Skip to main content

CS610 Current Finalterm Paper Spring 2014 Shared By Afzal


1) Network administrator wants to assign three IP address on different hosts in a network, each address start with bit 0.write the class to which these IP address belongs?
Answer:
B class.

2) Which multicast protocol is design to use within organization?
Answer:
 PROTOCOL INDEPENDENT MULTICAST _ DENSE MODE (PIM-DM).
3) Which types of NAT devices are available?
Answer:
DSL, IP
7) How IP multicast group becomes anonymous?
IP multicast group is anonymous in two ways:
Answer:
1. Neither a sender nor a receiver knows the identity or the number of group members.
2. Routers and hosts do not know which applications will send a datagram to a group.

8) Which layer of TCP/IP ensures reliable transformation?
Answer
Transport layer.

Characteristics of EGP (5)

BORDER GATEWAY PROTOCOL:
It is most popular Exterior Gateway Protocol in Internet. It has following characteristics:
"It provides routing among autonomous systems (EGP).
"It provides policies to control routes advertised.
"It uses reliable transport (TCP).
"It gives path of autonomous systems for each destination.
"Currently the EGP is of choice in the Internet.
"The current version is four (BGP-4).
"It provides facilities for Transit Routing.

Characteristics ROUTING INFORMATION PROTOCOL (RIP):
It has the following characteristics:
"It is used for routing within an autonomous system (IGP).
"Hop Count Metric: RIP measures distance in network hops, where each network between the source and destination counts as a single hop.
"It uses UDP for all message transmissions.
"RIP is used over LAN. Version 1 of RIP uses hardware broadcast and version 2 allows delivery via multicast.
"It can be used to advertise default route propagation. An organization can use RIP to install a default route in each router.
"It uses distance vector algorithm.
"RIP allows hosts to listen passively and update its routing table

4) If an ARP received how to deal with it write the process (5)
Answer:
When an ARP message arrives, the protocol specifies that the receiver must perform two basic steps.
First the receiver extracts the sender’s addresses binding and checks to see if
It is present in the cache. If not, it updates the cache.
The receiver examines the operation field of the message to determine whether the message is a request or a response. If the message is a request, the receiver compares the field TARGET PADDR with the local protocol address. If the two are identical, the computer is the target of the request and must send an ARP response.
5)      130.4.102.1/22 write the subnet mask for that (3)
Answer:
 255.255.252.0

13)  Two drawbacks of ARP (3)
Answer:
spoofing
sniffing

17) Why multiple router used.
Answer:
To connect multiple networks we use multiple routers.

19)  Which protocol provide universal service?
Answer:
TCP/IP

22) If an error is detected and reported, does the network layer provides mechanism for error correction? (3)
Answer:
No, network layer does not provide.

Enjoy


Comments

Popular posts from this blog

CS614 Quiz No.4 Shared by Princess (solved), Spring 2014

  “What means What”. The phrase refers to: Select correct option:  Meta data  External data Transformed data Internal representations Question # 2 of 10 Which of the following is NOT one of the activities of “Maintenance and Growth” phase in Kimball’s DWH development approach? Select correct option: Education Technical Education Program Support  Interface Deployment                 Question # 3 of 10 Horizontally wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records Dataset has attribute skews Dataset has partitioning skews                 Question # 4 of 10 Which of the following is NOT one of the top-10 mistakes that should be avoided during DWH development? Select correct option: Not interacting directly with end user Not being an accommodating person Isolating IT support people from business users Training the users with dummy data and considering it success             

CS502 Quiz No.4 File 3

There is relationship between number of back edges and number of cycles in DFS Select correct option: Both are equal. Cycles are half of back edges.   Cycles are one fourth of back edges. There is no relationship between back edges and number of cycles .         (Correct) In strong components algorithm, the form of graph is used in which all the vertices of original graph G have been reversed in direction. Select correct option: True                 (Correct)   False In Kruskal's algorithm, the next edge is added to viable set A, if its adding does not induce a/an __________ . Select correct option: Vertex Edge   Cycle               (Correct)   Tree For undirected graph, there is no distinction between forward and back edges. Select correct option: True                 (Correct)   False You have an adjacency list for G, what is the time complexity to compute Graph transpose G^T ? Select correct option: (V+E)             (Corre

CS301 Quiz No.2 Shared by Tayyeba

Binary search algorithm can not be applied to ____ Select correct option: sorted linked list sorted binary trees        ok sorted linear array pointer array During in-order traversal using recursive calls, if we found a node is NULL. It means this node will satisfy following condition. Select correct option: It will not have left child        ok It will not have right child It will not have both left and right children None of given options Identify the data structure which allows deletions at both ends of the list but insertion at only one end. Select correct option: Input-restricted deque Output-restricted deque Priority queues        ok A BST generated from the data in ascending order is ____________. Select correct option: Linear Nonlinear Balanced        ok Un sorted In a program a reference variable, say x, can be declared as Select correct option: int &x ;        ok int *x ; int x ; None of the given options he depth of a complete bina