Docstoc

Q1_ Select the BEST answer and write it in the space

Document Sample
Q1_ Select the BEST answer and write it in the space Powered By Docstoc
					                    Birla Institute of Technology & Science, Pilani
                                         First Semester 2007-2008
                                      Comprehensive Examination
Course No.       :EA C451/MBA C451
Course Title     :INTERNETWORKING TECHNOLOGIES
Duration         :1.5 Hrs          Weightage :35 marks                    Date:07/12/2007
                                                                                       Maximum Marks: 100
                   Note: Question paper is divided into 2 parts, i.e. part 1 (1.5 hours) and part 2(1.5 hours)
Q1) Select the BEST answer and write it in the space provided at the end of Part 1.        [32 Marks]

1. Communicating data without jittering is critical in          9. The first layer to carry out error and flow control in
     case of ---------- data.                                       the OSI model is --------
a) text files           b) Multimedia  c) numerical             a) Physical     b) Data-Link c) Network
d) all of the above e) none of the above                        d) Transport    e) session        f) Application

2. A network communicated message can be in the                 10. A transport connectionless protocol(s) used in the
     form of ----------.                                            TCP/IP stack is (are)---------.
a) text           b) pictures c) audio                          a) TCP          b) IP c) UDP            d) a and c
d) video          e) numbers  f) all of the above               e) ARP          f) none of the above

3. In Full duplex mode, data flow-----------.                   11. To send another station a message, the main thing
a) source-to-destination b) destination-to-source                   a user has to know is _____.
c) a or b                 d) a and b one at a time                 a) how the network works
e) a and b, at the same time f) none of the above                  b) the other station’s address
                                                                   c) whether the network is packet-switched or
4. A connection that is dedicated between two and                                circuit-switched
    only two devices is called --------- connection.               d) whether this is a voice or data network
a) multipoint   b) point-to-point          c) a and b
d) two nodes    e) star           f) none of the above          12. Voice communication traditionally used _____.
                                                                   a) circuit switching
5. The Internet is considered as a ---------- type                 b) packet switching
    network.                                                       c) both a and b
a) MAN                  b) LAN            c) WAN                   d) neither a nor b
d) all of the above     e) a and c        f) b and c
                                                                13. Multiplexing lowers the cost of _____.
6. The most robust network topology is the -----------             a) switches
    topology.                                                      b) trunk lines
a) Mesh       b) Star          c) Bus                              c) both a and b
d) Ring       e) none of the above                                 d) neither a nor b

7. The ---------- layer is responsible for sharing the          14. A network connects several of a corporation’s
    subnet among all end users.                                     sites. It is a _____.
a) Physical     b) Data-Link c) Network                            a) LAN          b)WAN c)Either a LAN or WAN
d) Transport    e) a, b, and c f) Application
                                                                15. In _____, heavy application processing is done on
8. The first layer that distinguishes a WAN from a                  the server.
    LAN is -------------                                           a) file server program access
a) Physical     b) Data-Link c) Network                            b) client/server processing
d) Transport    e) session        f) Application                   c) both a and b               d)neither a nor b
16. Which of the following has a problem with             b)   privacy
    scalability?                                          c)   authentication
   a) file server program access                          d)   confidentiality
   b) client/server processing                            e)   access control
   c) terminal-host systems
   d) all of the above                                 25. In a PC network on a small LAN, devices called
   e) none of the above                                    _____ connect the stations.
                                                          a) hubs
17. On the Internet, subnets are connected by _____.      b) switches
   a) other subnets                                       c) both a and b
   b) switches
   c) routers                                          26. Standards govern _____.
   d) ISPs                                                a) message structure
                                                          b) message timing
18. On the Internet, messages are called _____.           c) both a and b
   a) packets
   b) frames                                           27. I am trying to reach a webserver, www.abcd.com.
   c) both a and b                                         A DNS response message tells me _____.
   d) neither a nor b                                     a) the host name of www.abcd.com
                                                          b) the IP address of www.abcd.com
19. 128.171.17.13 is a(an) _____.                         c) the host name of my computer
   a) IP address                                          d) the IP address of my computer
   b) host name                                           e) both a and b
   c) both a and b
   d) neither a nor b                                  28. On a router, an interface is a connection_____.
                                                          a) between the internet and data link layer
20. When you are using the Internet, your home PC         b) between the transport and internet layers
    MUST HAVE a(n) _____.                                 c) between the transport and application layers
   a) IP address       b)host name                        d) between the physical and internet layer
   c) both a and b     d)neither a nor b                  e) port

21. In the TCP/IP-OSI architecture, standards at the   29. On a router, the interface that receives a frame
    data link layer are governed by _____.                 _____.
   a) the IETF                                            a) encapsulates an IP packet
   b) ISO and ITU-T                                       b) de-encapsulates an IP packet
   c) both a and b                                        c) both a and b
   d) neither a nor b
                                                       30. I wish to download an HTML webpage containing
22. Another name for delay is _____.                       four graphics images. How many request–response
   a) congestion                                           cycles will be needed for the download?
   b) latency                                             a) 1          b)2    c)3      d)4    e)5
   c) wait
   d) priority                                         31. TCP is _____.
   e) quality of service                                  a) connection-oriented
                                                          b) reliable
23. Quality of Service measures _____.                    c) both a and b
   a) latency                                             d) neither a nor b
   b) reliability
   c) both a and b                                     32. Host A sends to Host B. There is an error in the
   d) neither a nor b                                      transmission. Which transport process decides to
                                                           retransmit the damaged TCP segment?
24. Proving your identity is an example of _____.         a) the transport process on Host A
   a) encryption                                          b) the transport process on Host B
                                                               c) transmits the IP packet to a router on a different
33. When a border router looks at an IP address, it                         subnet
    looks first at the _____.                                  d) transmits the IP packet to a router on a different
   a) whole destination IP address                                          network
   b) destination IP address network part
   c) destination IP address subnet part                    40. The destination IP address is 128.171.17.13. The
   d) destination IP address network and subnet parts           prefix is /8. Which of the following address parts
                  combined                                      in a router forwarding table entry would constitute
   e) destination IP address host part                          a match?
                                                                 a) 128       b)128.171       c)128.171.17
34. When an internal router that connects subnets                d) All of the above
    looks at an IP address, it looks first at the _____.
   a) whole destination IP address                          41. In a router forwarding table comparison, there is a
   b) destination IP address network part                       match to 128 and 128.171. Which entry will guide
   c) destination IP address subnet part                        the router forwarding table entry?
   d) destination IP address network and subnet parts          a) 128        b)128.171       c)It depends on the
                 combined                                                    metric
   e) destination IP address host part
                                                            42. The next-hop router field entry says “local.” If this
35. The subnet mask tells you the size of the _____.            entry is the selected match, the router will _____.
   a) whole IP address                                         a) send the IP packet to the local next-hop router
   b) IP address network part                                  b) send the IP packet directly to the destination
   c) IP address subnet part                                                  host
   d) IP address network and subnet parts combined
                                                            43. How do routers get information for its router
36. In 128.171.17.13/24, the 24 tells you the size of the       forwarding table?
    _____.                                                     a) dynamic routing protocols
   a) whole IP address                                         b) by observing the IP addresses of incoming
   b) IP address network part                                               packets
   c) IP address subnet part                                   c) from a master Internet router
   d) IP address network and subnet parts combined             d) DHCP
                                                               e) source hosts
37. If the destination host IP address is on the source
    host’s subnet, the source host _____.                   44. In IP version 6, how many bits long are addresses?
   a) transmits the IP packet directly to the destination      a) 4         b)32 c)48
                 address                                       b) d)128     e)none of the above
   b) transmits the IP packet to a router on the source
                 host’s subnet                              45. PPP processes on your home PC and the ISP’s first
   c) transmits the IP packet to a router on a different        router negotiate with one another before they begin
                 subnet                                         exchanging data.
   d) transmits the IP packet to a router on a different       a) True      b)False
                 network
                                                            46. In PPP, supervisory information is carried in the
38. A router usually has multiple IP addresses.                 _____ field.
   a) True                                                     a) Flag              b)information c)protocol
   b) False                                                    d)Negotiation        e)address

39. What does a border router do if the destination         47. For voice communication, it is common to use?
    address is not on the router’s network?                    a) TCP       b)UDP
   a) transmits the IP packet directly to the destination
                address                                     48. What are IP packets officially called in the
   b) transmits the IP packet to a router on the source         standard?
                host’s subnet                                  a) Frames            b) datagrams c)packets
   d) Segments           e) fragments                     58. Which of the following sends its messages to hosts
                                                              as well as to routers?
49. Who assigns the subnet part in IP addresses?             a) RIP                 b)BGP
   a) the subnet organization                                c) both a and b        d)neither a nor b
   b) IP address registrar
   c) the network organization                            59. The speed of a B channel in ISDN is _____.
   d) individual users                                       a) 16 kbps          b) 64 kbps      c)128 kbps
                                                             d) 144 kbps         e)it depends
50. Who assigns the host part in IP addresses?
   a) the subnet organization                             60. What is the maximum ISDN transmission speed
   b) IP address registrar                                    with bonding?
   c) the network organization                               a) 16 kbps         b) 64 kbps    c)128 kbps
   d) individual users                                       d) 144 kbps        e)it depends

51. A subnet part is 8 bits long. How many subnets can    61. Which of the following is true?
    it represent?                                            a) every DSL is an ADSL
   a) 1 b)7      c) 8    c) 254 d) 256                       b) every ADSL is a DSL
                                                             c) both a and b
52. A signal gets weaker as it propagates. This is           d) neither a nor b
    _____.
   a) interference     b)noise c)attenuation              62. What do you have to add to a Windows PC to
   d) distortion       e)terminal interference                make it a client PC?
                                                             a) nothing
53. Which transmission medium is used most                   b) a NIC
    frequently from desktop computers to the first hub       c) a server operating system
    or switch?                                               d) Both b and c
    a) UTP       b)optical fiber c)coaxial cable
    d) radio                                              63. In deciding how many servers to use to implement
                                                              a PC network’s services, security is one of the four
54. The term “broadband” is used to indicate ______.          factors to take into account.
   a) the use of radio channels with wide bandwidth          a) True
   b) the use of a fast transmission line                    b) False
   c) both a and b
   d) neither a nor b                                     64. For a small PC network with two or three client
                                                              PCs, the main advantage of peer-peer networking
55. If you wish to know that a source host is active,         is _____.
    you would send it a(n) _____.                            a) reduced cost
   a) IP echo request message                                b) better security
   b) ICMP echo request message                              c) the use of dedicated servers
   c) TCP echo request message                               d) All of the above
   d) none of the above
                                                          Q2 Why did the early Internet designers separate
56. Which of the following is an interior routing         IP and TCP into two different protocols?    [3]
    protocol?
   a) RIP              b)BGP
   c) both a and b     d) neither a nor b

57. Which of the following is a distance vector routing
    protocol?
   a) RIP              b)BGP
   c) both a and b     d)neither a nor b
         Part-2                                 Weightage: 65 Marks                    Time: 1.5 Hrs

Q1 Consider the KDC and CA servers. Suppose a KDC fails and goes down. What is the impact on the
ability to parties to communicate securely; that is, who can and cannot communicate? Justify your answer.
Suppose now that a CA fails and goes down. What is the impact of this failure instead?
                                                                                 [10 marks]
Q2. Name and describe the two design approaches discussed in class for Internetworking. Also explain the
typical bottle necks?                                                            [10 marks]


Q3 How distributed security is different from the centralized security? What are the basic security design
rules for Internetworking?                                                         [10 marks]

Q4 Name and elaborate the main Tests for Sniffer Detection?                          [15 marks]

Q5 Perhaps the greatest advantage of the development of IT infrastructure is that it enables integration of
applications across enterprise boundaries, providing fast and seamless collaboration with partners,
customers, and suppliers.
Consider a tour operators agency which designs and offers customizable vacation tours, having its
agents/operators sitting at various locations. The tours will contain all the information related to destinations,
hotels to stay at, flights to take, etc. As tours are customizable, customers have some level of flexibility in
choosing the details of a trip; for example, a vacation tour may offer a choice between different hotels or car
rental companies.
How can a tour operator manage the booking of a tour? How does the tour operator make sure that all hotel
bookings required for a particular vacation tour are available? How does the tour operator confirm the
availability of a chauffeur-driven limousine on a particular date in a particular city?
Surely all this requires communication with partner businesses across the boundaries of the enterprise,
whether manually or by computer. The tour operator will get the required confirmations with hotels and car
rentals before confirming the package booking to the tourist. Managing all this manually is not a cost-
effective and efficient solution. Customers will have long waits for tour confirmations. Please provide a
technological solution with valid assumptions.                                        [20 marks]

				
DOCUMENT INFO