FINAL TERM EXAMINATION
Spring 2010
CS610- Computer Network
Time: 90 min
Marks: 60
Question No: 19 ( Marks: 1 ) - Please choose one
The length of time required to send a variable length packet is variable and does not require a complicated interrupt scheme to detect completion of transmission.
► True
► False
Question No: 20 ( Marks: 1 ) - Please choose one
NEXT HEADER field in the base header defines type of header and it appears at end of fixed-size base header.
► True
► False
Question No: 21 ( Marks: 1 ) - Please choose one
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
Address mask defines how many bits of address are in suffix?
► True
► False
Question No: 23 ( Marks: 1 ) - Please choose one
A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
► True
► False
Question No: 24 ( Marks: 1 ) - Please choose one
In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.
► False
► True
Question No: 25 ( Marks: 1 ) - Please choose one
The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
► itself
► prefix
► suffix
► mask
Question No: 26 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the protocol address independent of hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, C
► D
► C
► T, D
Question No: 27 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T
► D
► C
► T, C
Question No: 28 ( Marks: 1 ) - Please choose one
Reconstruction of original datagram is called reassembly.
► True
► False
Question No: 29 ( Marks: 1 ) - Please choose one
A computer needs a complete stack of protocols to run either a client or a server.
► True
► False
Question No: 30 ( Marks: 1 ) - Please choose one
TCP uses _______ mechanism to control the flow of data.
► door
► window
► acknowledgment
► retransmission
Question No: 31 ( Marks: 2 )
To solve the problem the routers and networks in the Internet are divided into groups. How large do you think are these groups?
Question No: 32 ( Marks: 2 )
Traceroute continues to increment the Time To Live until the value is large enough for the datagram to reach its final destination. What happens when the TTL is sufficiently large for the datagram to reach its destination?
Question No: 33 ( Marks: 2 )
How can TCP monitor internet delays?
Question No: 34 ( Marks: 2 )
Which wireless standard is used in WIFI technology?
Question No: 35 ( Marks: 3 )
How does IP software reassemble fragments that arrive out of order?
Question No: 36 ( Marks: 3 )
What kind of information is in a routing table?
Question No: 37 ( Marks: 3 )
Define frames without type field?
Question No: 38 ( Marks: 3 )
What is the meaning of Facilities For Transit Routing as a characteristic of the Border Gateway Protocol?
Question No: 39 ( Marks: 5 )
What are the charachteristics of the Border Gateway Protocol?
Question No: 40 ( Marks: 5 )
Describe how NAT can be usefull for residence with cable modem or DSL?