How To Exam?

a knowledge trading engine...


Bengal Engineering and Science University 2006 B.E Information Technology Computer network - Question Paper

Friday, 18 January 2013 02:40Web


the ques. paper is with the attachment.

D-

i

B.E. 6th Semester Examination, 2006

Computer Network

Paper code: IT-601    Branch: IT

Time: 3 hours    Full Marks: 100

Answer Question I and any FOUR from the rest

I. There are 30 multiple-choice questions, each with ONE correct answer. Write just correct answer number (A, B, C or D) in your answer script. 2*30 = 60

1.    A group of N stations share 56-kbps pure ALOHA channel. Each station outputs a 1000-bit frame on an average of once every 100 sec. What is the maximum value ofN?

(A)    56

(B)    28

(C)    1000

(D)2800

2.    What is the baud rate of the standard 10-Mbps Ethernet?

(A)    10,000 samples/sec

(B)    80,000 samples/sec

(C)    160,000 samples/sec

(D)    20,000 samples/sec

3.    Consider building a CSMA/CD network running at 1 Gbps over a 1-km cable with no repeater. The signal speed in the cable is 200,000 km/sec. What is the minimum frame size?

(A)    46 bytes

(B)    64 bytes

(C)    80 bytes

(D)    None of the above

4.    An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC (Logical Link Control) is not in use, is padding needed in the Ethernet frame, and if so, how many bytes?

(A)    4

(B)    6

(C)    8

(D)    None of the above

5.    The networks might use an error correcting code instead of error detection and retransmission, where

(A)    more reliable transmission is required

(B)    bit error rate is high

(C)    propagation delay is very long compared to transmission time

(D)    both B and C

6.    Sixteen-bit messages are transmitted using a hamming code. How many check bits are needed to ensure that the receiver can detect and correct single bit errors?

(A) 5

(B)    16

(C)    21

(D)    can not be determined

7.    A bit string 1101011011 is transmitted using CRC. The generator polynomial is x4+x+l. The checksum field of the bit sting is

(A)    1110

(B)    1010

(C)    10011

(D)11100

8.    A network on the Internet has a subnet mask Of 255.255.240.0. What is the maximum number of hosts it can handle?

(A)4094

(B)    4096

(C)    256

(D)    16

9.    The IP address 241.35.12.78 is assigned to

(A)none

(B)    www.google.com server

(C)    www.vahoo.co.in server

(D)    www.becs.ac.in server

10.    The protocol field of Ipv4 header is meant for

(A)    transport protocol

(B)    network protocol

(C)    application protocol

(D)    DLL protocol

11.    Which of the following performs best in very high load

(A)    ALOHA

(B)    0.5 persistent CSMA/CD

(C)    0.001 persistent CSMA/CD

(D)    1 persistent CSMA

12.    Which one of the following is false

(A)    Internet is a heterogeneous computer network

(B)    A computer network may connect homogeneous computers

(C)    Error detection and correction is the only task of data link layer

(D)    Error correction is an important task of transport layer

13.    Computer A has an IP address of 192.168.1.5. Computer B can access the file server, Computer A cannot. Which of the following statements best identifies the problem?

(A)    The subnet mask of the file server is set incorrectly

(B)    The network portion of the IP address of computer A is set incorrectly

(C)    The subnet mask on computer A is set incorrectly

(D)    The network portion of the IP address of file server is set incorrectly

14.    The maximum length of IP datagram in bytes is

(A)    20

(B)    60

(C)65535

(D)    none of the above

15.    What is the length of the three-byte token for a 4 Mbps token ring LAN? The speed of propagation is 2*10s m/s.

(A)800    m

(B)    1000 m

(C)    1200 m

(D)    none of the above

16.    In a token ring LAN, operating at a speed of 16 Mbps, a station has 3 frames each of 8 KB. The token holding time is 10 ms. How many of these frames can the station send after it has captured a token?

(A)    1

(B)    2

(C)    3

(D)    cannot be determined

17.    A and B are the only two stations on an Ethernet. Each ahs a steady queue of frames to send. Both A and B attempt to transmit a frame, collide and A wins the first back-off race. At the end of this successful transmission by A, both A and B attempt to transmit and collide. The probability that A wins the second back-off race is

(A)    0.5

(B)    0.625

(C)    0.75

(D)    1.0

18.    Number of transitions is higher in Manchester encoding scheme than differential Manchester encoding scheme in the bit-stream

(A)    any sequence of 0 and 1

(B)    111... 1

(C)    000...0

(D)    cannot be determined

19.    Two computers Cl and C2 are configured as follows. Cl has IP address 203.197.2.53 and netmask 255.255.128.0. C2 has IP address 203.197.75.201 and netmask 255.255.192.0. Which one of the following statements is true?

(A)    C1 and C2 both assume they are on the same network

(B)    C2 assumes Cl is on the same network, but Cl assumes C2 is on different network

(C)    Cl assumes C2 is on the same network, but C2 assumes Cl is on different network

(D)    C1 and C2 both assume they are on different network

20.    Which of the following is false?

(A)    Both switch and router selectively forward data packets

(B)    A switch deals with IP address while router deals with MAC address

(C)    A switch builds up its routing table by inspecting incoming packets

(D)    A router can connect a LAN with a WAN

21.    A collection of five routers is to be connected in a point-to-point subnet. Between each pair of routers, the designers may put a high-speed line, a medium speed

line, a low-speed line, or no line. If it takes 100 ms of computer time to generate and inspect each line, how long will it take to inspect all of them?

(A)    20 ms

(B)40    ms

(C)10    ms

(D)    cannot be determined

22.    Which of the following is false?

(A)    UDP is connectionless protocol

(B)    TCP is connection oriented protocol, and so a dedicated physical link between source and destination is mandatory

(C)    TCP may fragment user data

(D)    telnet utilizes TCP

23.    Choose the best matching between Group 1 and Group 2.

Group 1    Group2

P. Data link layer 1. Ensures reliable transport of data over a physical

point-to-point link Q. Network layer 2. Encodes/decodes data for physical transmission R. Transport layer 3. Allows end-to-end communication between two

processes

4. Routes data from one network to the next

(A)    P-2, Q-4, R-l

(B)    P-l, Q-4, R-3

(C)    P-2, Q-3.R-1

(D)    P-l, Q-3, R-2

24. Choose the best matching between Group 1 and Group 2.

Group2

Group


1.    Initially connect 5 IITs and IISc

P. ARPANET Q. ERNET R. ALOHA S. Token bus


2.    Predecessor of todays Internet

3.    Requires broadcast channel

4.    Bus topology

(A)    P-2, Q-4, R-l, S-3

(B)    P-2, Q-l, R-3, S-4

(C)    P-2, Q-3, R-l, S-4

(D)    P-2, Q-l, R-4, S-3

25.    Which of the following is false?

(A)    Packet switching uses store-n-forward method

(B)    A dedicated path is established in virtual circuit switching method

(C)    Packets may follow same path in datagram switching method

(D)    Packets arrive in order in virtual circuit switching method

26.    In a 5-node network, which is using distance vector routing, the number of columns in the routing table of a node is

(A)    3

(B)    5

(C)    8

(D)    none of the above

27.    Leaky bucket algorithm works in

(A)    Transport layer

(B)    Network layer

(C)    Data link layer

(D)    Physical layer

28.    Maximum number of networks that are supported by class A IP address is

(A)    7

(B)    128

(C)    126

(D)    cannot be determined

29.    The maximum length of a token ring frame is

(A)    1526 bytes

(B)    46 bytes

(C)    72 bytes

(D)    unlimited; depends on token holding time

30.    The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?

(A)    10.35.28.2 and 10.35.29.4

(B)    172.57.88.62 and 172.56.87.233

(A)    191.203.31.87 and 191.234.31.88

(B)    128.8.129.43 and 128.8.161.55

II.    Compare ISO-OSI reference model and TCP/IP reference model.

How can multi-bit error be detected in CRC method?    5+5

III.    Write short notes on

i.    ARP

ii.    DQDB    5+5

IV.    Compare various CSMA protocols with graph.

How is the length of pad determined in an Ethernet LAN?    5+5

V.    Write short notes on

i.    Repeater

ii.    Hub

iii.    Switch

iv.    Router

v.    Gateway    2*5

VI.    What is non-adaptive routing? Describe a non-adaptive routing technique. What is count-to-infmity problem?    5+5

VII.    Describe Ipv4. What are the basic differences between Ipv4 and Ipv6? 7+3

5







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Bengal Engineering and Science University 2006 B.E Information Technology Computer network - Question Paper