VUSuperior Chat Room

Wednesday, 17 June 2015

CS610 MID TERM SOLVED PAPER BY MUSKAN ALI

                     WWW.VUSUPERIOR.Net
 C610 Solved Mid Term Subjective Question
These Questions Repeated plenty of time in Exams so After learning Handout Please  cast a glance on these questions too…..


 Question # 1
What is the difference between LAN and WAN?
Answer
Local area network (LAN)
LAN is small in size covers the area within a room, building or cities.
Wide area network (WAN)
WAN is large in size and covers the area cities, countries and continents.
Question # 2
Define the term Jitter.
Answer
The term Jitter is used for variance in transmission delays. Jitter is significance for voice, video and data. Jitter can occur when a packet is delayed because the network is busy.
Question # 3
Give a comparison of the following?
Thick Ethernet wiring scheme and Thin Ethernet wiring scheme.
Answer
This uses thick coax cable. AUI cable or transceiver or drop cable connects from NIC to transceiver. AUI cable carries digital signal from NIC to transceiver. The transceiver generates analog signal on coax cable. The wires in AUI carry digital signals power and other control signals. Thick Ethernet also requires terminators to avoid signal reflectance.
Thin Ethernet uses thin coax cable that is cheaper and easier to install than thick Ethernet coax. In thin Ethernet wiring scheme transceiver electronics are built into NIC and NIC connect directly to network medium. Coax cable use connector on NIC. Coax runs directly to back of each connected computer by T-connector. The T-connector directly attaches to NIC.

 Question # 4
                          WWW.VUSUPERIOR.NET
How can Switched Virtual Network be established?
Answer:
Most networks offer dynamic connections that last for a relatively short time. ATM can dynamically establish a switched virtual circuit SVC that allows it as long as necessary and then terminate it. The computer sends a connection request to the switch to which it is attached. Software in the switch finds a path to the destination and sends with the connection request. Each pair of switches in the path communicates to choose a VPI/VCI for their tables. Once the connection is established a message is given back to the originating computer to indicate the SVC is ready.
Question # 5
Describe permanent virtual circuits (PVC).
Answer
ATM can provide the virtual circuits that look like traditional leased digital circuits. The permanent virtual circuits PVC works as long as the customer pays the periodic fee for its use. The forwarding table enter configured the terms used by Telco Provisioning requires two steps.
To determine a complete path.

To choose appropriate VPI/VCI for each step in the path and configures each adjacent pair of switches.
Question # 6
What are default routes draw the table.
Answer
Routing table entries can collapse with a default route. If destination doesn’t have in explicit routing table entry and then it use a default route. It is shown in the below table.
Destination

Next hop

Destination

Next hop

Destination

Next hop

Destination

Next hop

1
-
2
-
1
3,1
2
4,2
*
1,3
4
2,4
2
3,2
4
-


*
2,3
3
-
*
4,3




4
3,4


Node 1

Node 2

Node 3

Node 4





Question # 7
                         WWW.VUSUPERIOR.NET
What is the difference between the physical and logical topologies?
Answer:
Every LAN has a topology, or the way that the devices on a network are arranged and how they communicate with each other.
PHYSICL TOPOLOGY:
The way that the workstations are connected to the network through the actual cables that transmit data -- the physical structure of the network -- is called the physical topology. It depends on the wiring scheme.
LOGICAL TOPOLOGY:
The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. We can say that it is defined by the specific network technology.
Question # 8
Define Vector-Distance Algorithm.
Answer
Packet switches wait for next update message and they iterate through entries in message. If entry has shortest path to destination, insert source as next hop to destination and record distance as distance from next hop to destination plus distance from this switch to next hop.
Question # 9
What is the concept of store and forward technology?
Answer
STORE AND FORWARD:
Data delivery from one computer to another is accomplished through store and forward technology. In this technology packet switch stores incoming packet and also forwards that packet to another switch or computer. For this purpose packet switch has internal memory into which it can hold packet if outgoing connection is busy. Packets for each connection held on queue.
Question # 10
How can Switched Virtual Network be established?
Answer
SWITCHED VIRTUAL CIRCUITS:
Most networks offer dynamic connections, which last for a relatively short time.
To handle this, ATM can dynamically establish a switched virtual circuit (SVC), allow it last as long as necessary and then terminate it.
The terminology comes from the Telco’s where switching system normally refers to all switching.
                             WWW.VUSUPERIOR.NET

ESTABLISHING AN SVC:
The computer sends a connection request to the switch to which it is attached.
Software in the switch finds a network path to the destination and sends along the connection request.
Each pair of switches in the path communicates to choose a VPI/VCI for their tables. Once the connection is established by the destination, a message is sent back to the originating computer to indicate the SVC is ready.
If any switch or the destination computer does not agree to setting up the VC, an error message is sent back and the SVC is not established.
Question # 11
How can a bridge know whether to forward frames?
Answer
The bridge builds a list of MAC addresses on either side of the bridge. Therefore, it knows which packets should be forwarded to the other side and which should not. Most bridges are self-learning bridges. As soon as a frame arrives to a bridge, it extracts a source address from its header and automatically adds it in the list for that segment. In this way a bridge builds up address lists.
In the example of a packet that uses a MAC address not in its table it can err on the side of caution by forwarding the packet.
Question # 12
Compare connection oriented and connectionless Service.
Answer
Connection-Oriented vs. Connectionless Service
This characteristic specifies whether conversations take place in a more or less structured manner. When using a connection-oriented protocol, you incur the overhead of setting up a virtual circuit (a defined communications path) between the sender and receiver, which is maintained until the sender and receiver have completed their entire conversation.
When the conversation is completed, you incur the overhead of tearing down the virtual circuit. Connection-oriented protocols provide guaranteed delivery of messages in the order in which they were sent.
Contrast this with Connectionless service, which does not require establishing a session and a virtual circuit. This can be found in the network layer or transport layer, depending on the protocol. You can think of a connectionless protocol as being akin to mailing a post card. You send it and hope that the receiver gets it. Common features of a connectionless service are:
·        Packets do not need to arrive in a specific order
                             WWW.VUSUPERIOR.NET

·         Reassembly of any packet broken into fragments during transmission must be in
proper order.

·        No time is used in creating a session
·        No Acknowledgement is required.
·        The largest connectionless network in use today is the Internet

Question # 13
Which type of information is obtained from network sniffer and in which mode Network sniffer operates?
Answer:
A network analyzer also called network monitor or a network sniffer is used to examine the performance of or debug a network. It can report statistics such as capacity utilization, distribution of frame size, collision rate or token circulation time
Most installations still use DIX Ethernet encoding in which there is no LLC/SNAP header in the frame. A network analyzer can tell from the values in the type field (small values are lengths, which mean an LLC/SNAP header is located in the first octets of the data area; large values are types, which mean no LLC/SNAP header is included).
The operation of network analyzer is a computer with a network interface that receives all frames, which is called promiscuous mode. So many desktop computers have interface that can be configured for promiscuous mode. When combined with software computer can examine any frame on LAN. In this way the communication across LAN is guaranteed to be private. Computer receives and displays frames on the LAN.
Network analyzer can be configured to filter and process frames. It can count frames of specific type of size. It displays only frames from or to specific computers.
Question # 14
Differentiate b/w Thin Ethernet, Thick Ethernet and Twisted Pair Ethernet?
Answer
Thick Ethernet:
Thick Ethernet, officially known as 10 Base-5, is the oldest form of Ethernet.

                          WWW.VUSUPERIOR.NET

One form of cabling supported by Ethernet is low-loss 50 Ohm coaxial cable as shown in the figure below. This type of cable is 0.5" diameter (usually supplied with a yellow outer PVC coating) and rather inflexible. It has become known in the communications industry as "Thick Ethernet". The official name for this cable is 10 Baseband5 (10B5), indicating that it is specified for baseband communications at 10 Mbps over distances up to 500m.
Thin Ethernet:
Thin Ethernet, officially called 10 Base-2, is a less expensive version of 10 Base-5 (Thick Ethernet) technologies. It uses a lighter and thinner coaxial cable and dispenses with the external transceivers used with 10 Base-5.
10 Base-2 uses an RG-58A/U coaxial cable and is wired in a bus topology. Each device on the network is connected to the bus through a BNC "T" adapter, and each end of the bus must have a 50 Ohm terminator attached. Each node on the bus must be a minimum of 0.5 meters (1.5 feet) apart, and the overall length of the bus must be less than 185 meters (606 feet).
Twisted Pair Ethernet:
Twisted Pair Ethernet (10baseT), sometime also called "UTP" from "Unshielded Twisted Pair", is based on using a cable similar to phone-wiring. The cable is connected via RJ-45 connectors to the network card installed in the PC.
Question # 15
LIST SOME CHARACTERISTICS OF A CLIENT?
Answer
The characteristics of a client are explained below:
"Client is an arbitrary application program.
"It becomes client temporarily.
"It can also perform other computations.
"It is invoked directly by the user.
"It runs locally on the user’s computer.
"It actively initiates contact with a server.
"It contacts one server at a time.
Question # 16
Explain TCP Segment Format?
Answer
TCP uses single format for all messages. TCP uses the term segment to refer to a message. Each message sent from TCP on one machine to TCP on another machine uses this format including data and acknowledgement.
Question # 17
                             WWW.VUSUPERIOR.NET
What is IPv6 Address Notation?
Answer:
128-bit addresses unwidely in dotted decimal; requires 16 numbers:
105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255
69DC: 8864: FFFF: FFFF: 0:1280:8C0A: FFFF
Zero-compression – series of zeroes indicated by two colons
FF0C: 0:0:0:0:0:0:B1
FF0C::B1
IPv6 address with 96 leading zeros is interpreted to hold an IPv4 address
Question # 18
How much data can present on original Ethernet segment at one time? To find out compute the delay-throughput product. The original Ethernet operate at 10 mega bits per second, and a segment was limited to 500 meters. Assume the signals propagate down the cable at 66 percent of the speed of light?
Answer
Speed of light = 299 792 458 m / s
Bandwidth=10
Delay = 66 percent of speed of light =197863022 m/s
Bandwidth Delay product= 247328777500
Question # 19
Explain these terms
Star topology, Ring topology, Frame?
Answer
FRAME:
A frame or hardware frame denotes a packet of a specific format on a specific hardware technology
RING TOPOLOGY
In this topology of network the computers are connected to each other in closed loop.
STAR TOPOLOGY
In this topology, all computers are attached to a central point, which is sometimes called the Hub
Question # 20
Explain the term bridge and its functions
Answer


                                 WWW.VUSUPERIOR.NET
A bridge keeps a list for each segment that consists of physical addresses of the computer attached to that segment. In this way a bridge knows on which segment a destination computer is attached.
Most bridges are self learning bridges. As soon as a frame arrives to a bridge, it extracts a source address from its header and automatically adds it in the list for that segment. In this way a bridge builds up address lists.
A bridge is a hardware device also used to connect two LAN segments to extend a LAN.
FRAME FILTERING
The most important task a bridge performs is frame filtering. If both the source and destination are on the same segment, it does not forward the frame to the other segment. A frame is forwarded to the other segment, if it is destined to that segment.
Question # 21
Explain NIC and Computer Processing?
Answer
NIC AND CPU PRCESSING:
NIC contains sufficient hardware to process data independent of system CPU. In which some NICs contain separate microprocessor. In addition to this it also include analog circuitry interface to system bus, buffering and processing
Question # 22
What is Parity Checking? Explain
Answer
Parity checking
To detect the error there are different schemes for which parity checking is also common used, in parity checking, parity refers to the number of bits set to 1 in the data item. A parity bit is an extra bit transmitted with data item chose to give the resulting bit even or odd parity.
Question # 23
What do you know about Djikstra’s algorithm?
Answer:
Djikstra’s algorithm
Djikstra’s algorithm can accommodate weights on edges in graph. The shortest path is then the path with lowest total weight.
Question # 24
What are the uses of Repeater?
Answer
Repeater is a networking device
A repeater is used to increase the signal strength. It amplifies the weakening signal received from one segment and then retransmits onto another segment.
                               WWW.VUSUPERIOR.NET

             
                       Wish u Best of Luck

           Remember me in your prayers

1 comments: