Professional Documents
Culture Documents
A9 R3
A9 R3
A9 R3
January 2006
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE-40; PART TWO – 60)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “tear-off” answer sheet attached to the question paper, following
instructions therein. (1 x 10)
1.1 Which of the following are the smallest and largest possible values of an IP octet?
A) 0 and 512
B) 255 and 512
C) 0 and 256
D) 0 and 255
1.2 The parameter Bit Error Rate (BER) plays more important role as compared to delay while
transmitting.
A) Data
B) Audio
C) Video
D) Compressed Video
1.4 In which of the following shape light pulses should be transmitted in order to cancel out
nearly all the dispersion effects.
A) Cosine
B) Triangular
C) Hyperbolic Cosine
D) Reciprocal of Hyperbolic Cosine
1.8 Baud is
A) Number of bits per second
B) Number of signal changes per second
C) Number of bytes per second
D) Number of characters per second
1.10 In which ARQ, when a NAK is received, all frames sent since the last frame acknowledge are
retransmitted
A) Stop-and-Wait
B) Go back n
C) Selective Reject
D) Both A and B
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and
ENTER in the “tear-off” sheet attached to the question paper, following instructions
therein. (1 x 10)
3. Match words and phrases in column X with the closest related meaning/
word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)
X Y
3.1 Connection Oriented WAN Technology A. Telnet
3.2 Circuit Switched B Channels and Packet B. HDLC
Switched D Channel
3.3 RF based physical layer C. CBR
3.4 Remote Login Protocol D. HTTP
3.5 Connectionless protocol E. Frame Relay
3.6 World Wide Web F. TCP
3.7 Real Time Service G. ISDN
3.8 Optical Transmission Systems H. UDP
3.9 Number of hexadecimal digits in Ethernet I. 8
address
3.10 Data Link layer J. ATM
K. ABR
L. FHSS
M. 12
N. WDM
4. Each statement below has blank space to fit one of the word(s) or phrases in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)
4.2 _________ is the network technology that can be used in both LAN and WAN.
4.3 The main characteristics of _________ are link-by-link flow control, sequence numbering and
error checking.
4.4 In order to ensure that collisions can be detected by all nodes on the Ethernet network, the
lower bound on Ethernet packet length is _________.
4.5 In order to share the transmission media wireless LANs use the _________ scheme.
4.6 _________ is the analog signaling technique used in ADSL and is a combination of
amplitude and phase modulation.
4.8 A(n) _________ takes place when one entity pretends to be different entity.
4.10 Routing protocols based on _________ does not exchange their routing tables periodically.
PART TWO
(Answer any FOUR questions)
5.
a) Write in brief the features of the following transmission media:
i) Coaxial Cable
ii) Fiber Optic Cable
b) Find out the capacity of a telephone line that transmits frequencies from 300 Hz and 3400 Hz
with a signal to noise ratio of 35dB.
c) What is pulse code modulation? What is the equivalent bit rate of a PCM channel having
bandwidth of 4 KHz?
(8+3+4)
6.
a) What is the difference between: -
i) datagram subnet and virtual-circuit subnet.
ii) circuit switching and packet switching.
b) What advantages does TCP have over UDP? What are the features, which make TCP a
reliable protocol?
c) Explain the function of: Repeater, Bridge and Gateways.
(8+[2+2]+3)
7.
a) Explain the operation of CRC error detection method. By means of an example show how:
i) The error detection bits are generated
ii) The received frame is checked for transmission errors
Use the generator polynomial x5 + x4 + x2 + x + 1
b) What is static routing? How does it differ from dynamic routing?
c) Discuss the problem of count to infinity associated with distance vector routing technique.
(8+4+3)
8.
a) What are the reasons for congestion in a network? Describe any one method for congestion
control.
b) Could HDLC be used as a data link protocol for a LAN? Explain your answer.
c) Describe the advantages of a small cell size in ATM.
(7+4+4)
July 2003
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE-40; PART TWO – 60)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “tear-off” answer sheet attached to the question paper, following
instructions therein. (1 x 10)
1.1 Learning about the neighbours through special HELLO packets is the first step in
A) distance vector routing
B) local area routing
C) link state routing
D) none of the above
3. Match words and phrases in column X with the closest related meaning/
word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)
X Y
3.1 Cell switching A. IPv6
3.2 Coaxial cable B. UDP
3.3 Secure wireless multiplexing C. FTP
3.4 128 bit address space D. Cryptography
3.5 Converting plain text to cipher text and vice versa E. GSM
3.6 900/1800 MHz F. Cable TV
3.7 Downloading files G. 10 Hz
3.8 LAN architecture from IBM H. Star topology
3.9 2B+D I. ISDN
3.10 Transport layer of INTERNET J. Token Ring
K. FDM
L. CDMA
M. CODEC
N. MODEM
O. ATM
4. Each statement below has blank space to fit one of the word(s) or phrases in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)
5.
a) What is the difference between flow control and congestion control?
b) What is reflection? What happens to a beam of light as it travels to a less sense medium?
What happens if it travels to a denser medium?
c) How does ionospheric propagation work? Which types of users normally use this type of
propagation?
d) What is the difference between network layer delivery and transport layer delivery?
(2+[1+1+2]+4+5)
6.
a) Compare virtual circuit with datagram subnet?
b) How is one TDM signal separated into its original components? Consider both
implementations of TDM?
c) What procedure is used to prevent a stream of binary data from being misinterpreted as an
HDLC flag? Explain ht operation of this procedure?
(5+7+3)
7.
a) Compare fibre optic cable with UTP cable when used as transmission media in LANs.
b) Why is IP not exactly suitable for real time services?
c) Compare and contrast CSMA/CD and token-passing access methods.
d) What is a subnet mask and why is it necessary?
(3+3+4+[2+3])
8.
a) What are the different classes of addresses used in Ipv4? List their ranges in dotted decimal
notation.
b) What are the roles of repeaters, bridges, routers and gateways in achieving internetworking?
Identify the layers in which they operate.
c) Computing the checksum for the following data frame, find the complete transmitted frame
bit pattern:
data, D = 11001011011
generator polynomial, G(x) = x4 + x + 1
d)
([2+4]+[4+2+3)
NOTE:
1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and
PART TWO contains FOUR questions.
3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE-40; PART TWO – 60)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “tear-off” answer sheet attached to the question paper, following
instructions therein. (1 x 10)
1.5 The physical connection between an end point and a switch or between two switches is
A) Transmission path
B) Virtual path
C) Virtual circuit
D) None of the above
1.6 Which of the following is an application layer service?
A) Remote log-in
B) File transfer and access
C) Mail service
D) All of the above
1.8 In which type of switching do all the packets of a message follow the same channels of a
path?
A) Data gram packet switching
B) Virtual switching packet switching
C) Message switching
D) None of the above
2.1 In FDM the users take turns in a round robin, each one periodically getting the entire
bandwidth for a little burst of time.
2.2 The minimum bandwidth required for QAM transmission is the same as that required for ASK
and PSK transmission.
2.3 Fiber-optic cable is used in backbone networks, cable TV networks and fast Ethernet
networks.
2.4 A multipoint connection provides a dedicated link between two devices.
2.5 Routing is a function of data link layer.
2.6 Flow control is needed to prevent collision between sender and receiver.
2.7 HDLC is an actual protocol designed to support both half-duplex and full duplex
communication over point-to-point and multipoint links.
2.8 UDP and TCP are both network layer protocols.
2.9 An ARP request is broadcast to all devices on the network.
2.10 Routing and switching in frame relay are performed by the data link layer.
3. Match words and phrases in column X with the closest related meaning/
word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)
X Y
3.1 It is the function of network layer. A. MAC
3.2 It is the connectionless protocol in Transport layer. B. ARP
5.
a) What is the transmission rate on Ethernet LANs? For a given transmission rate, can each
user on the LAN continuously transmit at the rate?
b) What are some of the physical media that Ethernet can run over?
c) What advantage does a circuit-switched network have over a packet-switched network?
What advantages does TDM have over FDM in a circuit-switched network?
(5+5+5)
6.
a) List two ways in which the OSI reference model and the TCP/IP reference model are the
same. Now, list the two ways in which they differ.
b) What is the principle difference between connectionless communication and connection-
oriented communication?
c) Why would the token-ring protocol be inefficient if the LAN has a very large perimeter?
(6+6+3)
7.
a) What is the main difference between TCP and UDP?
b) Give an advantage and disadvantage of frame relay over a leased telephone line.
c) What are the two main functions of a datagram based network layer? What additional
functions does a VC-based network layer have?
(3+6+6)
8.
a) Compare and contrast link-state and distance-vector routing algorithms.
b) Each Internet host will have at least one local name serve and one authoritative name
server. What role does each of these servers have in DNS?
c) What is an important difference between a Symmetric key system and a Public key system?
(5+5+5)
NOTE:
1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and
PART TWO contains FOUR questions.
3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE-40; PART TWO – 60)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “tear-off” answer sheet attached to the question paper, following
instructions therein. (1 x 10)
1.1 Learning about the neighbours through special HELLO packets is the first step in
A) distance vector routing
B) local area routing
C) link state routing
D) none of the above
3. Match words and phrases in column X with the closest related meaning/
word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)
X Y
3.1 Cell switching A. IPv6
3.2 Coaxial cable B. UDP
3.3 Secure wireless multiplexing C. FTP
3.4 128 bit address space D. Cryptography
3.5 Converting plain text to cipher text and vice versa E. GSM
3.6 900/1800 MHz F. Cable TV
3.7 Downloading files G. 10 Hz
3.8 LAN architecture from IBM H. Star topology
3.9 2B+D I. ISDN
3.10 Transport layer of INTERNET J. Token Ring
K. FDM
L. CDMA
M. CODEC
N. MODEM
O. ATM
4. Each statement below has blank space to fit one of the word(s) or phrases in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)
5.
a) What is the difference between flow control and congestion control?
b) What is reflection? What happens to a beam of light as it travels to a less sense medium?
What happens if it travels to a denser medium?
c) How does ionospheric propagation work? Which types of users normally use this type of
propagation?
d) What is the difference between network layer delivery and transport layer delivery?
(2+[1+1+2]+4+5)
6.
a) Compare virtual circuit with datagram subnet?
b) How is one TDM signal separated into its original components? Consider both
implementations of TDM?
c) What procedure is used to prevent a stream of binary data from being misinterpreted as an
HDLC flag? Explain ht operation of this procedure?
(5+7+3)
7.
a) Compare fibre optic cable with UTP cable when used as transmission media in LANs.
b) Why is IP not exactly suitable for real time services?
c) Compare and contrast CSMA/CD and token-passing access methods.
d) What is a subnet mask and why is it necessary?
(3+3+4+[2+3])
8.
a) What are the different classes of addresses used in Ipv4? List their ranges in dotted decimal
notation.
b) What are the roles of repeaters, bridges, routers and gateways in achieving internetworking?
Identify the layers in which they operate.
c) Computing the checksum for the following data frame, find the complete transmitted frame
bit pattern:
data, D = 11001011011
generator polynomial, G(x) = x4 + x + 1
d)
([2+4]+[4+2+3)
NOTE:
1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions
and PART TWO contains FOUR questions.
3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates who complete PART ONE earlier than one hour, can collect
the answer book for PART TWO immediately after handing over the answer sheet
for PART ONE.
TOTAL TIME: 3 HOURS TOTAL
MARKS: 100
(PART ONE-40; PART
TWO – 60)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the
question paper, following instructions therein.
(1 x 10)
1.8 In which type of switching do all the packets of a message follow the same channels
of a path?
A) Data gram packet switching
B) Virtual switching packet switching
C) Message switching
D) None of the above
2.1 In FDM the users take turns in a round robin, each one periodically getting the entire
bandwidth for a little burst of time.
2.2 The minimum bandwidth required for QAM transmission is the same as that required
for ASK and PSK transmission.
2.3 Fiber-optic cable is used in backbone networks, cable TV networks and fast Ethernet
networks.
2.4 A multipoint connection provides a dedicated link between two devices.
2.5 Routing is a function of data link layer.
2.6 Flow control is needed to prevent collision between sender and receiver.
2.7 HDLC is an actual protocol designed to support both half-duplex and full duplex
communication over point-to-point and multipoint links.
2.8 UDP and TCP are both network layer protocols.
2.9 An ARP request is broadcast to all devices on the network.
2.10 Routing and switching in frame relay are performed by the data link layer.
3. Match words and phrases in column X with the closest related meaning/
word(s)/phrases in column Y. Enter your selection in the “tear-off” answer
sheet attached to the question paper, following instructions therein.
(1 x 10)
X Y
3.1 It is the function of network layer. A. MAC
3.2 It is the connectionless protocol in Transport layer. B. ARP
4. Each statement below has blank space to fit one of the word(s) or phrases in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein.
(1 x 10)
PART TWO
(Answer Any Four questions)
5.
a) What is the transmission rate on Ethernet LANs? For a given transmission rate, can
each user on the LAN continuously transmit at the rate?
b) What are some of the physical media that Ethernet can run over?
c) What advantage does a circuit-switched network have over a packet-switched
network? What advantages does TDM have over FDM in a circuit-switched network?
(5+5+5)
6.
a) List two ways in which the OSI reference model and the TCP/IP reference model are
the same. Now, list the two ways in which they differ.
b) What is the principle difference between connectionless communication and
connection-oriented communication?
c) Why would the token-ring protocol be inefficient if the LAN has a very large
perimeter?
(6+6+3)
7.
a) What is the main difference between TCP and UDP?
b) Give an advantage and disadvantage of frame relay over a leased telephone line.
c) What are the two main functions of a datagram based network layer? What additional
functions does a VC-based network layer have?
(3+6+6)
8.
a) Compare and contrast link-state and distance-vector routing algorithms.
b) Each Internet host will have at least one local name serve and one authoritative
name server. What role does each of these servers have in DNS?
c) What is an important difference between a Symmetric key system and a Public key
system?
(5+5+5)