Study Groups By Subject code Wise (Click Below on your university link & Join Your Subject Group)

[ + VU Study Groups Subject Code Wise ]  [ + COMSATS Virtual Campus Study Groups Subject Code Wise ]

Looking For Something at vustudents.ning.com?Search Here

CS610 Mid Term Solved Papers

Download the below attached file please

CS610 Mid Term Solved Papers

 

________________________________________________________________________

MIDTERM  EXAMINATION

Fall 2008

CS610- Computer Network (Session - 2)

Ref No: 109816

Time: 60 min

Marks: 38

Student Info

 StudentID:

  M

 Center:

 

 ExamDate:

  12/4/2008 12:00:00 AM

 

For Teacher's Use Only

    Q No. 

1 

2

3

4

5

6

7

8

Total

Marks

 

 

 

 

 

 

 

 

 

Q No.

9

10

11

12

13

14

15

16

 

Marks

 

 

 

 

 

 

 

 

 

Q No.

17

18

19

20

21

 

 

 

 

Marks

 

 

 

 

 

 

 

 

 


 

Question No: 1    ( Marks: 1 )    - Please choose one

 ________ has a jitter zero

 

       ► None of the given

 

       ► Virtual Private Network

       ► Isochronous Network

       ► Asynchronous Network

   

Question No: 2    ( Marks: 1 )    - Please choose one

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .

►Connectionless service paradigm

►Connection oriented service paradigm

►Both Connectionless and Connection-oriented service paradigm

 

►None of the given

   

Question No: 3    ( Marks: 1 )    - Please choose one

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.

►21-bit

►22-bit

►23-bit

►24-bit

   

Question No: 4    ( Marks: 1 )    - Please choose one

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________

►Hierarchal address

►Default route

►Shortest path

►None of the given

 

   

Question No: 5    ( Marks: 1 )    - Please choose one

The next hop to which a packet is sent depends only on

►Packet’s destination

►Packet’s original source

►Path the packet has taken

►Non of the given

   

Question No: 6    ( Marks: 1 )    - Please choose one

An interface for twisted pair Ethernet must have an ____________  connector , and must generate signals according to the_____________ specification.

►RJ-45, 10 Base T

►RJ-45, 10 Base 5

►BNC, 10 Base 2

 

►BNC, 10 Base T

   

Question No: 7    ( Marks: 1 )    - Please choose one

When an application--------------- data, it makes a copy of the data available to all other computers on the network.

 

►Broadcasting

►Multicasting

►Unicasting

►None of the given

   

Question No: 8    ( Marks: 1 )    - Please choose one

A ----------  provide a mechanism that a customer can use to set a physical  address.

 

►Static addressing scheme

►Configurable addressing scheme

►Dynamic addressing scheme

 

►None of the given

   

Question No: 9    ( Marks: 1 )    - Please choose one

FDDI can transmits data at a rate of -----100 million bits per second -----

 

►100 million bits per second

►100 million bits per second

►100 million bits per second

►None of the given

   

Question No: 10    ( Marks: 1 )    - Please choose one

Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.

 

►CSMA/CD

►CSMA/CA

►TOKEN PASSING

 

►None of the given

   

Question No: 11    ( Marks: 1 )    - Please choose one

-------------- have advantages arisen from the size and ease of computation.

►CRC

►Parity

►Checksums

 

►None of given

   

Question No: 12    ( Marks: 1 )    - Please choose one

The term -------- is used to denote the definition of a packet used with a specific type of network.

 

►Packet

 

►Frame

 

►Data

 

►None of the given

   

Question No: 13    ( Marks: 1 )    - Please choose one

------ has no way to determine the cause of the problem.

 

►Ping

►Trace route

►ICMP

►Non of the given

   

Question No: 14    ( Marks: 1 )    - Please choose one

------ Program sends a message to a remote computer and reports whether the computer responds.

►Ping

Ping

►Traceroute

►ICMP

►Non of the given

   

Question No: 15    ( Marks: 1 )    - Please choose one

In -------------, network occupies the smaller area like a room a floor or a building

 

►LAN

►WAN

►MAN

►None of the given

   

Question No: 16    ( Marks: 1 )    - Please choose one

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

►  False

►

   

Question No: 17    ( Marks: 2 )    Format is not clear even I try to do with cntl+A and then change format with 12/Times new roman or ariel.  But fail



   

Question No: 18    ( Marks: 2 ) ???? Format nt clear

 

   

Question No: 19    ( Marks: 3 ) ????? Format not Clear



   

Question No: 20    ( Marks: 5 )

Which type of information is obtained from network sniffer and in which mode Network sniffer operates?

 

Solution:

A network analyzer also called network monitor or a network sniffer is used to examine the performance of or debug a network. It can report statistics such as capacity utilization, distribution of frame size, collision rate or token circulation time

Most installations still use DIX Ethernet encoding in which there is no LLC/SNAP header in the frame. A network analyzer can tell from the values in the type field (small values are lengths, which mean an LLC/SNAP header is located in the first octets of the data area; large values are types, which mean no LLC/SNAP header is included).

 

The operation of network analyzer is a computer with a network interface that receives all frames, which is called promiscuous mode.  So many desktop computers have interface that can be configured for promiscuous mode. When combined with software computer can examine any frame on LAN. In this way the communication across LAN is guaranteed to be private. Computer receives and displays frames on the LAN.

Network analyzer can be configured to filter and process frames. It can count frames of specific type of size.  It displays only frames from or to specific computers.

 

   

Question No: 21    ( Marks: 10 )

Thick Ethernet, Thin Ethernet and Twisted pair Ethernet.

 

Solution:-

 

Thick Ethernet:

Thick Ethernet, officially known as 10 Base-5, is the oldest form of Ethernet.

One form of cabling supported by Ethernet is low-loss 50 Ohm coaxial cable as shown in the figure below. This type of cable is 0.5" diameter (usually supplied with a yellow outer PVC coating) and rather inflexible. It has become known in the communications industry as "Thick Ethernet". The official name for this cable is 10 Baseband5 (10B5), indicating that it is specified for baseband communications at 10 Mbps over distances up to 500m.

 

Thin Ethernet:

 

Thin Ethernet, officially called 10 Base-2, is a less expensive version of 10 Base-5 (Thick Ethernet) technologies. It uses a lighter and thinner coaxial cable and dispenses with the external transceivers used with 10 Base-5.

 

10 Base-2 uses an RG-58A/U coaxial cable and is wired in a bus topology. Each device on the network is connected to the bus through a BNC "T" adapter, and each end of the bus must have a 50 Ohm terminator attached. Each node on the bus must be a minimum of 0.5 meters (1.5 feet) apart, and the overall length of the bus must be less than 185 meters (606 feet).

 

 

Twisted Pair Ethernet:

 

Twisted Pair Ethernet (10baseT), sometime also called "UTP" from "Unshielded Twisted Pair", is based on using a cable similar to phone-wiring. The cable is connected via RJ-45 connectors to the network card installed in the PC.

Question No: 1

( Marks: 1 ) - Please choose one

The number of connections needed for N computer in direct point to point communication is equal to: ► (N2 –N)/2 ► N(N- 1) ► N2 ► None of the given

Question No: 2

( Marks: 1 ) - Please choose one

When an application--------------- data, it makes a copy of the data available to all other computers on the network. ► Broadcasting ► Multicasting ► Unicasting ► None of the given

Question No: 3

( Marks: 1 ) - Please choose one

Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer. ► 64 ► 48 ► 32

►8

Question No: 4

( Marks: 1 ) - Please choose one

A system with redundant bridges might have a problem with_______ in the system. ► Loop ► Filters ► Spanning Trees ► All given choices

Question No: 5

( Marks: 1 ) - Please choose one

The product of delay and throughput measures the _____ of data that can be present on the network. ► Area ► Volume ► Length ► None of the given

Question No: 6

( Marks: 1 ) - Please choose one

Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary interaction and operating system independent are the characteristics of _____________ ► TCP ► UDP

► IP ► None of the given

Question No: 7

( Marks: 1 ) - Please choose one

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________ ► None of the given ► TCP ► UDP ► IP

Question No: 8

( Marks: 1 ) - Please choose one

The process of using a routing table to select a next hop for a given datagram is called_________ ► Encapsulation ► Reassembling ► Routing or forwarding ► None of the given

Question No: 9

( Marks: 1 ) - Please choose one

____________ uses distance vector approach to define routing ► BGP

► OSPF ► RIP ► None of the given

Question No: 10

( Marks: 1 ) - Please choose one

A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called__________ ► Distance Vector Multicast Routing Protocol (DVMRP) ► Core Based Trees (CBT) ► Protocol Independent Multicast_ Sparse Mode (PIM-SM) ► Protocol Independent Multicast _ Dense Mode (PIM-DM)

Question No: 11

( Marks: 1 ) - Please choose one

One repeater _______, two repeaters ________ the maximum cable length limitation. ► doubles, cancel ► doubles, triple ► square roots, cude roots ► and, triple

Question No: 12

( Marks: 1 ) - Please choose one

Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.

► postfix, Infix ► non of these ► Infix, prefix ► prefix, suffix

Question No: 13

( Marks: 1 ) - Please choose one

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient. ► True ► False

Question No: 14

( Marks: 1 ) - Please choose one

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address. ► 32, 48 ► 24, 32 ► 32, 64 ► 32, 128

Question No: 15

( Marks: 1 ) - Please choose one

End-to-end delivery service is connection oriented. ► True ► False

Question No: 16

( Marks: 1 ) - Please choose one

A single networking technology is best for all needs. ► True ► False

Question No: 17

( Marks: 1 ) - Please choose one

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers. ► False ► True

Question No: 18

( Marks: 1 ) - Please choose one

Which method of Address Resolution Protocol is useful with any hardware? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

►T ►C ►D ► C, D

Question No: 19

( Marks: 1 ) - Please choose one

In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange? ►T ►D ►C ► T, C

Question No: 20

( Marks: 1 ) - Please choose one

We use the term _______ to refer to a measure of the path that routing software use when choosing a route. ► routing path ► routing metric ► routing ► switching

Question No: 21

( Marks: 2 )

Is there a comparision between TCP/IP reference model and ISO reference model. Question No: 22 ( Marks: 2 )

Does OSPF only share information within an area or does it allow communication between areas?

Question No: 23

( Marks: 2 )

What are the implimentations of Network Address Translation? Question No: 24 ( Marks: 3 )

Describe the difference between static and dynamic routing? Question No: 25 ( Marks: 3 )

What is the first address in the block if one of the addresses is 140.120.84.24/20? Question No: 26 ( Marks: 3 )

Write three new features of IPV6. Question No: 27 ( Marks: 5 )

What is the difference between an interior gateway protocol and an exterior gateway protocol? Name an example of each. Question No: 28 ( Marks: 5 )

As the Internet grew, the original Classful addressing scheme became a limitation, what is was the designed solution. Question No: 29 ( Marks: 5 )

What are IPv6 ADDRESS NOTATION? Question No: 30 ( Marks: 10 )

128-bit addresses unwidely in dotted decimal; requires 16 numbers:

105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255

Groups of 16-bit numbers in hex separated by colons – colon hexadecimal (or colon hex).

69DC: 8864:FFFF: FFFF: 0:1280:8C0A:FFFF

Zero-compression – series of zeroes indicated by two colons

FF0C: 0:0:0:0:0:0:B1

FF0C::B1

IPv6 address with 96 leading zeros is interpreted to hold an IPv4 address

 

LIST SOME CHARACTERISTICS OF A CLIENT. Question No: 31 ( Marks: 10 )

The characteristics of a client are explained below:

"Client is an arbitrary application program.

"It becomes client temporarily.

"It can also perform other computations.

"It is invoked directly by the user.

"It runs locally on the user’s computer.

"It actively initiates contact with a server.

"It contacts one server at a time.

With help of the diagram below, explain TCP Segment Format:

 

TCP uses single format for all messages. TCP uses the term segment to refer to a message. Each message sent from TCP on one machine to TCP on another machine uses this format including data and acknowledgement.

 

FINALTERM EXAMINATION Fall 2008 CS610- Computer Network Ref No: 325806 Time: 120 min Marks: 70 Student Info Student ID: Center: Exam Date:

For Teacher's Use Only Q No. 1 2 3 Marks Q No. Marks Q No. Marks Q No. Marks 25 26 27 17 18 19 9 10 11

Question No: 1

( Marks: 1 ) - Please choose one

Computer networks are often called -------------- because they use packet technology. ► Ethernet ► Switch networks ► Packet networks ► None of the given

Question No: 2

( Marks: 1 ) - Please choose one

A network uses a ------arranges for computers to be connected in a closed loop. ► Star Topology ► Ring Topology ► Bus Topology ► None of the given

Question No: 3

( Marks: 1 ) - Please choose one

An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types. ► Explicit frame type ► Ideal frame type ► Implicit frame type ► None of the given

Question No: 4

( Marks: 1 ) - Please choose one

An interface for thin Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification. ► RJ-45, 10 Base T ► RJ-45, 10 Base 5 ► BNC, 10 Base 2 ► BNC, 10 Base T

Question No: 5

( Marks: 1 ) - Please choose one

A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________ ► Layer 2 source address ► Source node’s physical address ► Layer 2 destination address ► Layer 3 destination address

Question No: 6

( Marks: 1 ) - Please choose one

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________ ► Hierarchal address ► Default route ► Shortest path

► None of the given

Question No: 7

( Marks: 1 ) - Please choose one

________ of TCP/IP layering model, corresponds to basic network hardware. ► Physical Layer ► Network Interface Layer ► Internet Layer ► Transport Layer

Question No: 8

( Marks: 1 ) - Please choose one

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer. ► Physical Layer ► Network Interface Layer ► Internet Layer ► Transport Layer

Question No: 9

( Marks: 1 ) - Please choose one

________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer. ► IP

► UDP ► TCP ► None of the given

Question No: 10

( Marks: 1 ) - Please choose one

____________ uses distance vector approach to define routing ► BGP ► OSPF ► RIP ► None of the given

Question No: 11

( Marks: 1 ) - Please choose one

_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks. ► Flood-and -Prune ► Configuration-and -Tunneling ► Core-Based Discovery ► None of the given

Question No: 12

( Marks: 1 ) - Please choose one

Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source address

►3 ►2 ►1 ►0

Question No: 13

( Marks: 1 ) - Please choose one

Protocol addresses are abstractions provided by ___________. ► hardware ► software ► operating system ► internet

Question No: 14

( Marks: 1 ) - Please choose one

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient. ► True ► False

Question No: 15

( Marks: 1 ) - Please choose one

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address. ► 32, 48 ► 24, 32 ► 32, 64

► 32, 128

Question No: 16

( Marks: 1 ) - Please choose one

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers. ► False ► True

Question No: 17

( Marks: 1 ) - Please choose one

In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange? ►T ►D ►C ► T, C

Question No: 18

( Marks: 1 ) - Please choose one

The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent. ► True ► False

Question No: 19

( Marks: 1 ) - Please choose one

To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system. ► True ► False

Question No: 20

( Marks: 1 ) - Please choose one

Which of the following is a correct representation of the IPv6? ► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255 ► 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255 ► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256 ► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255

Question No: 21

( Marks: 2 )

Is there a comparision between TCP/IP reference model and ISO reference model. Question No: 22 ( Marks: 2 )

How can a datagram be transmitted across a physical network that does not understand the datagram format? Question No: 23 ( Marks: 2 )

What is the basic concept of Twice NAT (Network Address Translation)? Question No: 24 ( Marks: 3 )

What format is used for an internet packet? Question No: 25 ( Marks: 3 )

“To achieve a hierarchy, OSPF allows an autonomous system to be partitioned for routing purposes”. Does this feature make OSPF more complex or powerful?

Question No: 26

( Marks: 3 )

Why does IPv6 use separate Extension Headers? Question No: 27 ( Marks: 5 )

Consider the IP addresses: 178.200.127.5 and the corresponding subnet masks 255.255.255.0, then find out the following: a . The number of bits used for subnetting. b . Total number of host in the subnet c . The network address of the subnet. d. The subnet address of the IP address. Question No: 28 ( Marks: 5 )

How does IP software reassemble fragments that arrive out of order? Question No: 29 ( Marks: 5 )

Write down the comparison of Distance- vector and Link – state algorithm? Question No: 30 ( Marks: 10 )

Descibe in detail what is the purpose of the following table? What sort of information can be extracted?

Question No: 31

( Marks: 10 )

List down and describe atleast five charachteristics of Routing Information Protocol.

 

Question No: 1    ( Marks: 1 )    - Please choose one

 A typical port on an ATM switch operates at __________ or higher.

       ► OC-2 speed (155Mbps)

       ► OC-3 speed (100Mbps)

       ► OC-3 speed (155Mbps)

       ► OC-3 speed (155Gbps)

   

Question No: 2    ( Marks: 1 )    - Please choose one

 The product of delay and throughput measures the _____ of data that can be present on the network.

 

       ► Area

       ► Volume

       ► Length

       ► None of the given

 

   

Question No: 3    ( Marks: 1 )    - Please choose one

 __________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

►Constant Bit Rate (CBR) service

►Variable Bit Rate (VBR) service

►Available Bit Rate (ABR) service

►None of the given

 

   

Question No: 4    ( Marks: 1 )    - Please choose one

 Which of the following is a connecting device?

►Bridge

►Repeater

►Hub

►All the given

   

Question No: 5    ( Marks: 1 )    - Please choose one

 A bridges function in the _________ layers(s).

►Physical (MAC)

►Data link

►Network

►Physical (MAC) and Data link

   

Question No: 6    ( Marks: 1 )    - Please choose one

 IEEE LLC/SNAP header is --------, which is used to specify the type of data.

►8 octets

►8 bytes

►8 bits

►None of the given

   

Question No: 7    ( Marks: 1 )    - Please choose one

 The third field of the header consists of ------ bit Ethernet frame type.

►48

►32

►16

►8

   

Question No: 8    ( Marks: 1 )    - Please choose one

 An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

►Explicit frame type

►Ideal frame type

►Implicit frame type

 

►None of the given

   

Question No: 9    ( Marks: 1 )    - Please choose one

 Local Talk is a LAN technology that employs -------------

 

►Star topology

►Bus topology

 

►Ring topology

►None of the given

   

Question No: 10    ( Marks: 1 )    - Please choose one

 The Fast Ethernet hardware operates at a rate of --------

►10 Mbps

►100 Mbps

►1000 Mbps

►None of the given

   

Question No: 11    ( Marks: 1 )    - Please choose one

 ---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

►Parity

►Checksums

►CRC

►None of given

   

Question No: 12    ( Marks: 1 )    - Please choose one

 Computer networks are often called -------------- because they use packet technology.

►Ethernet

 

►Switch networks

 

►Packet networks

 

►None of the given

   

Question No: 13    ( Marks: 1 )    - Please choose one

 ------ Program sends a message to a remote computer and reports whether the computer responds.

►Ping

Ping

►Traceroute

►ICMP

►Non of the given

   

Question No: 14    ( Marks: 1 )    - Please choose one

 In ---------, network occupies larger areas like cities & countries.

►LAN

 

►WAN

►MAN

►None of the given

   

Question No: 15    ( Marks: 1 )    - Please choose one

 In -------------, network occupies the smaller area like a room a floor or a building

 

►LAN

►WAN

►MAN

►None of the given

   

Question No: 16    ( Marks: 1 )    - Please choose one

 In Point-to-Point topology there are two topologies.

►Tree and Ring

►Star and Ring

►Star and Tree

►None of  the given

   

Question No: 17    ( Marks: 2 )

 

   

Question No: 18    ( Marks: 2 )

 

   

Question No: 19    ( Marks: 3 )

 Why 10-base T wiring scheme is called star shaped bus wiring scheme.

   

Question No: 20    ( Marks: 5 )

 What are the main factors due to which mechanism of error detections schemes differ?

 

   

Question No: 21    ( Marks: 10 )

 How much data can be present on an original Ethernet segment at one time? To find out, compute the delay-throughput product. The original Ethernet operate at 10 mega bits per second, and a segment was limited to 500 meters. Assume the signals propagate down the cable at 66 percent of the speed of light.

Solution:

Speed of light = 299 792 458 m / s

 

Bandwidth=10

Delay = 66 percent of speed of light =197863022 m/s

 

Bandwidth Delay product= 247328777500

 

Tags: CS610, Computer, Mid, Network, Papers, Solved, Term

Views: 196

Attachments:

Replies to This Discussion

Note: (This is Featured Discussion)

For Important Helping Material related to the subject (Solved MCQs, Short Notes, Solved past Papers, E-Books, FAQ,Short Questions Answers & more). You must view all the featured Discussion in this subject group.

For how you can view all the Featured discussions click on the Back to Subject Name Discussions link below the title of this Discussion & then under featured Discussion corner click on the view all link.

RSS

Main Forum Discussions By Categories Wise

Latest Activity In Forum

Newest Discussions In Forum

Most Popular Discussion

Latest Activity

Jacob Black updated their profile
3 minutes ago
zoya noor Mcs !!! left a comment for Thirsty Vampire
7 minutes ago
Double Diamond replied to مَلیکا ایمان's discussion A Question from Ning Programmers!!
8 minutes ago
RJ R@J@ updated their profile
12 minutes ago

Member of The Month

1. + M.Tariq Malik

Wah Cantt, Pakistan

Picture of The Day

  • Add Photos
  • View All

Videos

  • Add Videos
  • View All

Site Info

About Us

49000+ Members

VUSTUDENTS Toolbar

Become a Team Member

Moderators Group

Safety Guidelines for New

Site FAQ & Rules

Safety Matters

Online Safety

Terms of Service

Disclaimer

+ Report an Issue

Advertise with Us

Rules For Blog Post

Prohibited Content On Site

Report a violation

Management: Admins,Moderators

Awards Badges List

Public Us On Google

Like Our Facebook Page

© 2014   Created by + M.Tariq Malik.

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service