Professional Documents
Culture Documents
YOU MUST BRING SCANTRON sheets for the multiple choices (4.5” x 11”)
(also available in the Book Store)
c. What are the two popular approaches of packet switching? Discuss with examples and figures.
d. Define the terms: SVC, PVC, Blocking, Message Switching.
e. Complete the following table to compare a circuit switched network with a packet-switched network.
Issue Circuit-Switched Packet-Switched
Dedicated Path
Store and Forward
Need for connection Establishment
Routing Table
Delay
g. Complete the following table to compare a Datagram approach to a virtual circuit approach of a packet-
switching network.
Issue Datagram Virtual Circuit
All packets follow the same route
Table look up
Connection Establishment
Packet may arrive out of order
1
2. Show the output of the ATM multiplexer in the following figure.
Net2 6 A
Net3 3 A
Net4 4 E
Net6 1 B
Net7 2 D
6. a. If a bridge sends data from a Token Ring network to an Ethernet network how is a collision handled by
the bridge?
b. what is router’s role in controlling the packet lifetime?
7. a. Find the subnetwork address for the following. Show the steps for your calculation.
IP address: 200.34.22.156 Mask: 255.255.255.224
b. What is the maximum number of subnets in the following site? Show how you calculated the number.
Site address: 217.14.8.0 Mask: 255.255.255.224
2
8. a. What you mean by encryption and decryption? Name some conventional methods of encryption and decryption with
examples of their functions. Name two encryption/decryption standards.
b. Define Authentication, digital signature.
c. Explain RSA Encryption. What are the steps for calculating Kp, Ks, and N? Given the two prime numbers p=19 and
q=23, find out N, Kp, and Ks.
c. What is compression and why is necessary? Explain with examples lossy and lossless compression.
G1 G2
R1
network
host2
R2
a. How many IP address the gateway G1, G2, and the router R1 should have?
G1: G2: R1:
b. Choose an appropriate address for network1?
c. Choose the appropriate addresses for gateway G1 (based on your previous answers).
d. Choose an appropriate addresses for host1 and host2.
host1: host2:
Net: Net:
Net: 3
Multiple Choices
Notes: Any script without a name will receive no points.
NAME: _______________ (EXAM: SECTION B)
Use Scantron to answer. It is necessary that you mark the correct answers on scantron page and also circle on
this paper.
2. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs?
a. 40 b. 50 c. 90 d.2000
7. The ATM layer accepts data in _______ byte segments from the AAL layer.
a. 44 b. 45 c. 47 d. 48
12. Which of the following uses the greatest number of layers in the OSI model?
a. bridge b. repeater c. router d. gateway
13. A bridge forwards or filters a packet by comparing the information in its address table to the packet’s
a. layer 2 source address b. source node’s physical address
c. layer 2 destination address d. layer 3 destination address
4
16. The shortest path in routing can refer to
a. the least expensive path b. the least distant path
c. the path with the smallest number of hops d. any or a combination of the above
17. Which routing algorithm requires more traffic between routers for setup and updating?
a. distance vector b. link state c. Dijkstra d. vector link
18. In distance vector routing, each router receives vectors from ______________
a. every router in the network b. every router less than two units away
c. a table stored by the software d. its neighbors only
19. If there are five routers and six networks in an internetwork using link state routing, how many routing tables are
there?
a. 1 b. 5 c. 6 d. 11
21. In a virtual connection identifier, the VCI is _______ bits in an UNI and _______ bits in an NNI.
a. 8; 16 b. 16; 8 c. 8; 8 d. 16; 16
22. The _______ of a TSI controls the order of delivery of slot values that are store RAM.
a. crossbar b. crosspoint c. control unit d.transceiver
23. If there are five routers and six networks in an internetwork, how many link state databases are there?
a. 1 b. 5 c. 6 d. 11
26. Which type of bridge builds and updates its tables from address information on packets?
a. simple b. transparent c. a and b d. none of the above
27. In _______, each packet of a message need not follow the same path from sender to receiver.
a. circuit switching b. message switching
c. the virtual approach to packet switching d. the datagram approach to packet switching
28. In _______, each packet of a message follows the same path from sender to receiver.
a. circuit switching b. message switching
c. the virtual approach to packet switching d. the datagram approach to packet switching
30. In which routing method do all the routers have a common database?
a. distance vector b. link state c. link vector d. none of the above
31. A packet traveling from one Token Ring network to another Token Ring network uses the services of a ________. (Each
network is an independent network.)
a. simple bridge b. repeater c. router d. transparent bridge
5
33. A class E address starts with the _________bit(s).
a. 0 b. 10 c. 1110 d. 1111
34. In decimal notation, the first byte of a class E address should be between____ and ______.
a. 0; 127 b. 192; 223 c. 224; 239 d. 240; 255
42. What is the address of the network to which the host 130.8.119.1 is connected (no subnetting)?
a. 130.8.119.0 b. 130.8.0.0 c. 130.0.0.0 d. none of the above
43. Using a host address 195.21.43.65 and the mask 255.255.255.192, the subnetwork address is ___________.
a. 195.21.43.0 b. 195.21.0.0. c. 195.21.43.64 d. none of the above
49. In decimal notation, the first byte of a class D address should be between____ and ______.
a. 0; 127 b. 128; 191 c. 224; 239 d. 240; 255
6
52. Which routing algorithm requires more traffic between routers for setup and updating?
a. distance vector b. link state c. Dijkstra d. vector link
53. In distance vector routing, each router receives vectors from ______________
a. every router in the network b. every router less than two units away
c. a table stored by the software d. its neighbors only
54. If there are five routers and six networks in an internetwork using link state routing. how many routing tables are there?
a. 1 b. 5 c. 6 d. 11
55. If there are five routers and six networks in an internetwork, how many link state databases are there?
a. 1 b. 5 c. 6 d. 11
57. What type of bridge must have its address table entered manually?
a. simple b.transparent c. multiport d. b and c
64.In which type of switching do all the datagrams of a message follow the same channels of a path?
a. circuit switching b. datagram packet switching
c. virtual circuit packet switching d. message switching
65. In a crossbar with 1000 crosspoints, how many statistically are in use at any time?
a. 100 b. 250 c. 500 d. 1000
66. The _______ of a TSI controls the order of delivery of slot values that are store RAM.
a. crossbar b. crosspoint c. control unit d. transceiver
67. In _______ circuit switching, delivery of data is delayed because data must stored and retrieved from RAM.
a. space-division b. time-division c. virtual d. packet
7
a. multistage switch b. crosspoint c. packet switch d. TSI
72. In a time-division switch, a _______ governs the destination of a packet stored in RAM.
a. TDM bus b. crosspoint c. crossbar d. control unit
76. Because ATM _______, which means that cells follow the same path, the cells do not usually arrive out of order.
a. is asynchronous b. is multiplexed c. is a network d. uses virtual circuit routing
77. Which layer in ATM protocol reformats the data received from other networks?
a. physical b. ATM c. application adaptation d. data adaptation
78. Which layer in ATM protocol has a 53-byte cell as an end product?
a. physical b. ATM c. application adaptation d. cell transformation
79. A ______ field on a UNI cell header is used for connection purposes.
a. VPI (virtual path identifier) b. VCI (virtual circuit identifier)
c. CLP (cell loss priority) d. GFC (generic flow constant)
80. A _______ field on a cell header in the ATM layer determines whether a cell can be dropped.
a. VPI (virtual path identifier) b. VCI (virtual circuit identifier)
c. CLP (cell loss priority) d. GFC (generic flow constant)
82. In an ATM network, all cells belonging to a single message follow the same _______ and remain in their original order
until they reach their destination.
a. transmission path b. virtual path c. virtual circuit d. none of the above
84. A __________ is the physical connection between an end point and a switch or between two switches.
a. transmission path b. virtual path c. virtual circuit d. none of the above
87. In a VP switch the _______ does not change while the _______ can change.
a. VPI, VCI b. VCI;VPI c. VP;VPC d. VPC;VP
88. In a _______ switch, both the VPI and the VCI can change.
a. VP b. VPC c. VPI d. VCI
8
89. The cell _______ is the difference between the CTD maximum and minimum.
a. loss ratio b. transfer delay c. delay variation d. error ratio
90. The cell ________ is the ratio of lost cells to cells sent.
a. loss ratio b. transfer delay c. delay variation d. error ratio
91. The ________ service class is particularly suitable for applications with bursty data.
a. CBR b. VBR c. ABR d. UBR
92. The __________ service class is suitable for customers who need real-time video transmission.
a. CBR b. VBR c. ABR d. UBR
95. If the SCR is 60,000, the PCR is 70,000, and the MCR is 55,000, what is the minimum number of cells that can be sent
per second?
a. 55,000 b. 60,000 c. 70,000 d. 5000
97. If the maximum CTD is 10 microseconds and the minimum CTD is 1 microsecond, the _______ is 9 microseconds.
a. CLR b. CTD c. CDV d. CER
98. _______ is software that allows an ATM switch to emulate a LAN switch.
a. LEC b. BUS c. BES d. LANE
99. The _______ server software allows multicasting and broadcasting on an ATM LAN.
a. LEC b. BUS c. BVD d. BES
103. A bridge has access to the ________ address of a station on the same network.
a. physical b. network c. service access point d. all of the above
104. What type of bridge must have its address table entered manually?
a. simple b. transparent c. multiport d. bandc
105. Which type of bridge builds and updates its tables from address information on packets?
a. simple b. transparent c. a and b d. none of the above
107. In which routing method do all the routers have a common database?
a. distance vector b. link state c. link vector d. none of the above
9
108. A packet traveling from one Token Ring network to another Token Ring network uses the services of a ________.
(Each network is an independent network.)
a. simple bridge b. repeater c. router d. transparent bridge
110. In the conventional method of encryption and decryption, which key is publicly known?
a. Ke only b. Kd only c. Ke and Kd d. none
111. In the public key method of encryption and decryption, which key is publicly known?
a. Ke only b. Kd only c. Ke and Kd d. none
112. In the public key method of encryption and decryption, only the receiver has possession of the ________
a.Ke b.Kd c. Ke and Kd d. none of the above
113. We use an encryption method in which both plaintext and ciphertext have the same number of As, Bs, Cs, and so on.
This is probably _______ substitution.
a. monoalphabetic b. polyalphabetic C. transpositional d. rotational
114. We use an encryption method in which the character Z always substitutes for the character G. This is probably
_______ substitution.
a. monoalphabetic b. polyalphabetic c. transpositional d. rotational
115. We use an encryption method in which the plaintext AAAAAA becomes the ciphertext BCDEFG. This is probably
_______ substitution.
a. monoalphabetic b. polyalphabetic c. transpositional d. DES
116. An encryption method used by the U.S. government for nonmilitary and nonclassifled use is ________
a. monoalphabetic substitution b. polyalphabetic substitution
c. transpositional substitution d. the data encryption standard
117. In _______ permutation, the number of outputs is greater than the number of inputs.
a. a straight b. a compressed c. an expanded d. a rotational
119. The success of the RSA encryption method lies in the difficulty of _______
a. finding Kp b. finding the prime factors of Kp
c. finding N d. finding the prime factors of N
120. Data are compressed using pointers to frequently used strings. This is ________
a. differential encoding b. Lempel-Ziv-Welch encoding c. Morse coding d. lossy coding
121. Data are compressed by sending just the differences between video frames. This is
a. differential encoding b. Lempel-Ziv-Welch encoding C. Morse coding d. lossy coding
122. A string of 100 Os is replaced by a marker, a 0, and the number 100. This is
a. run-length encoding b. Morse code
c. differential encoding d. Lempel-Ziv-Welch encoding
10