0 ratings 0% found this document useful (0 votes) 33 views 13 pages Assignment Week 1-12 Solution Jan-April 2020
The document contains a series of assignments and questions related to computer networks, covering topics such as atomic actions, critical section problems, thread and process characteristics, network devices, and protocols. It includes multiple-choice questions with correct answers indicated for various networking concepts, assignments due dates, and course outlines. The content appears to be part of an educational course on computer networks, specifically structured for assessments and learning objectives.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save Assignment Week 1-12 Solution Jan-April 2020 For Later revewwd@rcliinacin
NPTEL » Computer Networks and ‘About the Course Ask a Q.
Unit 2 - Week 0 Assignment 0
Cours oxting Assignment 0
eae ee Te de doe or suiting thi asgnment hs posse Due on 2020-01-27, 23:58 IST.
cornet 'As per ourrecores you have not submtoa ths assent
ous pctrrsento +) What is an atomic action? 1 point
ar 42) sequence of instructions te be executed without any interruption.
a] ) A sequence of instructions can be interrupted during the execution
=» Iti a synonym of the single threaded process.
weeks 4) None of the above.
»
Wook 6 A
Week 7 a
wee ‘Accent Anewers:
Wook 8 0
ap 2 Amongithe three given inthe following, what are the requirements of acritical section problem? ome
was 1) Mutual exclusion
Weck 12 1 Progress.
Text Tarezrte Bounded waiting.
Det Station Select the correct option.
Ue tnteactive Seaton 2) 0nWyi
bon
al
a)only tt
»
a
‘Accepteg Aree:
e
) Which statements are true for thread and a process? ome
1) Both execute a series of instructions
TVA process is easy to create while thread requires duplication ofthe parent thread.
i Communication between processes requires IPC. However, communication between threads inthe
same process does not require any IPC.
hv) Processes are independent, hile threads are dependent.
Select cored option:
2) Only Bi
bjonlym &w
) Only land i
aa
»
a
a
to, america
Sear
Accenteg Aree:
@
©) What true fora ueer-sace program? pom
8} Auser space program dlrectly interacts with the hardware.
1b) A userspace program manages all the system resources.
©) Auser-space program has limited access tothe system resources,
4) Device divers are examples of a user program.
»
a
‘Accent Answers:
e
8) What isnot true far a system call? ome
2) System calls are an interface to contact with the kernel
‘yA program has to wait untila system cal irishes its work.
System call generates software interrupt forthe kernel
«) Kernel module needs the system cal to interact with other kernel modules.
»
»
4
‘copie Anewors
s
©) Which ofthe fllowing isnot an inter Pracess Communication (IP) methodology? —
1) Named FIFO
') Remote Procedure Call
©) Queue
Pipe
»
a
Accent Answers:
e
7) Among the following techniques, which does provide a solution fora critical section problem? ome
4) Shared memory
by Mutex
Pipe
Queue
c)
a
a
te, anmeriaicae.
‘Aecentes Arewer:
y
How do you execute @ new program as a new process inthe Linux system? ‘point
2} Fork
) Fork followed by exec
Bee
4) exec Followed by fork
a
%
@
a
serio
‘Aeceptes Aree:
x
© Find out the correct statements from the followings. ‘point
|) Operating System isan example of a sytem program.
1) Cal by eeference fs avalabe in the C programming longuage.
) Media codecs are kernel space program:
|n) The red-black tre is typeof selF-balancing binary search ree.
Select appropriate option:
2) Only
b) Only iv
Oni i
‘Only Riv
c)
a
a
te, anmeriaicae.
‘Aecentes Aree:
°
*9) what willbe the output ofthe following C program? pom
ant main(){
ant = 6;
af (i> 5)
af (i> 9)
1-0
else
a7
printf("ad\n", i):
return 0;
»
ar
p10
Je
4) Compiler dependent
‘copie Anewors
oarr ‘Avout the Course Aska Qu co
Unit 3 - Week 1
Cours oxting Week 1 Assignment 1
evant cot grag pet pe won 20-02-12 2550 1
eae aera aoe
Manco neienmens A router works in to
te a. Physical Layer
es Daa Link Layer
nr Network Layer
ace Nt Pret 4, Transport Laver
(tsar 3: Data Noor —
Diet Leyrsal be to, america
Pree Sic Soir
‘Accented Aree:
tac 5 Aposton ayer é
“Otero Prize
‘depletion Layer
2) Which of the following network device is uced for interconnecting two LANs werking om the ‘ame
same protocel?
(ute: Weck Aananment«
We Feta Repeater
b. Hub
as 4. None ofthese
erica
ecepes Anawer:
wees 3) Which of the following is a transport layer protocol? pot
se) a. SMTP
Wook 11 b. UDP
ICMP
weet 2 a
Text ranserots
Downlond videos 2
Live ieractve Sesion to, anor iicore.
sect owas
© In which layer NICs work? 1 pote
a Network Layer
». Data Link Layer
. Transport Layer
<. Application Layer
a
‘pecertes nawers
®
5) Which ofthe following nerwork device filters network traffic based on the MAC adresses? ol
4 Bridge
1b. Rowter
«, Repeater
Hub
‘copie Answer
© Telephone system network is the one af example of: coe
a. Cisuit switching
1 Packet switching
©, None of these
pwr.
‘Accented Aree:
7A file of ‘x bits’ is sent from host A to host B over a circuit switched network that uses TDM. ‘poi
“with ‘h slots’ and havea bitrate of *R Mbps’. The citcuit establish time is k seconds. Find the
total time,
a (AHY/R secs
b. (Thy + k) secs
(SYR secs
4. (UR +k) sees
t,t anor iio.
scopes owes:
© Datagram switching is @ 1 point
‘2. Conmection-otiented packet switching
. Connactionless packet switching
None of these
scsi fons:
5) Which protocol is used to acquire the MAC address ofa host whose IP address is known? ol
‘4 Dynamic Host Control Protocol
, Address Resolution Protocol
. User Datagram Protocol
1d. None of these
to, america
Sear
‘Accented Aree:
"© Which ofthese following protocol prevents out-of-order delivery of data? pom
&.DNS
».UDP
TCP
4. None of these
‘econo Aneworarr
aren ‘Avout the Course Aska Qu
roviowes@rotl imac
Mento
Unit 4 - Week 2
‘Course outtine
Lace 6 Apleaton aye
“Danan Nae Bsons
Lec 7: ston Layer
(tech Apso Ler
IN Hyprtea Tte
Lec 9: Aopen Leer
(Lach 10: aio Layer
Vp rareo
tac mati of Wok 2
(ute: Week 2Aasgnment 2
Wook 7
‘ext arsenite
Week 2 Assignment 2
‘eae dete for suming hs ssgnment hs essa Due on 2020-02-12, 23:59 IST,
sper ourrecores you have not submtea ths esr
Which of the following is a remote login application?
atalnet
».DNS
<. SMTP
FTP
‘copie Answer
® whieh of the following network management command is used for querying the DNS?
a. netstat
b. nslookup
whois
4. None of these
eet tomar:
8) Which of the following file is used to configure DNS in the client side?
achosts
bb nsswitch.conf
«.reselv.conf
<4. np.cont
en sneer icome
‘Accepts Aree:
Which ofthe following system call puts the server socket ina passive mode and waits forthe
‘lient to approach the server to make a connection?
buaccept
«listen
aubind
Accept newer:
8) FTP control connection is initiated on port number
3.20
bat
80
43,
eet tomar:
©) HTTP cookie ie stored in
a, user's computer
. None of these
°
‘Accented Aree:
7) Which port does HTTP ws in tausport layer?
380
baa
20
dat
‘Aesop Anewors:
© Telnet does not use any security mechanism and transfers the data over network/intermet in &
plain-text form including the passwords.
Tue
b. False
.
Smee
‘Accented Aree:
8) SMTP servare commonly use the TCP on port number
at
b.22
oB
4.25
to, america
Sear
‘Accented Aree:
9) SNMP is an application ayer protocol which is used to
‘transfer mail from one user to another
'b. monitor the network, detect network Fults ete
«c.move files between local and remote filesystems
4. transports messages between devices
eset:
1 point
+ point
+ pom:
1 point
+ pom:
‘ome
+ pom:
‘ome
ome‘About the Course Ask a Q.
Cours oxting Week 3 Assignment 3
a ee The de doe or suiting thie asgnment hs posse Due on 2020-02-18, 23:58 IST.
cour wor AS per our records you have not submitted this assignment.
2. Which of the ftlwing layer provides ost hos communication services for pplictions? ‘oan
ots
Date tink Laver
ee bb. Network Layer
ms Teapot
eee ere] @LAppiaon Layer
"= Connection (Comte) *
Pee a
(@ Lecture 18: Transport Layer Y o
a taaerae
onto 2 Daaom node communication wed byte IP end UDP potcl wet dats maybe deed tom
vm out of order.
ur espe
“Wee 3 Feeback Foe a Tue
b aae
ons :
er ———
Weak © Which of the following is a reliable protocol? pom
weeks a TCP
wo uve
sawn ¢ None dase
ieee :
—
eS 4 Congestion contol prevents senders fom overhelning he ~~, lw ome reverts ‘rte
the sender from overwhelming the —
a receiver, network
2, network, ceceiver
csender, receiver
1d, None of these
No, tna anawericincatct
scopes owes:
5) Te establish a connection, TCP uses a three-way handshake because both sender and receiver 1 point
need to synchronize their segment sequence numbers used during their transmission,
a. Tne
b. False
‘Aesop Anewor
© The Protocol Data Unit (PDU) ofthe transport laver is called + oi
a Packet
».Bit
Frame
<4 Segment
cepa ene:
” The field contains the next segment number thatthe sender ofthe 1 point
acknowledgment expects to receive
1. Sequence number
, Acknowledgment number
‘cori Anewors
© In =, duplicate packets from ¢ previous conection (which has been closed) between the 1 point
‘nso nodes might still be floating on the network.
a. Qaway handshake
bb, Shway handshake
.
‘Accented Aree:
8) Which of the following is the correct statement? pom
a. TCP is unreliable, IP is uneeliable
b. TCP is liable, IP is teliable
. TCPis unreliable, IP is reliable
4. TCP is eliable, IP is unreliable
a
Smee
Accented Aree:
¢
91 Whieh of the following isthe correct statement? pom
Go Back N ARQ rejects out-of-order packets
1, In Selective Repeat ARQ, out-of-order delivery can not happen
¢ InGo Back N ARQ, number of retransmissions in case of packet drop is 1
44. In Stap and Wait ARQ, lost data problem is recolved by eequence number
‘copie AnswerUnit 6 - Week 4
‘Course outtine
Management nd Covgetin
Lace 18: Taner ayer
ut woo Assignment ¢
Wid Fence Frm
Wook 7
‘ext Warcorote
reviowet@rptlimacin y
‘About the Course
Week 4 Assignment 4
‘Ted date for submiting this asgnment ha passa Due on 2020-02-26, 23:59 IST,
'As per ourrecores you have not submtoa ths assent
Consider the bandit 9s 50 Kbps, one way tant time=240 mses ad the segme pst
1000 bit. Consider the event ofa seament transmission andthe corresponding ACK reception
Find the maximum numberof segments shat canbe oustanding during this duration.
(23
24
3s
(26
‘@
8
°
0
to, snes
ests Anoers:
8
2 nthe sender. application data is sent from the transpor layer to the IP layer by the —— ell point
(read,
(ite)
(© received)
®
®
©
esp Aner:
S
8 Sender and ressiverneeds ro dynamically adjust buffer allocations for * pot
{@) low contol
(©) conzestion contr
© reliability
(@ connection estalisimnent
©
®
8
6
seca Ars
e
°
© Transport layer is implemented in psi
(9) Userspace
(6) Kemel
®
8
to,neanmainncorc
ests Aree:
°
© merder to avoid congestion, the sending rate should be poi
(0) receiver ate
(©) maxinuannetwork rate, eceiversate)
(6)
a some aise.
‘Accented Aree:
a
2 How long does the receiver wait before it sends a delayed acknowledgment for receiving
ew mote packets?
(RIT
(oy 2-RTT
(9)250ms.
(2) 300 ms
”
»
»
8
‘Accent Answers:
o
5) Nagle's algorithm states that send a short packets in a TCP connection unless the previous
short packets are acknowledged by the receiver.
(a) True
(0) False
”
»
‘cent Answers:
°
©) Whenever the receiver advertises a large window sie, silly window eyndiome
happens.
(a) Tue
(b) Fase
»
5
‘copie Answers
o
8) The solution to silly window syndrome problem iste
(2) Nagle’ algorithm
(©) Clark's solution
(© Jacobson’ algorithaa
(@ None of these
e
2
°
«
erica.
decent Answers:
«
°
8 TCP stores the out of order data if there is space in receiver window, and sends a
duplicate ACK.
(Tie
(0) False
5
to, anor isicore.
ese Answers:
a
7 Jacobson’s algorithm is used to
(@) solve silly window syndrome problem
(b) handle out of order data problem
() caleulate dynamic time out timer
“
5
8
‘econ nave
o
© Which ofthe following TCP timers avoid deadlock when receiver butfer is
announced as zero?
() Tine wait timer
(©) Rewansmission timer
(©) Keepalive timer
(4) Persistent timer
5
8
a
t,t anor iio.
‘Aeceptes Aree:
@
© Kamis Algorithm ignotes reuansmitted segments when updating the round-trip
time estimate,
(a) True
() False
«
5
te, anomeric.
‘Aecentes Aree:
a
“*91 In the slow start phase in TCP congestion contol, the congestion window is
increased
(6) linearly
(b) exponentially
(©)nane of these
»
»
®
‘ecopte Anewors
o
1 point
1 ome
‘pone
+ pom:
+ point
+ oi
1 point
‘pone
1 point
1 pointee
Se ‘About the Course
roviowes@rotl imac
Mento
Unit 8 - Week 6
‘Course outtine
tec 28: Noto Layrt—
(st Casts sang
(hvet-cioR
(hve Newon Aas
Taran aT)
(ute: Week sananment 6
‘ext Wareerots
Week 6 Assignment 6
‘Ted date for submiting this asgnment ha passa Due on 2020-09-11, 23:59 IST,
9) The network layer doesn't guarantee delivery of each packet, and doesn't promise to
deliver them in the same onder.
@ Tue
(False
»
»
goer
‘Accented Aree:
a
2 wi
communicating with another IP adress?
@r
(ice
(oMQrT
(ante
of the following protocal i used by the routers to send error meseages when
»
2
°
«
te, anomeric.
‘Aecentes Aree:
o
© What is the maximum number of hosts that can be atached to a Class Ain the [Pv
addressing system ?
26
(2016-2
2a
(774-2
»
®
a
‘Aecentes Answers:
o
9) The adavess of a class B host isto be split into subnets with a6-bit subnet number. What i
the macinum number of subnets and the maximum number af hosts in each subset?
(a) 62 subnets and 262142 hosts,
(©) 64 subnets and 262142 hosts.
(©) 62 subnets and 1022 hosts.
(4) 64 subnets and 1024 hosts,
«
»
e
“
on never aca
‘conte Answers
&
5) Given IP Address: 172.16 0.025, find the umber of subnets and the numberof hosts per
ube.
(9) 514 subnets and 128 hosts per subnet
(©) 512 subnets and 126 hosts per subnet
{(€) 814 subnets and 126 hosts per subnet
(@) 512 subnets and 128 hosts per subnet
»
»
®
a
‘Aesop Anewor
o
9 Inthe 1Pv4 addressing format, the number of nerworks allowed under Class C adresses is
(24
wer
(221
(2
»
»
&
“
one rene incomet.
‘copie Answers
&
7 Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively
and they both use the same netmask N. Which of dhe values of N given below should not be
used If A and B should belong to the same network?
(@) 255.255.2550
(6) 255.255.255.128
(c) 255.255.255.192
(a) 235.255.255.224
e
>
°
«
i, sneor nico.
‘Accepts Aree:
@
5 NAT canhelp to balance the load of muldiple identical server accessible from a single IP
address,
(The
0) Fase
»
‘ccente Answers:
a
8) 1P6 supports broadcast mechanisms
(Tne
(False
»
(o DES26A:
(@AECE::1:600:
®
»
8
6
‘econo Anewors
o
1 point
pom
1 point
pom
+ pom:
1 point
pom
pom‘About the Course
‘Course outtine
(hats 3)
(Ganctas notte)
(aie Pong Tle
Shope).
(ae Serasng)
United a ete
Seren anc)
‘ute: Wook 7 Assanment 7
‘ext arsenite
Week 7 Assignment 7
‘Ted date for submiting this asgnment ha passa Due on 2020-09-16, 23:59 IST.
'As per ourrecores you have not submtoa ths assent
+) Here two computers are connected via link. The bandwidth ofthe inks Mbps (Mops = 20° ‘point
‘its per second) and the delay ls SOOmilizaconds. Assume that you are sending 2 SMIB
(aMebinyte (Mia) = bytes fle from A to 8. What wl be the transmission delay and the
propagation delay?
wows . BT]
9) Transmission dele: 05s, propegstion delay: 1.5350%e¢
1b) Transmission delay: 10.48576se, propagation delay: 05sec
{Transmission delay sec, propagation delay: 1.31072
1) Transmission delay: 1.31072se, propagation delay: sec
»
a
‘Aecente Answers:
o
2 Whats a service level agreement? 100m
8) Tels the agreement to maintain constant bitrate,
Its the agreement to maintain reliable connection between two hosts.
)_ tis the agreement to maintain Os.
Ie the agreement to maintain connect
c)
a
a
te, anmeriaicae.
‘Accented Aree:
e
© What does traffic shoping do in QoS? et
48} ‘Itregulates the incoming traffic rate.
It regulates the outgoing trae rate
)_Itpriortizes the outgoing flaw as pr polly.
) Mepriortizes the incoming flow as per policy.
»
»
@
4
on rovers icaat
Accept newer:
x
©) Assume thereisa token buffer traffic shaper with token arrival rater and bucket size tf packets arive in ‘pom
bursts witha burst interval of time t and an arial rate ofp, what the maximum deperture rate from the
traffic shaper?
a) ep
be
2 bt
8) (ony
»
a
‘Accent Anewers:
7
5) Given the arrival rate inthe table, how long wilt take to clear the trafic with a leaky bucket traffic shaper 170m
having a leak rate of Splt per sec and bucket size 20pkts. How many packets does it need to drop?
‘Start ime (ese) End time ‘Arial rat =)
4 ©
7 10
2 3
2 4
8) 124 sec, 20 packets dropped
b) 13.4 sec, 15 packets dropped
6) 144 sec, 10 packets dropped
6) 15.4sec, 5 packets dropped
a
»
@
6
on rovers cat
‘econ Arewor
2
Whats (re) true for intserv and Diffserv? 1 point
2) DilfServ provides 008 by eiferentiating trafic based on the information available inthe packet
‘while Inter provides Qos based onthe service agreement
b}IntServ architecture is suitable forthe Internet scale service while Diffserv provides guaranteed
end-to-end Cs.
)_iffServaware routers implement per-hop Qo behaviors while IntServ maintains end-to-end Qos
by resource reservation.
4) Bandwidth broker is required in ntSer architecture while RSVP fs required for DIServ
architecture,
a
)
o
a
i, sneak
‘Accepted Aree:
a
3
7) Whatis true fora resource reservation protocol? ‘point
12) tls 2rauting protocol
1b) tris to reserve the required resources throughout the path
RSVP demon tas to only remote routing protocol daemon.
a
©) What happens in trafic classification and conditioning? ‘point
4) Mapping packets to a forwarding class supported in the next DS domain
8) Choosing the correct path fer a packet to forward tothe next notwork
}_ Reserving the resources in next DS domain to provide Inter
4) None ofthe above
»
a
‘Accent Anewers:
7
©) Random Early Detection (RED) queue is used to pom
‘} avoid congestion inthe network before it ocous.
') drop random packets from the queue to make space for anew packet.
)_ provide fatr queuing among the efferent classes of wai
44) smoath out drop prabablity across all the flows.
»
»
4
on reer scat
Accept newer:
a
a
7° Why i TCP traicelastic trafic? samt
2) TC sends waffle ata constant rate.
b) TOP adjusts trae rate based on congestion.
TCP maintains end-to-end flow contro,
4) None ofthe above:
‘copies Anewors
s‘About the Course
Unit 10 - Week 8
‘Course outtine
vento spn Week 8 Assignment 8
ee ‘eae dete for suming hs ssgnment hs essa Due on 2020-09-25, 23:59 IST.
sper ourrecores you have not submtea ths esr
) What does the router do? tm
= 2) Route pockets rom one port to another in the sme sub network
= b) Route packets rom one network to another network.
.. €) The routers another name ofthe HTTP serve, serves webpages
ns <)Mone ot te above,
Wook 6 °
3
ron °
°
Week & ed
ctsanmieneaenie Oy
nan: faronte 5
routing 2 What is the network address for the following IP addresses: tm
‘tome Rouge I]IP Address: 10:5.27.15, IP Mask: 255,255.288.0
Legon eran i Adres: 1721812100, 1 Mk 2528000
a Select he orc option
nan 0:faronte
vero, ann 105.240,9)17218.20
ae byn105.270,m a7238120
cota web Ansignment 1) 10.5,24.0, ii) 172,16.0.0
4)9105270,1917.3600
= A
Week tt *
3
wt seymour
mee
ver ee
a *
9) How does the router decide the destination if multiple entries in routing tables match with the destination 1
oe on
sate?
2) pes the frst one
Dy pls the destination wth the longest refi mtcing
tees the destin th he shore rete mtg
4) pics the st matched destination
.
5
:
3
seme Amr
6
4) What are the correct statements in the context of an autonomous system (AS)? —
1) Avast Scans walt om one ASto anater.
1) Tat AS by dtol muthome AS.
1) AsubAS can ot ca ay tana afte
See! he comet optns
an
by wa
a wai
oe
.
5
°
3
tesbeg nom
Sco Anu
:
5) For the following network, what willbe the routing table Information for nade € if we use a link state i=
rong pet
Qa
i :
/
a
:
4
* » 6 a
a
5
5
5
seve hor
5
© nPke tom
«tance vector outing poten
by nk sae outing retool
hPa vector ting eel
3
router needs tobe configured in 2 way such that forwards all packets whose destination IPs are in ‘ont
the range of 172.2400 to 172.25.255.255 to the gateway 192,168,238 though the interface enpds2.
Select the correct command
a) ap route add 172.24.0.0/15 dev enp®s2
b) ap route add 172.24.0.6 via 192.168.2.38/16 dev enpas2
c) ap route add 172.24.0.0/16 via 192.168.2.38 dev enpOs2
4) ap route add 172.24.0.0/15 via 192.168.2.38 dev enpas2
eB
3
“1
i
5) Which options are true for SDN? pom
4) SDN moves the contol plane to a centralized server.
by) Switches inthe SDN need to be very smart,
)_llthe traffic inthe SON needs to go through the controler.
4d) The switches contact SON when a packet does not match with any af the enstng rules.
a some aise.
‘Aecenteg Anewer:
a
a
Select the Openfiow controle. 1 pant
a) NS
bya
) omnetss
) Opendaytghe
5
4
doesn wwe:
e
®
7 Whats the advantage of using a network emulator over a network simulator? + point
8}, Emulator alls caleulting things that have to go through the network instead of actually
sending them,
1b) allows the user to set up an arbitrary network ina single hardware,
«)Itean be used in rel network applications
4) Mathematical model canbe executed without implementing them n eal network.
5
3
1 ome
2} -mn—topo single3.4
b)-mn-topo single 43
6) mn~topo tinear 3.4
) mn topo linear 4.3
i, sneer inicoe.
‘Accepted Aree:
°
what is true forthe north-bound interface in SON? + point
19}, North-bound interface communicates teaffic withthe higher plane'in the SON,
1b) Communication between data-plane and contal plane happens via the northbound interface.
6) Allthe automation and orchestration ofthe system takes place via the north-bound interface,
4) The controller controls the packet through a north-bound interface
»
cy)
a
a
te, anor isicore.
Accepted Anewer:
a
3
7) whatdoes a data-piane do? ome
42) Decide where to send a packet based on a central policy
bi). Forward the data packet
} Contigute the hardware
4d) None of them
‘copies Anewors
s‘About the Course Ask a Q.
Unit 12 - Week 10
—— : Week 10 Assignment 10
ee ‘eae dete for suming i ssgnment hs ossae Due on 2020-04-06, 23:59 IST,
sper ourrecores you have not submtea ths esr
* whatis the difference between MAC sublayer and LLC sublayer? ‘point
2), LLC multiplexes date from network layer ane demultplexes data to network layer, MAC layer
Week 2 provides mechanism to access the physical medium to recelve and transmit data
b)Uallows a network device tobe uniguely identified in a LAN, MAC multiplexes date from network
c= layer and demuitiplexes data to network ayer.
7 LLC optional if error control net required, MAC Is optional flow contra snot reeulred.
1) ULC provides flow control and error control over two devices in 8 LAN, MAC yer uniquely
week's identifies a network card in a LAN
Wook 6 »
»
week? ot
weeks 4
on never aca
wee ‘econ Anewor
o
Week 10 |
Over sper 802.3 standard, what ithe length of MAC address? 0m
Boi Coron 9) 128 ots
(Lect 8: Oa Ln Layer by) sabe
Leche 49: Oa Lik Lager o} Bbite
eration) 4) none of ther
Lac tit Wk 10 »
a
ate men Assen 5
ma WionaFos te, anmeriaicae.
‘Accented Aree:
Week e
ook 12 3) Which options are true? points
SES 28) CSMAYCD should be used when the transmitter and the receiver can not be turned on
Download videos srnuitaneously
eta Sraton b) CSMA/CD have less collision probability than that of Aloha
Live erste Sesion ©). Slotted Aloha does not sense before sending data
18) Anode can stat transiting date only at beginning of slot slotted lah
>
a
te ne anoweraincanee,
Sear
‘Accented Aree:
>
@
a
Aloha (slotted or pure) used in wireless medium because pom
4) Itis not ahvays possible to detec collision aprior due to hidden node
b) Itean detect eoliion faster than CSMA/CD
)_ It detectshidden nodes before transmitting data
) It clears the paths before any transmission.
c)
a
a
te, anmeriaicae.
‘Accented Aree:
a
5 whats the difference between a repeater and 2 hub? pom
2) Arepeaterrelays/amplifes/regenerates incoming signals and forwards. Hub forwards incoming
signal to al the outgoing ports
1) Arepeater allows multiple computers tobe connected. Ahub increases the coverage ofa signal
©) Arepeateris an analog device, while a hub isa digital device.
1) Multiple repeaters can be connectedin the form of a chain to increase range, mukiple hubs an be
connected inthe form of a ee to connect more devices
»
»
2
8
one nema incomet
‘Aesop Anewor
o
@
© What are the properties of itched ethernet? pom
4} Filter segments based on IP address
1). High tization of computer networks
1) Unencrypted data leakage can be avoided
4) Colson rates very high
>
a
a
to, american
Sear
‘Aecenteg Anewer:
>
e
7) What does preamble doin an ethernet frame? 1 point
4), Provides packet level synchronization
8) Provides frame-level synchronization
©} Provides byte-leve synchronization
«d) Provides bt level synchronization
»
>)
4
‘Accept Answers:
s
©) Whats true for bridged ethernet? pom
2) Colsionis nota all posible in bridged ethernet
b)_ Bridged ethemet breaks the cllion domain by separating LAN
1). Bridged network reduce the overall throughput a result of excess overhead
4). Bridge networks efficency lesser than that of switched network
*
»
8
4
one newer incomet
‘copie Anewor
s
a
© whats the purpose of random exponential backof!? ‘point
2} It guaranteed that collision will nt happen on nest try
b)_Itdecrease the chance of colsion during next try
_Itinereases congestion inthe network
4) Ie decreases latency in of packets
2
»
8
4
‘copie Anewors
s
"01 What are the options that ae true for channel access methods? ‘point
4) Token pasing channel access methods prouide better uization of channel bandwidth under
heavy load
1) Contention base channel access methods provide better(lower transmission latency under ight
lood
)_ Contention based channel access methods proude bettr(lower) transmission latency under heavy
load
4) Token posing channel access methods provide beter uization of channel bandwidth under ight
load
sose
erica
‘Aeceptes Aree:
a
5arr
revewwd@roin
aren ‘Avout the Course Aska Qu
Mento
Unit 13 - Week 11
‘Course outtine
BoOT.DHC?
oore Sucre)
Lec 54: Gonrsng
Wind Feeback Fon
‘ext Warserots
Download Videos
Week 11 Assignment 11
‘Ted date for suming this asgnment has passa Due on 2020-04-15, 23:59 IST,
'As per ourrecores you have not submtoa ths assent
Which of the following TCP/IP protocols is used by a skless machine to obtan its IP address from a
2) RP
b)RARP
ROP
od) ARP
>
»
8
4
Accept newer:
x
hich statement describes a spanning tree network that has converged?
2) Allswitch and bridge ports areelther blocking or looping.
'b) Allswitch and bridge ports are in ether the forwarding state or the blocking state.
}_Allswitch and bridge ports are Inthe forwarding state
4) Allswitch and bridge ports are assigned a either root or designated ports.
‘econo Anewors
s
8) Which s not detected for hidden stations in wireezs LAN?
2) Signal
1) Colision
Frames
6) ate
‘econ Anewors
x
"How does the wireless LAN solve the hidden node problem?
a) By extending the antenna to different locations
) By introducing RTS and crs
¢)_Byintroducing random backoff
) None ofthe above
»
a
to, america
Sear
‘Accented Aree:
o
5) A set that makes stationary or mobile wireless station and alo have optional central base station fs known
2). Extended sevice set
b)_ Network point set
©) Baslesenice set
1) Access pnt
”
a
a
e snoer insane.
‘Aecente Aree:
@
©The address resolution protocol (ARP) is used for
2) Finding the P address ofthe defaut gateway.
1) Finding the IP adress from the ONS.
} Finding the MAC address that corresponds toan IP address
4) Finding the P dress that corresponds toa MAC adress.
»
cy)
a
a
te, anor isicore.
Accepted Anewer:
e
7) Which component of ARP is responsible fo sending # reply tothe data link layer?
2), Input Module
1) Queue Contrtier
©) Cache Controller
4d) Output Module
‘copie Answers
7
©) Which ofthe fellowing describes the function of RARE?
2) leis used to map a 32-bit address to. 48-bit ethernet address
1) is used to map. 32-t ethermet adress toa 4-bItP address
)_ tls used to map a da-bit ethernet address to 32-bit P addres.
6) tis used to map a 48-bit IP address to 2 32-bit ethernet address
‘Aesop Arewor
2
® Which of the following is used to create a subnetting effect without explicitly declaring agatewey?
3) Routing Table
b) ARP Table
©) RARD Table
) Cache Table
‘econo Anewors
s
7) Which ofthe Following sfare provided by VLAN?
8}, Congestion control
») Wireless communication
©) Timeetficiency
) Reduce network traffic
te, anomeric.
‘Aecentes Arewer:
e
a
1 point
1 point
+ pom:
ome
1 ome
1 point
+ point
+ pom:ee ‘Avout the Course Aska Qu co
Unit 14 - Week 12
—— : Week 12 Assignment 12
ee ‘eae dete for suming i ssgnment hs ossae Due on 2020-04-22, 23:59 IST,
sper ourrecores you have not submtea ths esr
Which ote flowing verte for Tme-Divsion mnipl access CTDMAY? ‘eit
2) Provides event equncy band t deen data steams
woz 1) Provide diferent code o different spreading code radios.
6) Provides diferent ime dot to fet transmiors
woos 4) None ofthom
wet _
Week 5 by
3
Wook 6 a
toyneweerincorct
erp brows:
Week 8 °
Wook 9 2 What is the maxinmm magnitude bit rate in a noiseless channel if signal level L=2 and bandwidth=BW is tm
ted
week 1o a) Halfof BW
vweaest 5) Same a BW
©) Double of BW
Weak 2 © None
ac Lap Pp 5
rr :
Lace 8: Lp Pa 3
pet 3
acre 7 ape Pr to, aero
a savy
Lace 8 Ne Sout eas
secu ea Sey 9) wnt peo sia can be tnasmited by Brondband> "rome
Lecture 60 Network Secu a
re. =P ») Dest
mig i ©) Both Analog and Digital
tec maw et 3 kee
aie: Wook 12 Assign
2 »
Wind 12 Fat Frm c)
a
Text Tarserts :
Download visor te, anmeriaicae.
‘Accented Aree:
Det Station Ee
coc Find the correct statement related to TP Security 1 pain
4) The transport mode protects the original 1P header.
1) The tunnel mode does not protect the original IP header.
©) The transport mote does aot protec the original IP header.
‘)) The tunnel mode protect the original IP header.
‘copie Anewors
o
a
5) What atacis used to make a computer resource unaiabl? psi
2) Denil of service
1) Backsoors
6) Bates ovelows
4) Snooping
i, sneer inicoe.
‘Accepted Aree:
a
© wats the sequence for PCM? ‘poi
8). Sampling, Encoding Quantizing
pecan Anewers
5
7 Fad the channel capacity if the SNR af a tlephone line wi bandwidth of 3000 Fis 10259 point
2) 3 bps
») 3bps
©) 30%
8 30Kbps
»
>)
a
‘ecertes Aomwers
3
Find the security property ifthe dats ofa computer cystem canbe modified only by authorized parities ct
2) neeity
1b) Coniideniity
©) Authennety
Availablity
c)
a
a
te, anmeriaicae.
‘Accented Aree:
a
8 Which type of femal suse fo prevent direct TCP connection Between the host? psi
2) Proxy Server
1) Chen evlgnteways
) Packt filters
Appheation level gateways
‘econ Anewors
x
0) Which ofthe following coding techniques i wed to gt the maximum synchronizing capability? 1 point
2) Pseudotemary
1) Non Return to Zero inverted (NRZI)
(©) Manchester
D) Non Return to Zero-Level (NRZ-L)
‘Aesop Anewors
o