367 Final Fall 2013 Answers
367 Final Fall 2013 Answers
367 Final Fall 2013 Answers
FINAL EXAMINATION
COMPUTER NETWORKS : 03-60-367-01
UNIVERSITY OF WINDSOR
SCHOOL OF COMPUTER SCIENCE
Fall 2013 - 2 Hours
This examination document contains all questions for the examination. Each student must surrender
only their answer sheets. Each student may take this examination question paper for future reference.
Although you may write on this document, it will not be graded if it is submitted. There is no need to
place your name on this document.
Good Luck!
All questions are either Multiple Choice or True-False. For each Multiple Choice question, you are to
choose only one response which best answers the question. For True-False questions you may only
choose one option (True or False). There may be up to five (5) response options for some questions.
Place all answers on the Scantron sheet provided. The examination will be marked using the campus
computer.
If an error is made you must carefully and completely erase your mistake and then indicate your choice
of answer. Completely and carefully fill the circle that indicates your answer to each question. Make
sure you have selected the correct question number on the Scantron sheet corresponding to the question
on the examination question paper.
WARNING !
Read and think carefully about each question before answering.
Questions have been scrambled by topic. Keep your attention on your own test
paper and answer sheet.
Page 2 of 18
4 The data link layer takes the packets from the _____ layer and encapsulates them into
frames for transmission.
A) network
B) physical
C) transport
D) application
5. Which one of the following tasks is not done by data link layer?.
A) framing
B) error control
C) flow control
D) channel coding
6. Which sublayer of the data link layer performs data link functions that depend upon the
type of medium?.
A) logical link control
B) media access control
C) network interface control
D) None of the responses above is correct.
7. The main goal of Bellman-Fords algorithm is to ensure that all network nodes have the
same information to provide shortest path service for message routing.
A) True
B) False
Page 3 of 18
12. The purpose of a network interface card is to implement the link and physical layer
interface.
A) True
B) False
13. ICMP (Internet Control Message Protocol) messages are carried in IP datagrams.
A) True
B) False
15. Amplitude modulation refers to rapid variations of signal strength to indicate bits or
other tokens.
A) True
B) False
Page 4 of 18
16. In order to establish a virtual connection (also called a virtual circuit) that permits
datagrams to flow between communicating end hosts, it is necessary to ___________ .
A) involve both the end hosts and all intervening routers
B) initiate the connection using specialized datagrams that carry historical information
about the end-end route
C) complete the connection using receiver and sender acknowledgements
D) All of these responses are correct.
18. Which one of the following is the multiple access protocol for channel access control?.
A) CSMA/CD
B) CSMA/CA
C) CSMA/CB
D) Both A and B responses are correct.
E) All of A, B and C responses are correct.
19. At the network layer, a spanning tree is used to ensure that no redundant packets are
received by any node.
A) True
B) False
21. Frequency Division Multiplexing (FDM) divides time into time frames and further
divides each time frame into time slots.
A) True
B) False
22. TCP abstracts data communication to appear as an apparent stream of flowing data.
A) True
B) False
Page 5 of 18
23. The protocol that requires a master node to grant access to each node in a collision
domain, in a round-robin fashion is called a _______________ .
A) token-passing protocol
B) polling protocol
C) random access protocol
D) None of the responses above is correct.
27. Network services and protocols provide logical communication between hosts.
A) True
B) False
30. Both MAC addresses and IP addresses are usually written in dotted-decimal notation.
A) True
B) False
33. A large-scale data center employs a hierarchy of routers and switched.At the top of the
hierarchy are the Top of Rack (TOR) switches.
A) True
B) False
37. Which is the following is not true about a load balancer, in a data center?
A) It distributes requests to the hosts.
B) Each one is devoted to a specific cloud application.
C) It makes decisions based on the destination port and the destination address in the
packet.
D) It relays the response from the hosts back to the external client.
E) None of the responses above is correct.
40. Transport services and protocols provide logical communication between hosts.
A) True
B) False
44. When 2 or more bits in a data unit have been changed during the transmission, the error
is called _______________ .
A) random error
B) burst error
C) inverted error
D) None of the responses above is correct.
45. Given the CRC coding bits 101110001 and generator 1001, is an error detected?
A) Yes, there is an error.
B) No, there is no error.
46. Which one of the following does not use channel partitioning?
A) TDM
B) FDM
C) CSMA
D) None of the responses above is correct.
49. Which of the following router topologies has the highest reliability?
A) Bus
B) Star
C) Ring
D) Mesh
50. In Ethernet networks, the Preamble pattern is used to synchronize receiver and sender
clock rates.
A) True
B) False
Page 9 of 18
52. The property that a network should operate efficiently when deployed on a small-scale
as well as on a large-scale is called _________ .
A) Migration
B) Determinism
C) Scalability
D) Autoconfigurability
53. Internet Control Message Protocol (ICMP) is used by hosts and routers to communicate
network-level information.
A) True
B) False
54. Multiple TCP streams can distinguished on a given machine using __________ .
A) Ports
B) IP addresses
C) network interface cards
D) All of the above responses are correct.
55. Assume that four (4) datagrams are received in sequence and are then checked for parity
errors. The first datagram bit string contains the 7-bit pattern 1011010, followed by
the second datagram pattern 0000111, third datagram pattern 1111110, and fourth
datagram pattern 0110011. Each of the bit patterns consists of a leading (leftmost) 6-
bit pattern that is the data payload followed by the rightmost parity bit (parity is defined
as 0/1 if the number of 1-bits in the data payload is even/odd). The fourth datagram
pattern bits are the parity values of the first three datagram bits in the corresponding
positions (taken as a column). The error checking scheme is the two-dimensional parity
bit check. Which of the following statements is most correct?
A) There is certainly an error in the first datagram
B) There is certainly an error in the second datagram
C) There is certainly an error in the third datagram
D) There is no apparent error, but it is impossible to be fully certain about the data
correctness in this case
56. In Ethernet networks, the Preamble pattern is used to synchronize receiver and sender
clock rates. NOTE: This is a duplicate of Q50. Students were not to answer this.
A) True
B) False
Page 10 of 18
58. When the link cost increases suddenly between two routers in a network, poisoned
reverse is used to _____________ .
A) accelerate the convergence to a stable routing table
B) replace all update link costs initially to infinity for all routes through the affected
routers
C) guarantee unique routing solutions in the final routing tables
D) Both A and B responses are correct.
59. The reasons for handling routing differently in Inter-AS and Intra-AS routing are based
on ____________ .
A) differences in router capabilities
B) distance vector versus link state information
C) policy, scale and performance
D) imposed standards for packaging messages
60. In Ethernet networks, the Preamble consists of 7 bytes with pattern 10101010 followed
by one byte with pattern _____________ .
A) 11101010
B) 01010101
C) 10101011
D) None of the above responses are correct.
62. One role of a NIC is to accept a datagram from the next higher layer and encapsulate the
datagram into a frame, along with frame header and trailer bit fields, such as rdt and
CRC.
A) True
B) False
Page 11 of 18
64. Consider a packet of length 1024 bytes. Assuming the packet must travel over a link of
distance 2500 kilometers with propagation speed 2.5 x 108 m/s and transmission rate 2
Mbps, what is the propagation delay?
A) 1 msec
B) 10 msec
C) 21 msec
D) 100 microsec
65. Which layer has the responsibility of transferring datagrams from one node to adjacent
node(s) over a link?
A) Application layer
B) Transport layer
C) Link layer
D) Network layer
66. Which layer has the responsibility of moving individual bits from one node to adjacent
node(s) over a link?
A) Physical layer
B) Transport layer
C) Link layer
D) Network layer
67. A subnet may be defined as any interconnected set of computers and routers (or
switches) that can operate in isolation from other subnets, or in cooperation with other
subnets.
A) True
B) False
68. With half duplex at the link layer, nodes at both ends of the link can transmit at the same
time.
A) True
B) False
71. RIP advertisements typically announce the number of hops to various destinations.
BGP updates, on the other hand, announce the ___________ to the various destinations.
A) link costs
B) adjacent link nodes
C) Im alive message
D) previous link path table
72. Consider sending a 5000 byte datagram into a link that has a maximum transfer size
(MTU) of 1000 bytes. How many fragments are generated?
A) 8
B) 7
C) 6
D) 5
74. Among the unethical or illegal acts that bad guys can do to messages travelling on a
computer network is (are) included __________ .
A) eavesdropping, actively inserting messages into connection
B) impersonation
C) hijacking, denial of service
D) All of these responses are correct.
75. Assume that three routers, U, V and W, have link costs: c(U,V) = 4, c(U,W) = 6 and
c(V,W) = 1. Using the Bellman-Ford algorithm, the common routing table for all
routers is:
U V W
U 0 4 5
V 4 0 1
W 5 1 0.
A) True
B) False
Page 13 of 18
77. The main idea for the use of Multiprotocol Label Switching (MPLS) is to __________ .
A) improve the forwarding speed of IP routers
B) forward datagrams based on fixed-length labels
C) use Virtual Circuits (VC) techniques
D) abandon the destination-based IP datagram forwarding infrastructure
E) All of the responses above are correct.
78. Most local area networks (LANs) use electrostatic network hardware.
A) True
B) False
79. The routing methods that compute the least-cost path between source and destination
using complete, global knowledge about the network are called _____________ .
A) link-state
B) distance-vector
C) OSPF
D) All of the responses above are correct.
80. In this class of IP address, each subnet can accommodate up to 254 hosts.
A) A
B) B
C) C
D) D
81. The motivation(s) for utilizing Network Address Translation include(s) ___________ .
A) making available a range of unique IP addresses for all devices in every subnet
B) ability to change addresses of devices in local network without notifying outside
world
C) ability to change ISP without changing addresses of devices in global network
D) establishing direct addressability to local devices inside subnet
82. Network Address Translation is used because it expands the available device address
space through use of port numbers and thereby satisfies the end-end argument at the
network layer.
A) True
B) False
Page 14 of 18
83. In order to deal with the situation where, too many sources send too much data too fast
for a network to handle, it is necessary to use a technique called ______________ .
A) Flow control
B) Congestion control
C) Routing control
D) Dynamic packet management
85. Which of the following responses is not a desirable property of secure communication?
A) Confidentiality
B) Operational security
C) End-point authorization
D) Message integrity
89. As used in computer science and engineering networking, the term MAC refers to
___________ .
A) Message authentication code
B) Medium Access Control
C) the first three characters of MACchine
D) Both A and B are correct responses.
92. Which of the following options hides the details of a home network from the rest of the
Internet?
A) ARP
B) DHCP
C) ICMP
D) NAT
93. If a router malfunctions, the link state algorithm is affected because __________ .
A) a node can advertise incorrect path cost
B) each node recomputes its table and forwards it to other nodes
C) errors are contained locally within the network
D) a node can advertise incorrect link cost
94. Assume that a University of Windsor student has booted their laptop computer while
waiting for a flight in Vancouver, but have not yet connected wirelessly to a wireless
server in the airport. Their intention is to connect to the Computer Science website in
Windsor. How many network transactions would be required to obtain a network
connection and eventually establish the return of the Computer Science webpage?
A) Fewer than 10
B) More than 10, but less than 20
C) More than 20, but less than 30
D) More than 30
Page 16 of 18
96. If Bob and Alice are two peers and each is located behind a Network Address
Translation (NAT) server across a wide-area network (WAN) then, in the absence of
application-specific NAT configuration, ___________ .
A) they can establish a reliable UDP connection
B) they cannot establish a SMTP connection
C) they can establish a TCP connection
D) they cannot establish a TCP connection
98. Standard bus type Ethernet links are managed so that collisions are avoided.
A) True
B) False
102. In ring networks, using the taking turns MAC protocol, a ___________ is passed
from one node to the next node sequentially.
A) link allocation schedule
B) control token
C) network synchronization signal
D) network ready polling signal
103. Virtual local area networks (VLANs) address the drawback of ___________ in
institutional LANs.
A) lack of traffic isolation
B) MAC address management
C) inefficient use of switches
D) Both A and C are correct responses.
105. Both UDP and TCP require that the applications recognize their own data formats.
A) True
B) False
108. Consider a datagram network using 8-bit host addresses. Suppose a router uses longest
prefix matching to determine whether message traffic is to be routed through one of
only four forwarding ports. The range of addresses to be routed through Port 2 is
___________ .
A) 00000000 through 00111111
B) 00000000 through 11111100
C) 10000000 through 10111111
D) 01000000 through 10000000
109. Random access protocols in shared bus networks use ______ to provide listen before
speaking and stop talking if someone else already is talking rules.
A) CSMA
B) SMDP
C) ALOHA
D) Slotted ALOHA
Use the following Table for Questions 110 and 111. The table contains the link costs (in arbitrary units)
between routers S, T, U, V, W, X, Y and Z. A dash (hyphen) entry indicates that there is no connection
between these pairs of routers.
S T U V W X Y Z
S 0 1 4 - - - - -
T 1 0 2 4 - - 7 5
U 4 2 0 3 3 - - -
V - 4 3 0 4 3 1 -
W - - 3 4 0 6 - -
X - - - 3 6 0 6 -
Y - 7 - 1 - 6 0 12
Z - 5 - - - - 12 0
110. Based on the pairwise link costs in the Table above, and using Dijkstras algorithm,
determine the shortest path route from X to Z.
A) Infinity
B) 12
C) 16
D) 18
111. Based on the pairwise link costs in the Table above, and using Dijkstras algorithm,
determine the shortest path route from X to S.
A) Infinity
B) 10
C) 8
D) 9
END OF EXAMINATION