Tuesday, July 19, 2016

BCA Sem(4) Computer Networks

Model Question Paper
Subject Code: BCA4010 Book id- B0956
Subject Name: Computer Networks
Credits: 4 Marks: 140
Section A– Descriptive Question (4x10=40 Marks)

Note: - Attempt any four questions

Q.1 What are the principles of ISDN? Explain the architecture of ISDN. [ 5+5]
Refer Unit 2, Section 2.7

Q.2 Explain the design issues and services of data link layer. [5+5]
Refer unit 4, section 4.1

Q.3 Explain stop and wait and go-back-N automatic repeat request. [5+5]
Refer unit 5, section 5.2

Q.4 Discuss about the design issues of network layer. [10]
Refer unit 6, section 6.1

Q.5 Briefly describe the Internet address classes. [10]
Refer unit 7, section 7.2

Q.6 What do you mean by transmission control protocol? Discuss about the facilities provided by TCP for the applications using it. [10]
Refer unit 8, section 8.3

Section B - Multiple Choice Questions

One mark questions (50x1 = 50 Marks)
1. A group of computers and other devices connected together is called …………….
a. Network
b. Networking
c. intranet
d. both b and c

2. Which of the following network is used to connect a number of computers to each other by cables in a single location?
a. WAN
b. LAN
c. MAN
d. both b and c

3. Transmission Lines are also called as………………….
a. circuits
b. channels
c. trunks
d. circuits channels, or trunks

4. The Switching Elements are also called as ……….
a. host
b. subnet
c. Interface Message Processors (IMPs)
d. both a and b

5. The signal which has infinitely many levels of intensity over a period of time is called ………
a. digital signal
b. analog signal
c. both a and b
d. sound signal

6. The absolute value of a signal's highest intensity is called……….
a. Peak Amplitude
b. Frequency
c. Phase
d. Both a and c

7. The distance a simple signal can travel in one period is called …………
a. Wavelength
b. propagation speed
c. Frequency
d. both a and b

8. A noise where foreign signal enters the path of the transmitted signal is called ……
a. Impulse
b. Inter modulation
c. cross talk
d. both b and c

9. Which type of channel it is where the number of users are stable and the traffic is not bursts?
a. static channel
b. dynamic channel
c. free channel
d. both a and c

10. With Slotted Aloha, a …………. sends out small clock tick packets to the outlying stations.
a. distributed clock
b. synchronized clock
c. centralized clock
d. Digital clock

11. If there is only one station with a packet to send, this guarantees that there will …………..  For that packet.
a. never be a collision
b. be a collision
c. be an improvement
d. direction

12. The _______ layer provides a well defined service interface to the network
layer, determining how the bits of the physical layer are grouped into frames
a. Data Link
b. Physical
c. network
d. Session

13. ________ is the process in which the receiver tries to guess the message by
using redundant bits
a. Connection-Oriented Service
b. Forward error correction
c. both a and b
d. Confirm

14. In ______ type of service, no connection is established before hand or afterwards.
a. Unacknowledged Connectionless Service
b. acknowledged Connectionless Service
c. point to point
d. both a and b

15. The range of sequence number which is the concern of the receiver is called the receive sliding window.
a. receive sliding window.
b. sliding window
c. frame buffer
d. both a and b

16. Data Link Control Protocol (HDLC) is implemented at the ………
a. Data link layer
b. Network layer
c. transport layer
d. Physical layer

17. The maximum size of the window in a Sliding Window Protocol is _______
a. 2m – 1
b. 2m +
1 c.2m
d. 2m-1

18. The _______ layer is the topmost layer in the subnet.
a. Network
b. application
c. transport
d. physical

19. The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________
a. blockage
b. Traffic jam.
c. Congestion
d. both a and b

20. ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets..
a. Flooding
b. Wait and watch
c. congestion
d. both a and c

21. The Internet addresses are ______ bits in length in IPV4 addressing scheme
a. 16
b. 64
c. 32
d.48

22. In addresses for _______ networks, the first 16 bits specify a particular network, and the last
16 bits specify a particular host.
a. class A
b. class C
c. class B
d. class D

23. The number of network segments on which the datagram is allowed to travel before
a router should discard it is called _______.
a. Time to Live (TTL)
b. Time to Die(TTD)
c. self recognition
d. both a and b

24. An application process is assigned a process identifier number (process ID), which is likely to be _______ each time that process is started.
a. Similar
b. smaller
c. different
d. larger

25. A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher-level protocol or application program (process) it must deliver incoming messages
a. connection
b. UDP
c. port
d. TCP

26. A UDP datagram of _____ bytes is acceptable to all implementations
a. 516
b. 1024
c.256
d. 512

27. The service access points in Session Layer are called ________________
a. Accessing point
b. activation point
c. Session Service Access Points
d. both a and b

28. Sessions are ended with ________ primitive
a. B-RELEASE. Request
b. R-RELEASE. request
c. S-RELEASE. request
d. A-RELEASE. request

29. A procedure included in the caller’s address space by the linker is known as ______.
a. local procedure
b. Universal procedure
c. addressing linker
d. both a and b

30. The ______ protocol is based on end-to-end delivery.
a. SCTP
b. TCP
c. SMTP
d. SCTP

31. The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ____ Service ready message..
a. 420
b. 320
c. 220
d. 120

32. There is _____ number of standard content types in MIME
a. 7
b. 5
c. 9
d. 4

33. To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses
a. Table
b. look up table
c. name space
d.name table

34. A name in the _______ name space is a sequence of characters without structure
a. address
b. Doman
c. Flat
d. Both a and b

35. The ____ namespace is based on a hierarchical and logical tree structure
a. DNS
b. Address
c. table
d. both a and b

36. The ______ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers.
a. transporter
b. distributers
c. Resolvers
d. both a and b

37. The next header t is an _____ field of Authentication Header that identifies the type of what follows.
a. 16-bit
b. 64-bit
c. 8-bit
d.32-bit

38. The client code recognizes the SSL request and establishes a connection through TCP port
____ to the SSL code on the server
a. 1023
b. 402
c. 443
d. 8080

39. A _____ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks.
a. Firewall
b. ESP
c. SSL
d. both a and b

40. The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s.
a. UDP
b. Transport layer
c. ESP
d. SSL

41. In most Wide Area Networks, the subnet consists of two distinct components: which are they?
a. Transmission Lines and Switching Elements.
b. host and subnet
c. Transmission Lines and host
d. subnet and Switching Elements.

42. There are two types of designs for communication subnets: they are …………..
a. Point-to-Point channels and Broadcast channels
b. packet-switched subnet and store-and-forward
c. Multicasting and Broadcasting
d. Point-to-Point channels and store-and-forward

43. Which of the following formula is used to determine the theoretical highest data rate for a noisy channel ?.
a. BitRate = 2 x bandwidth x log2L
b. N=kTW
c. Capacity = bandwidth x log2(1 + SNR)
d.   20 * log10
       Powerin
       Powerout

44. The main hardware components of a graphics workstation are ……………..
a. Thick coax, optical fiber
b. twisted pair , thin coax
c. twisted, optical fiber
d. Thick coax, Thin coax

45. S/NET is another kind of ………….network with an ………….for switching.
a. fiber optic, active star
b. active star , fiber optic
c. twisted cable, active network
d. active network, twisted cable

46. The Aloha protocol is an OSI _______ protocol for LAN networks with broadcast topology a. layer 1
b. layer 4
c. layer 2
d. layer 3

47. Thus hamming code for the ASCII character “a” is given as ………………
a. 10111001111
b. 10111001000
c. 10111001001
d. 10111001

48. Coding schemes can be divided into two broad categories…………, ……………..
a. character coding, integer coding
b. hamming coding and block coding
c. Hamming coding and convolution coding
d. Block Coding and Convolution Coding.

49. The IP Control Protocol (IPCP) is the NCP for IP and is responsible for ………., ………….,
and disabling the IP protocol on both ends of the point-to-point link.
a. Reframing , enabling
b. Deleting, reframing
c. configuring, enabling,
d. configuring, reframing

50. The _______ is a unidirectional protocol that has no flow or error control.
a. Simplest
b. Simplex
c. TCP/IP protocol
d. Simplest or Simplex

Two marks Questions Multiple choice questions (25x2 = 50 Marks)

51. Flooding is also a……... algorithm, usually generates ………... of duplicate packets.
a. Static, vast number
b. dynamic , vast number
c. Static, less number
d. dynamic , less number

52. Distance Vector Routing is a……... routing algorithm, it consists of a data structure called a
………
a. Static , routing table
b. Dynamic, look-up table
c. Dynamic, routing table
d. Static, look-up table

53 Each IP address can identify the ………... or ………... of IP packets.
a. source, destination
b. length, size
c. source, length
d. Size , destination

54. In process to process delivery, an application process is assigned a ………….., which is likely to be …………….each time that process is started
a. process identifier number , different
b. process identifier number, same
c. source, mixed
d. Source, similar

55. The Intel format is called ………... and the SPARC format is called ……………..
a. little endian, big endian,
b. big endian, little endian
c. open source, little endian
d. Big endian, open source

56. The Post Office Protocol is an ………... protocol with bot h client (sender/receiver) and
…………...functions
a. electronic mail, server (storage)
b. three layer , server
c.UDP, transfer
d. TCP, server

57. A zone is a contiguous portion of a ………….. of the DNS namespace whose database records exist and are managed in a……….. DNS database file.
a. domain, particular
b . Class, particular
c. tree, local
d. Domain, every

58. The DNS server that received the initial ……... query checks it’s ………… is called…………...
a. Recursive, zones
b. simple, zones
c. simple, class
d. Recursive, class

59. The purpose of a proxy server is to control exchange of data between the two networks at
…………..instead of ………..
a. an application level , an IP level
b. network layer, physical layer
c. an application layer, physical layer
d. Network layer , an application layer

60. PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ……….
a. application layer, e-mails.
b. Network layer, packets
c. application layer, packets
d. network layer , e-mails

61. State weather the following statement is true or false for Internetwork layer.
1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP.
2). Internet Protocol (IP) is the least important protocol in this layer
3). The internetwork layer, also called the internet layer or the network layer, provides the “virtual network”
a. 1. True, 2. true, 3. true
b. 1. true, 2. false, 3.true
c. 1. false, 2. false, 3. false
d. 1. true, 2. true, 3. false

62. State weather the following statement is true or false for ISDN – Integrated Services Digital Network
1).ISDN is an effort to standardize subscriber services, provide user/network interfaces
2). the goal of ISDN is to form a Local area network that provides Peer-to-Peer connectivity
over digital media
3). It is a set of protocols that combines digital telephony and data transport services
a. 1. True, 2. false, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1. true, 2. true, 3. false

63. State weather the following statement is true or false for Token Bus
1).It is a linear or tree-shaped cable onto which the stations are attached.
2). the token propagates around the logical ring, with only the token holder being permitted
to transmit frames
3). In this token bus arrangement The physical order in which the stations are connected to the
cable is very important.
a. 1. False, 2. true, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1. true, 2. true, 3. false

64 Find the transmitted code if the frame is (MSB) 1101011011 (LSB) and generator polynomial is x4 + x + 1.
a. 1101011011 1110
b. 1101011111 1110
c. 1101011011 1111
d. 1101011011

65. State weather the following statement is true or false for Point-to-Point Protocol
1). It is still in widespread use for dial-up TCP/IP connections
2) Point-to-point circuits in the form of asynchronous lines have long been the mainstay for
data communications.
3). Point-to-Point Protocol (PPP) is a network-specific standard protocol with STD number 51.
a. 1. True, 2. true, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1. true, 2. false, 3. true,

66. State weather the following statement is true or false for Hierarchical
Routing 1). In hierarchical routing, the routers are divided into regions.
2) Each router is having the idea about internal structure of other regions
3). Two level hierarchies may be insufficient hence it may be necessary to group the regions into clusters.
a. 1. True, 2. true, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1. true, 2. false, 3. true,

67. State weather the following statement is true or false for IPV6 Addressing
1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets
2).IPV6 is a connectionless, unreliable datagram protocol.
3). An IPV6 packet consists of an IPV6 header and an IPV6 payload.
a. 1. True, 2. true, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1.false, 2. true, 3. true

68. State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP).
1). SCTP uses only few known ports in the TCP space.
2).SCTP is a new transport protocol at the same layer as TCP and UDP.
3). SCTP is a new reliable, message oriented transport layer protocol.
a. 1. True, 2. true, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1.false, 2. true, 3. true

69. State weather the following statement is true or false for Exception Reporting
1). If the user runs into trouble, this trouble can be reported to the peer using a S-UEXCEPTION-
REPORT. request primitive.
2). Exception reporting does not only apply to user-detected errors
3). The service provider can generate an S-P-EXCEPTION-REPORT.indication to notify the
user about internal problems within the session layer.
a. 1. True, 2. true, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1.false, 2. true, 3. true

70. State weather the following statement is true or false for Multipurpose Internet Mail Extensions
1).The general syntax for MIME header fields is not the same as that for RFC 2822.
2).MIME header field names are never significant, but the cases of field values can b.
3). A MIME-compliant message must contain a header field with the following verbatim text:
MIME-Version: 1.0
a. 1. True, 2. true, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1.false, 2. true, 3. true

71. State weather the following statement is true or false for Sendmail.
1).Sendmail is a command-line tool designed for most UNIX-like operating systems.
2).It define a method of transferring mail, and acts as a client/server that supports multiple mail
protocols
3). Sendmail exists in both open source and proprietary software packages.
a. 1. True, 2. False, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1. true, 2. true, 3. false

72. state weather the following statement is true or false for Name Server
1).they are also called authoritative servers for those zones.
2). Configuration of a DNS server includes adding name server (NS) resource records for all the
other name servers that are in the same domain.
3). if the two zones were on different name servers, each would be configured with an NS
record about the other
a. 1. True, 2. true, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1.false, 2. true, 3. true

73. State weather the following statement is true or false for Resource Record
1).It is not necessary that each resource record starts with the owner.
2). in text based DNS database files, most resource records are represented as a single line of text. .
3). Resource records are represented in binary form in DNS request and response messages
a. 1. True, 2. True, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1. true, 2. true, 3. false

74. State weather the following statement is true or false for Application-level gateway (proxy)
1). An application-level gateway is often referred to as a proxy
2).proxy is capable of monitoring and filtering any specific type of data, such as commands
3). A proxy server is an application-specific relay server that runs on the host.
a. 1. True, 2. true, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1.false, 2. true, 3. true

75. State weather the following statement is true or false for Firewalls.
1).A firewall is a system that enforces a security policy between a secure internal network and
the Internet
2).firewall is installed at the choke point.
3). A firewall can be a PC, a router, a midrange, a mainframe, a UNIX workstation, or a combination of these.
a. 1. True, 2. True, 3. true
b. 1. true, 2. false, 3. false
c. 1. false, 2. false, 3. false
d. 1. true, 2. true, 3. false


Answer Keys
Section - B
.
 Q. No. Ans. Key Q. No
1 A 21 C 41 A 61 B
2 B 22 C 42 A 62 A
3 D 23 A 43 C 63 D
4 C 24 C 44 D 64 A
5 A 25 C 45 A 65 D
6 A 26 A 46 C 66 D
7 A 27 C 47 C 67 A
8 C 28 C 48 D 68 D
9 A 29 A 49 C 69 A
10 C 30 C 50 D 70 A
11 A 31 C 51 A 71 A
12 A 32 A 52 C 72 A
13 B 33 C 53 A 73 A
14 A 34 C 54 A 74 A
15 A 35 A 55 A 75 A
16 A 36 C 56 A
17 A 37 C 57 A
18 A 38 C 58 A
19 C 39 A 59 A
20 A 40 C 60 A

No comments:

Post a Comment