IT - Sem IV - CNND+Sample Questions
IT - Sem IV - CNND+Sample Questions
IT - Sem IV - CNND+Sample Questions
Subject Name: Computer Network and Network Design Course Code: ITC402
Semester: IV
3. The IPv4 header field formerly known as the service type field is now called
the _______ field.
Option A: IETF
Option B: Differentiated Services
Option C: Checksum
Option D: Type of Service
Option A: 11001001000
Option B: 11001001011
Option C: 11001010
Option D: 110010010011
8. In polling method, in the poll function, when response is positive then the
primary station reads the data and returns an
Option A: waiting frame
Option B: Sending frame
Option C: Receiving frame
Option D: Acknowledgment frame
9. Which medium / cable consists of inner copper core and a second conducting
outer sheath
Option A: Fiber optic
Option B: Unshielded Twisted pair
Option C: Coaxial cable
Option D: Shielded Twisted pair
12. The ports ranging from 0 to 1,023 are called the ___________ ports. The ports
ranging from 1,024 to 49,151 are called ___________ ports. The ports ranging
from 49,152 to 65,535 are called the ___________ ports.
Option A: well-known; registered; dynamic or private
Option B: registered; dynamic or private; well-known
Option C: private or dynamic; well-known; registered
Option D: private or dynamic; registered; well-known
17. In FTP, there are three types of _______: stream, block, and compressed.
Option A: file types
Option B: data types
Option C: Data structures
Option D: transmission modes
18. Which layer 1 device can be used to enlarge the area covered by a single LAN
segment?
.Switch
i.NIC
ii.Hub
iii.Repeater
Option A: Switch Only
Option B: Switch and NIC
Option C: Switch and Hub
Option D: Switch and Repeater
25. In CSMA/CD, the frame transmission time (Tt) should be ______ the
propogation time(Tp)
Option A: Tt > Tp
Option B: Tt>=2Tp
Option C: Tt>2Tp
Option D: Tt > 1/Tp
27. A subset of a network that includes all the routers but contains no loops is
called ________
Option A: spanning tree
Option B: cost tree
Option C: path tree
Option D: special tree
28. In IPv6, the _______ field in the base header restricts the lifetime of a
datagram.
Option A: version
Option B: next-header
Option C: hop limit
Option D: neighbour-advertisement
29. The term ________ means that IP provides no error checking or tracking. IP
assumes the unreliability of the underlying layers and does its best to get a
transmission through to its destination, but with no guarantees.
Option A: Reliable delivery
Option B: Connection oriented delivery
Option C: Best effort delivery
Option D: Worst delivery
31. Which of the following transport layer protocols is used to support electronic
mail?
Option A: SMTP
Option B: IP
Option C: TCP
Option D: UDP
32. In TCP, one end can stop sending data while still receiving data. This is called
a ______ termination.
Option A: half-close
Option B: half-open
Option C: full-close
Option D: Full open
34. In TCP, if the ACK value is 200, then byte _______ has been received
successfully.
Option A: 199
Option B: 200
Option C: 201
Option D: 202
36. During an FTP session the data connection may be opened _______.
Option A: only once
Option B: only two times
Option C: Five times
Option D: as many times as needed
37. The protocol data unit (PDU) for the application layer in the Internet stack is
____.
Option A: segment.
Option B: datagram.
Option C: message.
Option D: frame.
41. Which of the following layers is an addition to OSI model when compared with
TCP IP model?
Option A: Application layer
Option B: Presentation layer
Option C: Session layer
Option D: Session and Presentation layer
42. How many layers are present in the Internet protocol stack (TCP/IP model)?
Option A: 5
Option B: 7
Option C: 6
Option D: 10
43. The Media Access Control sublayer deals with which of the following
function?
Option A: Error Control
Option B: Framing
Option C: Access Control
Option D: Flow Control
44. In which method, a station that wishes to send a frame over a shared channel
will sense the channel. If the channel is idle it sends immediately. If the channel
is not idle, it waits a random amount of time and then senses the line again.
Option A: Non- persistent
Option B: 1-persistent
Option C: p-persistent
Option D: r-persistent
45. If the code value in the control field of a S-Frame in HDLC is "10", which type
of frame does this code indicate
Option A: Receive Ready
Option B: Receive Not Ready
Option C: Selective-Reject
Option D: Reject
48. Which one of the following algorithm is not used for congestion control?
Option A: Nagle Algorithm
Option B: load shedding
Option C: Choke packet
Option D: routing information protocol
49. The main function of ICMP is
Option A: Error and diagnostic functions
Option B: Routing
Option C: Forwarding
Option D: Addressing
51. TCP groups a number of bytes together into a packet called a ___________.
Option A: user datagram
Option B: segment
Option C: datagram
Option D: message
53. The source port number on the UDP user datagram header defines _______.
Option A: the sending computer
Option B: the receiving computer
Option C: the process running on the sending computer
Option D: the process running on the receiving computer
58. What is the first address of a block of classless addresses if one of the addresses
is 12.2.2.76/10?
Option A: 12.0.0.0
Option B: 12.2.0.0
Option C: 12.2.2.2
Option D: 12.2.2.8
Descriptive Questions
10 marks each
1. Explain HDLC protocol in detail
2. Compare Bus and Star topology
3. Explain IP v4 Header with a neat labelled diagram
4. Write note on TCP timers.
5. Explain SNMP protocol.
6. An organization is granted the block of 16.0.0.0/8. The administrator wants to create 500
fixed length subnets. Find (a) subnet mask (b) number of addresses in each subnet (c) first and
last addresses in subnet 1.
7. Explain the OSI Model in brief with suitable figure
8. What is a sliding window? Explain Go back N protocol in detail
9. What do you mean by switching? What are the types of switching techniques
10. What is congestion and what are causes of congestion?
11. Compare TCP and UDP.
12. Consider five source symbols of a discrete memory less source. Their probabilities are given
below. Find the Huffman code for eace symbol.
Symbol M1 M2 M3 M4
probability 0.4 0.3 0.2 0.1
13. Explain ALOHA and Slotted ALOHA.
14. Compare LAN, WAN, MAN
15. Explain IP v4 Header format
16. Compare connectionless and connection-oriented services.
17. What is Domain Name System? How does it work?
18. An organization is granted a block of addresses with the beginning address 14.24.74.0/24. The
organization needs to have 3 subblocks of addresses to use in its three subnets: one subblock of
10 addresses, one subblock of 60 addresses and one subblock of 120 addresses. Design the
subblocks.
Compare connectionless and connection-oriented services.