please choose one
A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
► True
► False
The chief problems with multiple networks are as follows:
• A computer attached to a given network can only communicate with other
computers attached to the same network.
Question No: 33 ( Marks: 1 ) - Please choose one
The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
► itself
► prefix
► suffix
► mask
Classful IP addresses are self-identifying because the class of the address can be computed from the address itself
Question No: 34 ( Marks: 1 ) - Please choose one
Find the class of the address.
10100111 11011011 10001011 01101111
► A
► B
► E
► C
Reference table handouts P # 87
Question No: 35 ( Marks: 1 ) - Please choose one
Find the class of the address:
11110011 10011011 11111011 00001111
► A
► C
► E
► B
Reference table handouts P # 87
Question No: 36 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T
► D
► C
► T, C
Reference table handouts P # 97
Question No: 37 ( Marks: 1 ) - Please choose one
Which method of Address Resolution Protocol requires hardware broadcast?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► D
► T
► C
► T, D
Reference table handouts P # 97
vu.ysapak.com
free solved material for final mid term papers at vu.ysapak.com
Question No: 38 ( Marks: 1 ) - Please choose one
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, D
► c
► T
► T, C
Reference table handouts P # 97
Question No: 39 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, C
► T
► C
► D
Reference table handouts P # 97
Question No: 40 ( Marks: 1 ) - Please choose one
On of the design goals for unicast route propagation is __________.
► Consistency
► inconsistency
► stability
► dynamic addressing
On of the design goals for unicast route propagation is stability—continual changes in route are undesirable because they lead to higher jitter and datagram arriving out of order. Thus, once a unicast routing protocol finds a shortest path, it usually retains the route until a failure makes the path unusable. (Reference from E-book)
Question No: 41 ( Marks: 1 ) - Please choose one
Propagation multicast routing information differs dramatically from unicast route propagation?
► True
► False
Propagating multicast routing information differs dramatically from unicast route propagation. The difference arises because internet multicast allows dynamic group membership and autonomous senders
Question No: 42 ( Marks: 1 ) - Please choose one
The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.
► One or more
► only one
► no
► many
Question No: 43 ( Marks: 1 ) - Please choose one
To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
► True
► False
To save traffic, an EGP summerize routing information from the autonomous system before passing it to another autonomous system. More important an EGP implements policy constraints that allow a system manager to determine exactly what information is released outside the organization. (Reference from E-book)
Question No: 44 ( Marks: 1 ) - Please choose one
In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.
► Anycast
► Unicast
► Multicast
► Non of the given
Following are special types of addresses, IPv6 uses:
Unicast: It is used for single destination computer.
Multicast: It is used for multiple destinations; possibly not at same site.
Cluster: This type of address is used for collection of computers with same prefix,
datagram is delivered to one out of cluster.
Question No: 45 ( Marks: 1 ) - Please choose one
Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
► Unicast
► Anycast
► Multicast
► Non of the given
Following are special types of addresses, IPv6 uses:
Unicast: It is used for single destination computer.
Multicast: It is used for multiple destinations; possibly not at same site.
Cluster: This type of address is used for collection of computers with same prefix,
datagram is delivered to one out of cluster.
Question No: 46 ( Marks: 1 ) - Please choose one
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
► True
► False
UDP offers application programs a Message-Oriented Interface. It does not divide messages into packets for transmission and does not combine messages for delivery.
ADVANTAGES:
• Applications can depend on protocol to preserve data boundaries.
Question No: 47 ( Marks: 1 ) - Please choose one
Reliability is the responsibility of the _________ layer
► Network
► Datalink
► Transport
► Application
Reliability is the responsibility of the Transport layer
Question No: 48 ( Marks: 1 ) - Please choose one
TCP uses _______ mechanism to control the flow of data.
► door
► window
► acknowledgment
► retransmission
TCP uses window mechanism to control the flow of data.
Question No: 49 ( Marks: 1 ) - Please choose one
The time for acknowledgement to arrival of packet depends on.
► Distance to destination and Current traffic conditions
► Current traffic conditions
► Distance to destination
► non of these
The time for acknowledgement to arrive depends on:
• Distance to destination
• Current traffic conditions
Question No: 50 ( Marks: 1 ) - Please choose one
FDDI can transmits data at a rate of ----------
► 100 million bits per second
► 10 million bits per second
► 1000 million bits per second
► None of the given
FDDI: Fiber distributed data interconnect (FDDI) is another ring technology. Its most
important features are:
It uses fiber optics between stations and transmits data at 100Mbps.
Question No: 51 ( Marks: 2 )
How can we prove that we have 2,147,483,648 addresses in class A?
Question No: 52 ( Marks: 2 )
Why is internet multicast routing difficult?
Question No: 53 ( Marks: 2 )
Define what is the Extension Headers in IPv6.
Question No: 54 ( Marks: 3 )
How does IP software reassemble fragments that arrive out of order?
Question No: 55 ( Marks: 3 )
What is the first address in the block if one of the addresses is 167.199.170.82/27?
Question No: 56 ( Marks: 3 )
In internet routing how does a host join or leave a group?
Question No: 57 ( Marks: 5 )
What is the role of area in open shortest path first (OSPF)?
Question No: 58 ( Marks: 5 )
Write a note on Address Resolution.
Question No: 59 ( Marks: 10 )
What is the concept of classes for IP Addresses? Briefly describe each class.
http://ping.fm/r8fB7