Sunteți pe pagina 1din 12

FACULTY OF SCIENCE

ACADEMY FOR INFORMATION TECHNOLOGY

MODULE CSC2B10
COMPUTER SCIENCE (DATA COMMUNICATION)
CAMPUS APK

NOVEMBER EXAMINATION

DATE: 13/11/2009 SESSION: 9:00 – 11:00

INTERNAL MODERATOR DR M COETZEE

EXTERNAL MODERATOR MR D COULTER


DURATION 2 HOURS MARKS 100

SURNAME AND INITIALS: __________________________________________________________

STUDENT NUMBER: ______________________________________________________________

CONTACT NR: __________________________________________________________________

NUMBER OF PAGES: 11 PAGES

INSTRUCTIONS: ANSWER ALL THE QUESTIONS


CALCULATORS ARE PERMITTED (ONLY ONE PER STUDENT)
WRITE NEATLY AND TIDILY
STRUCTURE YOUR ANSWERS CARFULLY
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -2-

/2…
SECTION A

Answer all of the following questions on the answer sheet given at the back of the paper. (20)

1. In a mesh topology, the following is not true.


A. Each connection carries its own data load.
B. Transmitted data is secure.
C. If the hub is fails, only one connection is affected.
D. Fault identification and isolation is easy.

2. When a host on network A sends a message to a host on network B, which address does the
router look at?
A. port
B. logical
C. physical
D. none of the above

3. Given the following IP address in bits: 10001010 00000010 00000000 00100101


What is the class of this address?
A. A
B. B
C. C
D. D

4. Which of the following statements is true?


A. Address resolution is local to a network
B. Only routers can perform address resolution
C. Address resolution is just performed by a central computer of a network
D. Address resolution is implemented by the network layer

5. Which would be a valid IP address for a host on the Internet?


A. 240.1.200.35
B. 127.1.2.3
C. 192.23.7.0
D. 180.23.255.255

6. The _________ routing uses the Dijkstra algorithm to build a routing table.
A. distance vector
B. link state
C. path vector
D. none of the above

7. UDP uses ________ to handle outgoing user datagrams from multiple processes on one host.
A. flow control
B. multiplexing
C. demultiplexing
D. none of the above

8. TCP sliding windows are __________ oriented.


A. packet
B. segment
C. byte
D. none of the above

9. In the DNS, the names are defined in ___________ structure.


A. a linear list
B. an inverted-tree
C. a graph
D. none of the above

13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -3-

10. A _______ is a server whose zone consists of the whole tree.


A. domain server
B. zone server
C. root server
D. none of the above

11. In the _______ mode, IPSec protects the whole IP packet, including the original IP header.
A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)

12. The number of addresses in a class C block is _______.


A. 65,534
B. 16,777,216
C. 256
D. none of the above

13. Which address could be the beginning address of a block of 16 classless addresses?
A. 2.4.6.5
B. 2.4.6.15
C. 2.4.6.62
D. none of the above

14. In a block, the prefix length is /24; what is the mask?


A. 255.255.255.0
B. 255.255.242.0
C. 255.255.0.0
D. none of the above

15. _______ is the standard mechanism provided by TCP/IP for copying a file from one host to
another.
A. TELNET
B. SMTP
C. XT_FTP
D. none of the above

16. ______ was invented by Phil Zimmerman.


A. IPSec
B. SSL
C. PGP
D. none of the above

17. An IPv6 address can have up to __________ hexadecimal digits.


A. 16
B. 32
C. 8
D. none of the above

18. An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true?
A. The do not fragment bit is set to 1 for all three datagrams.
B. The more fragment bit is set to 0 for all three datagrams.
C. The identification field is the same for all three datagrams.
D. The offset field is the same for all three datagrams.

19. The term ________ means that IP provides no error checking or tracking. IP assumes the
unreliability of the underlying layers and does its best to get a transmission through to its
destination, but with no guarantees.
A. reliable delivery
B. connection-oriented delivery
C. best-effort delivery
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -4-

D. none of the above


20. In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing
table.
A. next-hop
B. network-specific
C. host-specific
D. default

SECTION B

Answer all of the following questions in the space provided here.

1. Assume that there is communication between a process running at a computer in LAN 1 with IP
address 192.10.10.3 and physical address 4f:4x on port address 1999, and a process running
on a computer in LAN 2 with IP address 192.77.15.7 and physical address 1f:1x on port
address 25.

192.10.10.3
4f:4x

192.33.1.44 192.33.1.48
6f:8x 9f:9x 192.77.15.7
1f:1x

Show all addresses in packets and frames at the transport, network, and data link layers, as the
information leaves the computer in LAN 1 and arrives at the computer in LAN 2 in the spaces
that have been provided.
(6)

Addresses in message leaving computer in LAN 1:

Data Link layer: __________________________________________________________________

Transport layer:___________________________________________________________________

Network layer:____________________________________________________________________

Addresses in message arriving at computer in LAN 2:

Data Link layer:____________________________________________________________________

Transport layer:____________________________________________________________________

Network layer:_____________________________________________________________________

13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -5-

2. Change the following IPv4 address to dotted-decimal notation. (1)

10000001 00001010 00101011 11101011

________________________________________________________________________________

3. Give the mask of the following IP address in binary. (1)

192.168.3.6/24

________________________________________________________________________________

4. An organization is granted the block 152.10.180.0/24. The administrator wants to create 32


subnets.

4.1 What is the mask needed to make this possible?__________________________________ (1)

4.2 Find the number of addresses in each subnet:_____________________________________(1)

4.3 Find the first address in subnet 1:_______________________________________________(1)

4.4 Find the last address in subnet 1:_______________________________________________(1)

5. Complete the following table by entering the full name of the acronym, and state its purpose
and the layers at which it is found. (8)

POP Name:

Purpose:

Internet model layer:

ICMP Name:

Purpose:

Internet model layer:

TCP Name:

Purpose:

13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -6-

Internet model layer:

DHCP Name:

Purpose:

Internet model layer:

6. Define fragmentation and explain why the IPv4 protocol needs to fragment some packets. (2)

7. Which fields of the IPv4 header changes from router to router? (2)

8. A router with IPv4 address 130.23.45.8 and physical address 23:45:AB:45:CD has received a
packet for a host with IP address 130.23.45.21. How does the router send the packet to the
host over the data link layer if it does not have the physical address of the host? (5)

13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -7-

9. A router receives a IPv4 packet with source IP 192.14.23.12 and destination address
92.45.25.56. The queue of the router overflows with messages when the packet arrives. Which
ICMPv4 message should it send back to the source? (1)

10. Give a diagram of the topology of the network if this table is the routing table for router R1. (4)

MASK NETWORK ADDRESS NEXT-HOP ADDRESS INTERFACE


/27 202.14.17.224 ---- f1
/18 145.23.192.0 ---- f0
Default Default 130.56.12.4 f2

11. Name and discuss the core routing protocol of the Internet. (4)

13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -8-

12. Explain how process-to-process delivery works. Refer to the API you have used in the practical
classes to highlight your answer. (5)

13. Explain how a connection is established in TCP via three-way handshaking. (6)

13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -9-

14. When does it make sense to use UDP? Give examples. (4)

15. What is a FQDN? Give an example. (2)

16. To be able to access remote computers is difficult as each computer is different with respect to
the command it understands. Give the protocol that can be used solve this problem. Explain
how it works. (3)

13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 - 10 -

17. Given the following client/server interaction:

CLIENT: HELO
SERVER: (1)

CLIENT: MAIL From: <(Ralph Martin)>


SERVER: 250

CLIENT: (2) : <dave@cs.cf.ac.uk>


SERVER: 250

CLIENT: DATA
SERVER: (3)

CLIENT: From: (Ralph Martin)


CLIENT: Subject: Arrows
CLIENT: This is line one.
CLIENT: This is line two.
CLIENT: (4)
SERVER: 250

CLIENT: (5)
SERVER: 221

17.1 Which protocol is implemented here? (1)

_________________________________________________________________________________

17.2 Fill in the missing terms: (5)


1 _______________________

2 _______________________

3 _______________________

4 _______________________

5 _______________________

18. Discuss how ICMP can be used to implement the traceroute program. (6)

13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 - 11 -

19. Explain why the route displayed by the traceroute program may not correspond to a valid path
through the internet. (2)

20. Name and briefly describe how messages at the network, transport and application layers of
the Internet model can be protected? Label each of the 3 layers you discuss in your answer.
(6)

21. Explain how the DatagramPacket object is used to send data to a remote machine. (2)

13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 - 12 -

SECTION A:

1. 11.
2. 12.
3. 13.
4. 14.
5. 15.
6. 16.
7. 17.
8. 18.
9. 19.
10. 20.

13/…

S-ar putea să vă placă și