Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
COMPUTER NETWORK
1) The address of a class B host is to be split into subnets with a 6 - bit subnet 2 points
number. What is the maximum number of subnets and maximum number of hosts in
each subnet? *
2) Which of the following devices takes data sent from one network device and 2 points
forwards it to the destination node based on MAC address? *
(1) Hub
(2) Modem
(3) Switch
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 1/18
6/21/2020 Computer Networks Test 2
(3) S tc
(4) Gateway
4) Station A uses 32 byte packets to transmit messages to station B using sliding 2 points
window protocol. The round trip delay between A and B is 40 milli seconds and the
bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window
size of A is *
(1) 20
(2) 10
(3) 30
(4) 40
5) In a packet switching network, if the message size is 48 bytes and each packet 2 points
contains a header of 3 bytes. If 24 packets are required to transmit the message, the
packet size is ................ *
(1) 2 bytes
(2) 1 byte
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 2/18
6/21/2020 Computer Networks Test 2
(3) 4 bytes
(4) 5 bytes
6) A node X on a 10 Mbps network is regulated by a token bucket. The token bucket 2 points
is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The
maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs. *
(1) 1
(2) 2
(3) 3
(4) 4
7) The maximum size of the data that the application layer can pass on to the TCP 2 points
layer below is ......... *
8) A packet whose destination is outside the local TCP/IP network segment is sent to 2 points
.............. *
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 3/18
6/21/2020 Computer Networks Test 2
9) Distance vector routing algorithm is a dynamic routing algorithm. The routing 2 points
(1) automatically
(2) by server
10) In link state routing algorithm after construction of link state packets, new routes 2 points
(4) Packets
11) If link transmits 4000 frames per second and each slot has 8 bits, the transmission 2 points
(A) 64 Kbps
(B) 32 Mbps
(C) 32 Kbps
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 4/18
6/21/2020 Computer Networks Test 2
(D) 64 Mbps
12) Given the following statements: (a) Frequency Division Multiplexing is a 2 points
technique that can be applied when the bandwidth of a link is greater than combined
bandwidth of signals to be transmitted.(b) Wavelength Division Multiplexing
(WDM) is an analog multiplexing Technique to combine optical signals. (c) WDM is
a Digital Multiplexing Technique. (d) TDM is a Digital Multiplexing Technique.
Which of the following is correct? *
13) Assume that we need to download text documents at the rate of 100 pages per 2 points
minute. A page is an average of 24 lines with 80 characters in each line and each
character requires 8 bits. Then the required bit rate of the channel is ................ *
14) A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What 2 points
is the bit rate? *
15) In a fully-connected mesh network with 10 computers, total .............. number of 2 points
cables are required and ................ number of ports are required for each device. *
(A) 40, 9
(B) 45, 10
(C) 45, 9
(D) 50, 10
16) In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject 2 points
packets into any network and travel them independently to the destination. *
(A) Physical
(B) Transport
(C) Application
(D) Host-to-network
17) If there are N people in the world and are using secret key encryption/decryption 2 points
for privacy purpose, then number of secret keys required will be: *
(A) N
(B) (N-1)
(C) N(N-1)/2
(D) N(N+1)/2
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 6/18
6/21/2020 Computer Networks Test 2
( ) ( )
18) Optical fiber uses reflection to guide light through a channel, in which angle of 2 points
incidence is ................. the critical angle.
(A) equal to
19) Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from 2 points
source to destination and each packet p contains 8000 bits. Total end to end delay in
sending packet P is ................ *
(A) 2 sec
(B) 3 sec
(C) 4 sec
(D) 1 sec
20) Consider the following statements : a. High speed Ethernet works on optic fiber. 2 points
b. A point to point protocol over Ethernet is a network protocol for encapsulating
PPP frames inside Ethernet frames. c. High speed Ethernet does not work on optic
fiber. d. A point to point protocol over Ethernet is a network protocol for
encapsulating Ethernet frames inside PPP frames. Which of the following is correct ?
*
21) In CRC checksum method, assume that given frame for transmission is 1101011011 2 points
and the generator polynomial is G(x) = x4 + x + 1.After implementing CRC encoder,
the encoded word sent from sender side is ............. *
(A) 11010110111110
(B) 11101101011011
(C) 110101111100111
(D) 110101111001111
22) An analog signal has a bit rate of 8000 bps and a baud rate of 1000.Then analog 2 points
signal has .............. signal elements and carry ............ data elements in each signal. *
23) The plain text message BAHI encrypted with RSA algorithm using e=3, d=7 and 2 points
n=33 and the characters of the message are encoded using the values 00 to 25 for
letters A to Z. Suppose character by character encryption was implemented. Then,
the Cipher Text message is ............ *
(A) ABHI
(B) HAQC
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 8/18
6/21/2020 Computer Networks Test 2
(C) IHBA
(D) BHQC
(B) only those packets which are queued in the router at that time will suffer
(C) only those packets which are not queued in the router at that time will suffer
(A) Multicasting
(B) Unicasting
(C) Telecasting
(D) Broadcasting
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 9/18
6/21/2020 Computer Networks Test 2
27)The processes that keep track of hosts whose home is in the area, but who 2 points
currently visiting another area is ................. *
(A) making sure that subnet is not able to carry the offered traffic
(B) making sure that subnet will allow more than the offered packets
(C) making sure that subnet is able to carry the offered traffic
(D) making sure that subnet will not allow any traffic
29)In transport layer, End to End delivery is the movement of data from ................... 2 points
*
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 10/18
6/21/2020 Computer Networks Test 2
(B) IP
(C) ARP
(D) HTTP
(B) protocol
(A) Routers
(B) Modems
(D) Bridges
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 11/18
6/21/2020 Computer Networks Test 2
(A) Physical
(C) Network
35) How many cross points are needed in a single stage switch with 40 inputs and 50 2 points
outputs. *
(A) 40
(B) 50
(C) 90
(D) 2000
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 12/18
6/21/2020 Computer Networks Test 2
36) What is the port number for (Trivial File Transfer Protocol) TFTP? * 2 points
(A) 65
(B) 67
(C) 63
(D) 69
(A) routing
(B) security
(C) tunnelling
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 13/18
6/21/2020 Computer Networks Test 2
(C) Network
(D) Transport
41) Decryption and Encryption of data are the responsibility of which of the 2 points
following layer? *
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 14/18
6/21/2020 Computer Networks Test 2
42) Which IEEE 802 standard provides for a collision-free protocol? * 2 points
(A) 802.2
(B) 892.3
(C) 802.1
(D) 802.5
44) The address field of a frame in HDLC protocol contains the address of the 2 points
.................. station. *
(A) primary
(B) secondary
(C) tertiary
(D) a station
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 15/18
6/21/2020 Computer Networks Test 2
(C) Network
(D) Transport
47) In Token Ring, Which of the following is not a transceiver function ? * 2 points
(D) Collision
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 16/18
6/21/2020 Computer Networks Test 2
48) The size of the TCP congestion window depends on ................. * 2 points
(A) bandwidth
(D) traffic
49)............ protocol is widely used on LAN in the MAC sub layer. * 2 points
(A) CSMA
(B) TCP
(C) CSMA/CD
(D) GSM
50) ..………..is used to validate the identity of the message sender to the recipient * 2 points
(A) Encryption
(B) Decryption
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 17/18
6/21/2020 Computer Networks Test 2
Back Submit
reCAPTCHA
Privacy Terms
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy
Forms
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 18/18