COMPUTER NETWORKS CS610 Solved Mid Term Subjective Question Answers

 

Computer Networks


Introduction:

Hi Everyone!

Here is CS610 Computer Networks Mid Term Solved Subjective Question Answers for Sure 100% Success and Exam Preparation. All Questions are very important and repeated every time in exam.

All answers are according to CS610 Handout. Therefore all students are request to prepare these Questions for better CGPA and solid Concepts.

If any student prepare these questions answer sensibly then he no need of any other material and to prepare whole handout.

Why These Notes:

1.     Time Consuming:

Mostly students are jobs holder so these are very helpful for them. As I mentioned above all are very important so you can save your time by preparing these notes in a very short time period, rather no need to prepare a complete Handout of Computer Networks CS610.

    All are Past Exams Questions:

     Sometime students confuse about syllabus and pattern about exams questions, so these are very helpful to known about type of questions you will face in incoming exams.

3.     Most Repeated:

All are from Past Exams and every time repeated. Sometime examiner change 1 or 2 words of question and its meaning remain the same. So prepare all by creating concepts.

4.     Completely Theoretical:

Most advantage is that all questions are Theoretical and summary of complete computer network handout. By preparing these notes you will be able to answer the any question you will face in exam.

    To the point Answers:

All answers given are to the point and according to university and examiner necessities. There is no additional and irrelevant material.

     Therefore Prepare them by creating your own concepts and write in your own words in exam. You will not forget these concepts in your future. Then you can taught to others obviously.

     ALSO READ:  


CS401 Assembly Language Programming

CS610 Computer Network

Lets Start!

CS610 (COMPUTER NETWORKS) MID TERM QUESTION ANSWERS BY CH. ASAD NAEEM Asadnaeem280@gmail.com

Q 1: Where are destination and source address located in frame?

The packet header incorporates objective and source addresses.

Q 2: If 100mbps Ethernet NIC is connected to a hub which supports 10mbps, what will be the data rate in this scenario?

This has two results. In the first place, the center point doesn't be guaranteed to make a transmission medium. Second, there are no crashes between traffic on 10 Mbps ports and 100 Mbps ports.

Q 3: In connection-oriented network which type of connection identifier is used? Support your answer with example.

ATM uses the concept of connection-oriented networking.

Q 4: Imagine a network of 6 devices A, B, C, D, E and F. All devices are on same packet switch. If PC A needs to send parcel to PC E, how might bundle switch forward this bundle?

Way between switch An and F and the complete distance went along this way

Switch A …. switch D …. switch E                                                                              

Distance = 4

Computer Networks

Q 5: Network administrator needs audio and video service for his network. He needs to send or get information at same information rate. Which kind of ATM quality help detail could be applied there? Give example?

To make possible the transport of audio and video data across Asynchronous Transfer Mode (ATM) networks, a simple, low cost, audio/video ATM appliance, the AVATAR, has been developed. This appliance is capable to handling uncompressed bidirectional audio and NTSC video connections.

Q 6: We have two satellite locations, at first location one bridge is configured and at second location 2 bridges are configured. Which location performed will be faster? Give reason.

Satellite areas with two scaffolds arranged will performed quicker. The brigades also provide power virtually to its East Timor assets. An extension that has numerous ports is known as a systems administration switch. The two scaffolds and switches are equipped for guiding traffic to explicit organization addresses as opposed to broadcasting the information to all gadgets on an organization fragment.

Q 7: There are two sites office A & B, both are using VPN. If a client of another organization has any desire to send a parcel to A, then what will be the way of behaving of organization A? How data is protected in VPN environment?

When private network “A” wants to send a packet to a private network “B” the packet is accepted by the VPN server. Then a standard IP packet that has a destination address corresponding to the VPN server at network B. The machines within network A and B don't have publicly accessible address – Because they not on the public Internet. This is advantage of the VPN approach.

Q 8: Star Textile has huge network of systems and switches. An undertaking is given to IT Officer that on the off chance that some connection goes the whole organization works without a hitch. Which routing method will be use?

Distributed routing method is better for this purpose because Distributed routing build the required connections with its neighbors. Disseminated steering is more adaptable than incorporated directing in light of the fact that every hub handles its own steering. The result is regularly improved system performance.

Q 9: Network administrator wants to build a tunnel between sites offices. How might he fabricate utilizing private virtual organization?

To lays out a confidential organization that can send information safely between these two areas or organizations through a passage. A VPN burrow interfaces the two PCs or organizations and permits information to be sent.

Q 10: Who examine performance of network?

Performance is examined by users in the network environment.

Q 11: How can we compute shortest path in WAN?

We utilize Djikstra's calculation to process most brief way from every hub to each and every other hub.

Q 12: What type of switching technique is used in WAN?

WANs can use circuit-switching or packet-switching techniques. Each change moves a whole parcel starting with one association then onto the next. That is the reason they are called packet switches.

Q 13: Write the names of identifiers used in ATM.

An ATM with 16-bit address, 24-bit association identifier and association identifier incorporate. 8-bit Virtual Path Identifier (VPI)

16-bit Virtual Circuit Identifier (VCI)

Q 14: What type of topology used in Ethernet?

Traditional Ethernet use a bus topology, meaning that all devices or hosts on the network use the same shared communication line.

Q 15: Difference between LAN and WAN.

In LAN (Local Area Network) network occupies the smaller area like a room or a building. In WAN (Wide Area Network) network occupies larger areas like cities & countries. Internet is a Wide Area Network.

Q 16: Why fiber need for ATM?                                                                      

ATM is intended to chip away at fiber (however can be utilized with curved pair). A regular port on an ATM switch works at OC-3 speed (155Mbps) or higher.

Q 17: Define Bridge.

A bridge is an equipment gadget likewise used to interface two LAN portions to expand a LAN. A typical bridge has two NICs. It just runs the code put away in its ROM.

Q 18: Ambiguity may cause the failure of any network, how parity bit check is considered in this situation.

Equality can distinguish blunders that adjustment of odd number of pieces. We see that even no. of bits has been changed due to noise so parity checking cannot detect this error.

Q 19: Define default route how it is different from routing.

Routing table entries can be twisted with a default route. If the destination does not have an explicit routing table entry, then it uses a default route. The most common way of sending the bundles of data is called directing. The information about destinations is kept in routing tables.

Q 20: Defines simplex and full duplex connection?

Some association situated advancements give full duplex while other permit on simplex association. To communicate using a simplex connection a pair of computers must establish two connections one from computer A to computer B and another from computer B to A.

Q 21: How WAN capable to handle many computers?

A Wide Area Network (WAN) is a media transmission network that covers a wide region.

Q 22: Briefly explains the working structure of thick Ethernet.

It uses thick coax cable. AUI link (or handset or drop link) associates from NIC to handset. AUI link conveys computerized signal from NIC to handset. The wires in AUI convey computerized signals power and other control signals. Thick Ethernet likewise expects eliminators to stay away from signal reflectance.

Q 23: Why ATM design chose cells over packet?

Cells are not variable length and memory management. With cells bits can be counted as they arrive.

Q 24: What is 10base T?

The 10Base-T standard (likewise called Twisted Pair Ethernet) utilizes a contorted pair link with most extreme lengths of 100 meters. This is another standard of wiring scheme. 10Base-T Ethernet is in many cases called a star formed transport.

Q 25: What is Multicasting?

It works like broadcasting but it does not forward frames automatically to the CPU.

Q 26: What is FDDI?

Fiber distributed data interconnect (FDDI) is another ring innovation. Its important features are:

It utilizes fiber optics among stations and sends information at 100Mbps. It uses pair of fibers to form two rings.

Q 27: Define 802.11 Wireless LAN and CSMA?

IEEE 802.11 is standard wireless LAN that use radio signals at 2.4GHz. The more seasoned gadgets utilize radio transmissions at 900MHz and information pace of 2Mbps. Bluetooth determines a remote LAN for brief distances.

Q 28: Define static and dynamic routing.                                                              

Static Routing: -

Static routing is the easiest type of directing; however, it is a manual cycle.

Dynamic Routing: -

Dynamic routing protocols are upheld by programming applications running on the directing gadget (the switch).

Q 29: Disadvantages of Repeaters.

Repeaters don't perceive outline designs; they simply intensify and retransmit the electrical sign. If a collision or error occurs in one segment, repeaters amplify and retransmit also the error to the other segments.

Q 30: Different b/w Cells and Packets?

ATM planners picked cells over parcels due to the accompanying reasons:

Cells are not variable length and memory management. Handling variable length packets leads to memory breakup. With cells bits can be counted as they arrive.

Q 31: What is the difference between the physical and logical topologies?

Physical Topology:

How the workstations are associated with the organization through the real links that sends information. The actual design of the organization is known as the physical topology. It depends on the wiring scheme.

Logical Topology:

The logical topology is the way that the data passes through the network from one device to another without the physical interconnection of the devices. We can say that it is characterized by the particular organization innovation.

Q 32: What is meant by Bridges STARTUP and STEADY State?

When a bridge boots the address lists be empty (startup state). The bridge forwards frames to the other segment if it cannot find destination address in its lists. After some time when the bridge received at least one frame from every computer, it has the lists built (steady state).

Q 33: How can “Switched Virtual Network” are laid out?                                   

ESTABLISHING AN SVC (switched virtual circuit):

The computer sends a connection request to the switch attached with it. Software in the switch tracks down an organization way to the objective and sends along the association demand. Once the connection is established by the destination, a message is sent back to the computer to indicate the SVC is set. If any switch or the destination computer doesn't consent to setting up the VC, a mistake message is sent back and the SVC isn't laid out.

Q 34: What is the concept of packet switches?

Each change moves a whole parcel starting with one association then onto the next. That’s why they are called packet switches. Packet switches consist of a small computer with network interfaces.

Q 35: Write a note on Weight Graph.

Dijkstra’s algorithm can contain weights on edges in graph. The shortest path is the path with lowest total weight (sum of the weight with all edges). For instance, as displayed in the figure beneath:


CS610

Q 36: Define Vector-Distance Algorithm.

Packet switches hang tight for next update message and they emphasize through sections in message. If entry has shortest path to destination, insert source as next step to destination and record distance.

Q 37: What is the idea of store and forward technology?

STORE AND FORWARD: Information conveyance starting with one PC then onto the next is achieved through store and forward technology. In this innovation bundle switch stores approaching parcel and furthermore forward that bundle to another switch or PC.

Q 38: How can a bridge know whether to advance casings?

The bridges organize themselves automatically to decide which bridge will forward frames and which bridge will not. The scaffolds speak with one another on the organization and utilize Distributed Spanning Tree (DST) calculation to conclude which extension won't advance edges in the event that a cycle happens.

Q 39: Compare connection oriented and connectionless Service.

In connection-oriented protocol, authentication is needed while this is not in case of connectionless protocol.

In connection-oriented protocol, we have to establish connection between sender and receiver while this is not in case of connectionless protocol.

Illustration of association arranged convention is TCP and the case of connectionless convention is UDP Internet.

TCP is an association situated convention, it makes an association and checks whether the information is gotten, and resends in the event that it isn't. UDP is a connectionless protocol; it has not guarantee delivery.

Q 40: Give a comparison of wiring Schemes.                                                            

The wiring schemes are compared as follows:

Separate handset permits PCs to be fueled off or disengaged from network without instigating. Transceiver may be located in an awkward place, so finely fault transceiver can be hard. In other case, flimsy cajole link takes least of link. Disengaging one PC (on one free association) can upset whole organization. Hub wiring merges electronics and connections. 10Base-T is most famous on account of least expense.

Q 41: Describe permanent virtual circuits (PVC).

ATM can provide customers with virtual circuits that look like traditional digital circuits. The forwarding tables are automatically restored after breakdown power of equipment. The sending table sections for such long-lasting VC's are statically arranged.

Q 42: What are default routes draw the table.

Routing table entries can be twisted with a default route. If the destination does not have in routing table entry, then it uses a default route. Default courses for 4 hubs are displayed in the figure underneath.

Computer Networking

Q 43: Star Organization use four bridges in its network and they form a cycle. How can network engineer avoid broadcasting from all bridges in this scenario?

If a bridge network forms a cycle, then not all bridges on the network are allowed to forwarding broadcasting frames. The extensions arrange themselves naturally to conclude which scaffold will advance transmission casings and which scaffold will not. The scaffolds speak with one another on the organization and utilize Distributed Spanning Tree (DST) calculation to conclude which extension won't advance edges in the event that a cycle happens.

Q 44: You are working in a star Organization as Network Engineer. The Existing Network comprises of 120 Systems. What will be your analysis about delay shout it be Smaller or higher?

The computers take turns using the medium. First one computer uses the medium to send its data over the channel then second and so on. However, sharing a solitary medium over significant distances is productive, because of the long postponements. The computer with shorter delay will go first and another computer may transmit later.

Q 45: We want to connect two site Offices, which are far away from each other. In your opinion, which one is best LAN extensions or WAN? Justify your answer.

WAN extension is best.

Reasons:                                                                                                                                 

1.      It integrates IT infrastructure

2.      It boosts your privacy

3.      It increases bandwidth



Q 46: Suppose ABC Corporation has a small number of packet switches and Systems. The entire works smoothly, for this type of Setup which routing method is most appropriate? Give Reason.

STATIC ROUTING:

It is done at boot time. It is straightforward and has low network overhead. It is inflexible.

Q 47: Explain Classification of Networks?

PC networks are gathered by 4 fundamentals which are:

1) BY SIZE:

2) BY CONNECTIVITY:

3) BY MEDIUM:

4) BY MOBILITY:

BY SIZE:

According to their size there are 2 organizations of networks.

1. Local Area Network. (LAN)

2. Wide Area Network (WAN)

BY CONNECTIVITY:

Networks are also classified by connectivity in two topologies.

a) Point-to-Point

b) Broadcast

BY MEDIUM:

The order of organizations is likewise founded on the Medium.

• Copper wire

• Co-axial cable

• Optical fiber

• Radio waves

BY MOBILITY:

The organizations are likewise characterized by their mobility. In this respect there are two types of networks.

• Fixed networks

• Mobile networks

Q 48: Define network topology and VPN?

10Base-T network geography is a transport however wiring geography is a star. There are three most popular topologies. • Star • Ring • Bus

STAR TOPOLOGY: In this geography, all PCs are connected to a main issue, which is once in a while called the "Center point"

RING TOPOLOGY: In this topology of network the computers are connected to each other in closed ring. In this Network first PC passes information to the second and afterward second passes information to third, etc.,

BUS TOPOLOGY: In a bus topology all PCs are joined to a solitary long link and any PC can send information to some other PC.

Virtual Private Network (VPN) joins the highlights of both private and public organizations. Singling association and utilizations public organization for connectivity is restricted.

Q 49: Suppose you are assigned to connect two site offices which are situated for

away from each other. One office in Lahore and other is in Paris. In your opinion
which one will be the appropriate solution for this scenario LAN extension or WAN? Justify your answer with reasons.

Answer:

WIDE AREA NETWORK (WAN):

It is utilized for a nation level systems administration and in any event, for landmasses. In WIDE AREA NETWORK WAN, network occupies larger areas like cities & countries.

Q 50: Suppose you want to add large number of systems in your WAN to increase its capacity. Which kind of exchanging gadgets will be utilized? Also write the names of these switching devices along with difference between them.

We can add ability to WAN by adding more connections and bundle switches. WANs can use circuit-switching or packet-switching techniques. Each change moves a whole parcel starting with one association then onto the next. That is the reason they are called bundle switches.

Q 51: Which approach of error detection is able to detect more errors as compared to others, considering that there should be no increase in the size of information being transmitted? Explain how it works.

CRC has good error detection properties. It is easy to implement in hardware. To enable a network system to detect more error without increasing the amount of information in each packet is called CRC.

Q 52: During data transmission, what are the possible indications if,

a) A frame is missing SOH on beneficiary side
b) A frame is missing EOT on receiver side

Missing SOH shows getting PC missed start of message.

Missing EOT indicates sending computer crashed.

Q 53: Network manager wants absolute privacy in his organization’s computer networks even using public network. Which innovation will be utilized and the way that it guarantees outright protection of bundles?

In addition to check packets, VPN systems use encryption to guarantee absolute privacy.

Q 54: Suppose an organization wants to implement ATM technology in its network. Which type of connection ATM technology will provide in network? 

ATM uses the concept of connection-oriented networking. Associations in ATM are called virtual channels (VC) or virtual circuits (a term liked by some). An ATM network is worked from interconnected ATM switches. The connection focuses or ports can be associated with PCs or other ATM switches.

Q 55: Suppose in computer network of a chemical company, each packet is transferred with equal amount of time between systems. Considering this scenario what will be the jitter of the network.

A network with zero jitter takes the very same measure of time to move every bundle. An organization with high jitter takes significantly longer to convey a few Packets.

Q 56: Write the name (Abbreviation) of ATM?                                                            

ATM stands for (ASYNCHRONOUS TRANSFER MODE).

Q 57: How to increase the capacity of WAN?

We can add ability to WAN by adding more connections and bundle switches.

Q 58: We have to use repeaters to extend LAN. Is there any problem in LAN due to repeaters? Give Reason.

A bridge is an equipment gadget likewise used to interface two LAN portions to expand a LAN. Not at all like a repeater, a scaffold utilizes two NICs to interface two sections. It pays attention to all traffic and perceives outline design. It also forwards only correct complete frames and discards the crash and error frames.

Q 59: Define two types of Virtual Channel or circuit used in ATM?

VPI or Virtual Path Indicator (8- bit),

VCI or Virtual Channel Indicator (16-bits),

Q 60: Which of the following are Ethernet fields?

CRC, Flag, Frame Type, Preamble, Destination Address, Source Address and Data,


Computer Networks

Q 61: As we know when bridge network forms a cycle then not all bridges on the network must be allowed to forward broadcast frames So tell the which algorithm resolve this problem?

The bridges speak with one another on the network and use Distributed Spanning Tree (DST) algorithm to conclude which extension won't advance casings on the off chance that a cycle happens.

Q 62: Which technology is used to copy frame data directly from main memory?

LAN interface may use DMA technology to copy frame data directly from main memory.

Q 63: ATM network specifies a 24 bits VPI/VCI connection identifier. What number of pieces VPI and VCI possesses independently?

VPI or Virtual Path Indicator (8- bit),                                                              

VCI or Virtual Channel Indicator (16-bits),

Q 64: Why repeaters are not used for extension with large networks? Give at least two reasons.

Dissimilar to a repeater, a bridge utilizes two NICs to interface two sections. It pays attention to all traffic and perceives outline design. It also forwards only correct complete frames and discards the crash and error frames.

Q 65: Suppose in a university campus, bridges are used in its local area network. Explain all steps, how bridge builds up address list table of all attached computers?

A bridge keeps a list for segment that consist physical addresses of the computer attached to that segment. In this way a bridge realizes on which fragment an objective PC is connected. Most bridges are self-learning bridges.

When it boots its address table is empty. At the point when it gets outlines from different PCs it fires developing its location table.



Q 66: Suppose we have to extend an Ethernet segment up to three segments then how many repeaters will be needed for this purpose?

One repeater double, two repeaters triple the maximum cable length limitation.

PCs joined to various sections impart as though they are associated with a similar link.

Q 67: Assume ABC Company has two LAN segment connected through bridge. In which state both LAN segment can communicate simultaneously?

In a steady state, a bridge allows simultaneous use of segment and then both LAN segment can communicate simultaneously in this state.

Q 68: Is it necessary to use terminator at both ends of thin Ethernet cable? Give your answer with the solid reason. 

There is a lot of signal reflectance in the network. To avoid this, we use terminators at the end of Thin Ethernet

Q 69: A specialized computer system is used in a network in order to measure the performance of network what is specific name for such computer network and mention any three types of information it can provided in this regard?

A network analyzer also called network monitor is used to examine the performance of a network. It can report information such as capacity utilization, distribution of frame size, collision rate or token circulation time.

Q 70: Define three benefits of ATM.

ATM is a solitary innovation that is intended to meet the objectives of the two LANs and WANs. ATM uses the idea of CON connection-oriented networking.

It transmits data at over 100Mbps.

It utilizes fiber optics to interface PC to switch.

Each connection includes two fibers.

Q 71: What is the difference between LAN and WAN?

Local area network (LAN)
LAN is little in size covers the region inside a room, building or urban communities.
Wide area network (WAN)
WAN is enormous in size and covers the region urban areas, nations and landmasses.

Q 72: Define the term Jitter.

The term Jitter is difference in transmission delays. Jitter is significance for
voice, video and data. Jitter can happen when a parcel is deferred on the grounds that the network is busy.

Q 73: Briefly Explain Thick Ethernet wiring scheme.

THICK ETHERNET WIRING:

It uses thick coax cable. AUI link (or handset or drop link) associates from NIC to handset. AUI link conveys computerized signal from NIC to handset. AUI link conveys computerized signal from NIC to handset. It requires terminators to avoid signal reflectance.

Q 74: If we have 8 computers which type of Ethernet is used thick or thin?

Thin Ethernet is helpful when numerous PCs are found near one another.

Q 75: Give Some Advantage of bridge.

A bridge is an equipment gadget likewise used to interface two LAN sections to expand a LAN. Most bridges are self-learning bridges.

A bridges network can connect many segments.

The bridges design themselves consequently to conclude which scaffold will advance transmission casings and which extension will not.

Q 76: Write Types of delay.

There are following types of delay:

PROPAGATION DELAY: It defined as the time to travel across medium.

SWITCHING DELAY: It is the time expected for network part (hub, bridge, packet switch) to forward data.

ACCESS DELAY: It is the time expected to oversee medium (CSMA/CD, token).

QUEUING DELAY: It is the time investigated in packet switches.

Q 77: Suppose a network administrator wants to get automatic updates of routing information in a router, if any changes occur in the network, which routing algorithm will be used in this case? Give reason.

DYNAMIC ROUTING: It allows automatic updates to a programmer. It can work around network disappointments consequently.

Q 78: Routing of packet from source to destination does not depend on source address of a packet write any two advantages of this In-dependency.

It has several benefits. It allows fast and efficient routing.

The network can keep on working regardless of whether geography changes without advising whole network.

Q 79: Define QoS services briefly.

There are 3 kinds of QoS determinations, which are given as follows:

CONSTANT BIT RATE (CBR):

It is utilized for sound and video, since these have predefined greatest information rates.

VARIABLE BIT RATE (VBR):

It is utilized for compacted sound and video where the information rate relies upon the degree of pressure.

AVAILABLE BIT RATE (ABR):

It is used for typical data applications (where the data rate may be unknown) and allows use of whatever bandwidth is available at a given time.

Q 80: Which type of quality service specifies of ATM would be applied in each of the following?

(a) When network engineer want to use ATM for compressed audio and video……CBR
(b) Network administrator needs services for typical data application…………ABR


CS610 Virtual University

Q 81: Suppose a network administration of XYZ organization given a task to develop a network in a limited area with low cost then which wiring scheme will you use? Justify your answer with reasons?

Twisted pair Ethernet is the least expensive wiring that makes it so well known.

Q 82: Describe the structure of physical address in WAN if you have (1, 5) on a switch then who will you elaborate this address?

Many WANs use hierarchical addressing for efficiency. One part of address identifies destination switch. Other piece of address recognizes port on switch.

                                                                                                                                      

Q 83: What is best in CBR VBR or ABR?

ABR (Available Bit Rate) is best, because it is used for typical data applications and allows use of whatever bandwidth is available at a given time.


Q 84: What service specification would be used when intend to transmit data which is less critical.

Variable Bit Rate (VBR) And Available Bit Rate (ABR) both can be implied.

Q 85: What is the solution to avoid duplication of redundant information in address table?

Routing table entries can be bent with a default route. If the destination is not clear in routing table entry, then it uses a default route.

Q 86: Write down the names of switches used to add many systems to WAN. Also differentiate these switches

Interior switch: The switch that has no attached computers is called an interior switch.

Exterior switch: The switch that has PCs appended with it is called exterior switch.

Both interior and exterior switches sent packets and they required routing tables.


Q 87: Explain how does a bridge build up its address table?

When it boots its address table is empty. At the point when it gets outlines from different PCs it fires developing its location table. The table is fully occupied once it had received at least one frame from attached computer.


Q 88: Can we increase the maximum cable length as many times as we wish by just adding repeaters?

No

Q 89: Due to Which reason ATM is adopted as single underline technology.

It was designed as a single technology for voice, video and data and has low jitter (difference in delivery time) and high capacity.

Q 90: Which type of wireless use Wi-Fi?                                                                 

See From Google or Find Its Answer yourself. Thanks









Post a Comment

0 Comments