Sunteți pe pagina 1din 14

UNIVERSITI TENAGA NASIONAL

College of Information Technology

BACHELOR OF INFORMATION TECHNOLOGY (HONS.)


BACHELOR OF COMPUTER SCIENCE (HONS.)

FINAL EXAMINATION
SEMESTER I 2013/2014

DATA COMMUNICATION AND COMPUTER NETWORKS


(CSNB213)

September 2013

Time allowed: 2 hours and 30 minutes + 10 minutes for reading

INSTRUCTIONS TO CANDIDATES

1. The total marks for this exam is 100 marks.


2. There are TWO (2) SECTIONS to this paper; Section A and Section B.
3. Answer ALL questions in the answer booklet provided.

DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE INSTRUCTED TO DO SO


THIS QUESTION PAPER CONSISTS OF 14 PRINTED PAGES INCLUDING THIS PAGE

Page 1 of 14
SECTION A: MULTIPLE CHIOCE (30 QUESTIONS, 30 MARKS)
Instruction: Please choose the best answer. Each correct answer contributes 1
mark.

1. When a host transmits data across a network to another host, which process
does the data go through?
(a) Standardization
(b) Conversion
(c) Encapsulation
(d) Synchronization

2. Which of the following correctly describe steps in the OSI data encapsulation
process?

(a) The transport layer divides a data stream into segments and may add
reliability and flow control information.
(b) The data link layer adds physical source and destination addresses and
an FCS to the segment.
(c) Packets are created when the network layer encapsulates a frame with
source and destination host addresses and protocol-related control
information.
(d) Packets are created when the network layer adds Layer 3 addresses and
control information to a frame.

3. Which layer of the OSI reference model uses the hardware address of a device
to ensure message delivery to the proper host on a LAN?
(a) physical
(b) data link
(c) network
(d) transport

Page 2 of 14
Semester I 2013/2014 Data Communication and Computer Networks
4. Which layer of the OSI reference model uses flow control, sequencing, and
acknowledgments to ensure that reliable networking occurs?
(a) data link
(b) network
(c) transport
(d) presentation

5. A network administrator is verifying the configuration of a newly installed


host by establishing an FTP connection to a remote server. What is the highest
layer of the protocol stack that the network administrator is using for this
operation?
(a) Application
(b) Presentation
(c) Session
(d) Transport

6. Which of the following protocols uses both TCP and UDP ports?
(a) SMTP
(b) Telnet
(c) FTP
(d) DNS

7. An administrator issues the command ping 127.0.0.1 from the command line
prompt on a PC. If a reply is received, what does this confirm?
(a) The PC has connectivity with a Layer 3 device.
(b) The PC has a default gateway correctly configured
(c) The PC has connectivity up to Layer 5 of the OSI model
(d) The PC has the TCP/IP protocol stack correctly installed.

Page 3 of 14
Semester I 2013/2014 Data Communication and Computer Networks
8. When a DHCP server is configured, two IP addresses should never be
assignable to hosts are; the broadcast address on the network and
(a) IP address used by the interfaces
(b) network or subnetwork IP address
(c) manually assigned address to the clients
(d) designated IP address to the DHCP server

9. How does the connection-oriented transport layer protocol start up a session


between two hosts?
(a) With a preamble
(b) With a two-way handshake
(c) With a three-way handshake
(d) With a cyclic redundancy check

10. Refer to figure 1 below. Which value will be configured for Default Gateway
of the Local Area Connection?

Figure 1
(a) 10.0.0.0
(b) 10.0.0.254
(c) 192.223.129.0
(d) 192.223.129.254

Page 4 of 14
Semester I 2013/2014 Data Communication and Computer Networks
11. For the network 192.0.2.0/24, which option is a valid IP address that can be
assigned to a host?

(a) 192.0.2.0

(b) 192.0.2.254

(c) 192.0.3.254

(d) 192.0.4.1

12. Which prefix corresponds to a subnet mask of 255.255.240.0?


(a) /16
(b) /20
(c) /24
(d) /28

13. What information from a packet does a router use in order to choose a route
for forwarding the packet?
(a) Host portion of destination IP address
(b) Host portion of source IP address
(c) Network portion of destination IP address
(d) Network portion of source IP address

14. When would a PC need a default gateway address?


(a) When it sends any packet.
(b) When it sends a packet to another PC on its own network.
(c) When it sends a packet to a host on a different network.
(d) When it does not know the IP address of the destination host.

15. What is a broadcast message?


(a) A message originated by a router.
(b) A message originated by a switch.
(c) A message addressed to all routers.
(d) A message addressed to all hosts on the local network.

Page 5 of 14
Semester I 2013/2014 Data Communication and Computer Networks
16. When is it acceptable for two hosts to have the same IP address at the same
time?
(a) When they are on different networks that use private IP addresses
(b) When they are on the same network and it uses private IP addresses
(c) When they are on different networks that use public IP addresses
(d) When they are on the same network and it uses public IP addresses

17. What is the network address of the host with IP address 192.168.22.83/28?
(a) 192.168.22.0
(b) 192.168.22.64
(c) 192.168.22.72
(d) 192.168.22.80

18. A network has subnet mask 255.255.255.0. What is the maximum number of
hosts on the network?
(a) 30
(b) 62
(c) 126
(d) 254

19. All of the following are basic operations of a switch EXCEPT:


(a) Aging
(b) Filtering
(c) Flooding
(d) Blocking

20. A TCP sender wants to send data that has a total size of 1000 bytes; this data
is further divided into four segments. Each segment size is 250 bytes. Segment
1 is given a sequence number 100. What is the sequence number for segment
3?
(a) 250
(b) 350
(c) 600
(d) 850

Page 6 of 14
Semester I 2013/2014 Data Communication and Computer Networks
21. Method for converting a stream of data bits into a predefined code is called:
(a) Signaling
(b) Encoding
(c) Coding
(d) Framing Code

22. Bits are represented on the medium by changing one or more of the following
signal characteristics EXCEPT:
(a) Amplitude
(b) Phase
(c) Frequencies
(d) Power

23. What is the use of Cyclic Redundancy Check (CRC)?


(a) To perform error detection
(b) To perform error correction
(c) To prevent data loss
(d) To prevent buffer overflow

24. What functions do routers perform in a network?


(a) Circuit switching
(b) Access layer security
(c) Path selection
(d) Bridging between LAN segments

25. Which command can be used from a PC to verify the connectivity between
hosts that connect through path?
(a) Tracert address
(b) Ping address
(c) Arp address
(d) Telnet address

Page 7 of 14
Semester I 2013/2014 Data Communication and Computer Networks
26. One advantage of using a router to segment the network is

(a) Broadcasts are eliminated.


(b) Routers generally cost less than switches.
(c) Broadcasts are not forwarded across the router.
(d) Adding a router to the network decreases latency

27. Refer to the table 1 below. What type of connection would be supported by the
cable given in the table?

Table 1

Pin Color Function Pin Color Function

1 White/Green TX+ 1 White/Green TX+

2 Green TX- 2 Green TX-

3 White/Orange RX+ 3 White/Orange RX+

6 Orange RX- 6 Orange RX-

(a) PC to router

(b) PC to switch

(c) server to router

(d) router to router

28. Which one Ethernet fiber-optic modes support distances of greater than 550
meters?
(a) 1000BASE-CX

(b) 100BASE-FX

(c) 1000BASE-LX

(d) 1000BASE-SX

Page 8 of 14
Semester I 2013/2014 Data Communication and Computer Networks
29. What is the first 24 bits in a MAC address called?
(a) NIC
(b) BIA
(c) OUI
(d) VAI

30. For which type of connection should a straight-through cable be used?


(a) switch to switch
(b) switch to hub
(c) host to switch
(d) hub to hub

Page 9 of 14
Semester I 2013/2014 Data Communication and Computer Networks
SECTION B: STRUCTURE QUESTIONS (17 QUESTIONS, 70 MARKS)
Instruction: Please answer the following questions as concisely as possible.

Question 1
Differentiate in between an intranet and extranet.
[4 marks]

Question 2
A host IP address is 172.16.29.104 and the prefix length is /16.
(a) What are the network address, broadcast address and the subnet mask of the
hosts network?
[3 marks]

(b) What is the range of host addresses of this network?


[2 marks]

(c) If the host want to send a broadcast message to all hosts in its own network,
what is the broadcast address that will be used?
[1 mark]

Question 3
Initially you are given a block of network 201.73.1.0/24. You borrow 2 bits from the
host part for subnetting.
(a) How many subnets can you have?
[1 mark]

(b) How many hosts can you have on each subnet?


[1 mark]

(c) What is the prefix number used for all the subnet created?
[1 mark]

Page 10 of 14
Semester I 2013/2014 Data Communication and Computer Networks
(d) Give the network address, broadcast address and range of host addresses for
the first subnet you obtained in question (a) above.
[2 marks]

Question 4
There are two types of broadcast; limited broadcast and directed broadcast.
(a) Differentiate between these two types of broadcast.
[3 marks]

(b) If the network address is 172.168.70.0 / 24, give the IP address that will be
used for the limited and directed broadcast for this network.
[2 marks]

Question 5
What is static IP addressing? Give THREE (3) devices that should be given a static
address.
[4 marks]

Question 6
What was the main reason for developing IPv6? Give TWO (2) advantages of IPv6
over IPv4.
[3 marks]

Question 7
What are the two sub-layers of the Data Link Layer? Give ONE (1) function for each
sub-layer.
[4 marks]

Question 8
CSMA/CD is the medium access control (MAC) protocol used by the popular
Ethernet technology. Explain the behavior of Ethernet in the following situations.
(a) A device has data to transmit. What does it do before it transmits the data?
[2 marks]

Page 11 of 14
Semester I 2013/2014 Data Communication and Computer Networks
(b) What does it do while transmitting the data?
[2 marks]

(c) What does it do when collision is detected?


[2 marks]

Question 9
Differentiate in between interference and attenuation in data communication.
[2 marks]

Question 10
Draw a signal for encoded bit stream 11001001 using:
(a) Nonreturn to Zero
[2 marks]

(b) Manchester
[2 marks]

Question 11

(a) Data transfer can be measured using bandwidth, throughput and goodput.
Briefly describe about throughput and goodput.

[4 marks]

(a) A 100BaseT Ethernet LAN has a bandwidth of 100 Mbps. However, due to
the number of hosts connected to the LAN and the amount of traffic generated
by these hosts, the throughput may only be 70 Mbps. Out of all the bits
transmitted, 2/5 of them may just be control bits. Calculate the goodput for
this scenario.
[3 marks]

Page 12 of 14
Semester I 2013/2014 Data Communication and Computer Networks
Question 12
Give THREE (3) criteria that should be considered in selecting network media.
[3 marks]

Question 13
What are the advantages of using switches over hubs in an Ethernet network? Give
THREE (3) of them.
[3 marks]

Question 14
The main advantage of implementing wireless media is that devices are no longer
need to use physical media. However it has several disadvantages. List any TWO (2)
disadvantages of wireless media.
[2 marks]

Question 15
Given below is the MAC addresses or Host A and Host B:
Host Y: 00 60 2F CO 56 1A
Host Z: 00 60 2F 55 47 2B

Based from the given information, answer the following questions.


(a) Host Y wants to send frame to Host Z. What is the source and destination
MAC address?
[2 marks]

(b) Host Z wants to send frame to all hosts in a network. What is the MAC
address that will be used?
[1 mark]

Question 16
Give THREE (3) factors that contribute to the success of Ethernet technology.
[3 marks]

Page 13 of 14
Semester I 2013/2014 Data Communication and Computer Networks
Question 17
Explain what a switch would do in each of the following scenarios.
(a) Frame arrives but the destination MAC address is not listed in the MAC table.
[2 marks]

(b) Frame arrives and the destination MAC address is listed in MAC table.
[2 marks]

(c) Frame arrives but the sender MAC address is not listed in MAC table.
[2 marks]

---End of Questions---

Page 14 of 14
Semester I 2013/2014 Data Communication and Computer Networks

S-ar putea să vă placă și