FINAL ASSESSMENT/EXAMINATION JULY 2015 PLEASE READ ALL INSTRUCTIONS CAREFULLY BEFORE YOU BEGIN THIS EXAMINATION



Similar documents
THE UNIVERSITY OF TRINIDAD & TOBAGO

THE UNIVERSITY OF TRINIDAD & TOBAGO FINAL ASSESSMENT/EXAMINATIONS DECEMBER 2012

Interconnecting Cisco Network Devices 1 Course, Class Outline

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Cisco Data Centre: Introducing Cisco Data Center Networking

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

THE UNIVERSITY OF TRINIDAD & TOBAGO

Packet Tracer - Subnetting Scenario 1 (Instructor Version)

How To Learn Cisco Cisco Ios And Cisco Vlan

"Charting the Course...

Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises a, b, c and d

Candidates should attempt FOUR questions. All questions carry 25 marks.

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

IP Addressing A Simplified Tutorial

The IP Transmission Process. V1.4: Geoff Bennett

Packet Tracer 3 Lab VLSM 2 Solution

IT 3202 Internet Working (New)

First Semester Examinations 2011/12 INTERNET PRINCIPLES

SUBNETTING SCENARIO S

THE UNIVERSITY OF TRINIDAD & TOBAGO

Source net: Destination net: Subnet mask: Subnet mask: Router Hub

Workstation ARP. Objective. Background / Preparation

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Written examination in Computer Networks

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Module 4, Assignment 3-2

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

Computer Networks I Laboratory Exercise 1

Internet Protocol Address

IP Subnetting and Addressing

Chapter 3: IP Addressing and VLSM

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

Lab Calculating VLSM Subnets

Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Allan Johnson

THE UNIVERSITY OF TRINIDAD & TOBAGO

DG Forwarding Algorithm

Networking Basics for Automation Engineers

Lab IP Addressing Overview

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Chapter 5 Customizing Your Network Settings

Networking Test 4 Study Guide

IP Filter/Firewall Setup

RARP: Reverse Address Resolution Protocol

Lecture Computer Networks

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Layer 3 Routing User s Manual

Expert Reference Series of White Papers. Basics of IP Address Subnetting

(Refer Slide Time: 02:17)

Internetworking and IP Address

UNIVERSIDADE DA BEIRA INTERIOR Faculdade de Engenharia Departamento de Informática

Type of addressing in IPv4

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

CCT vs. CCENT Skill Set Comparison

BASIC ANALYSIS OF TCP/IP NETWORKS

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

VLSM and CIDR Malin Bornhager Halmstad University

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP videoconferencing solution with ProCurve switches and Tandberg terminals

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks

Lab a Basic Subnetting

Transport and Network Layer

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Question Question Question EdTech 552: Lab 3 Answer Sheet

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

NB6 Series Quality of Service (QoS) Setup (NB6Plus4, NB6Plus4W Rev1)

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

UPPER LAYER SWITCHING

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX

One of the most important topics in any discussion of TCP/IP is IP. IP Addressing

- Hubs vs. Switches vs. Routers -

Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics

IP - The Internet Protocol

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Seven Steps to Subnetting

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Chapter 4 Customizing Your Network Settings

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

VLSM & IP ADDRESSING EXAMPLE QUESTIONS with answers;

Technical Support Information Belkin internal use only


We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

The Basics. As we begin our discussion of TCP/IP networking with Windows 2000 we first look at the basics of TCP/IP. We look at all PART ONE

IP address format: Dotted decimal notation:

Configuring Network Address Translation (NAT)

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

Topic 7 DHCP and NAT. Networking BAsics.

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Course. Contact us at: Information 1/8. Introducing Cisco Data Center Networking No. Days: 4. Course Code

Router and Routing Basics

Cisco Configuring Commonly Used IP ACLs

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Transcription:

THE UNIVERSITY OF TRINIDAD & TOBAGO FINAL ASSESSMENT/EXAMINATION JULY 2015 Course Code and Title: CNET 2001 Network Architecture Programme: B.A.Sc. ICT Computer Engineering Date: Tuesday July 28, 2015 Time: 9:00 a.m. 12:00 noon Duration: 3 Hours PLEASE READ ALL INSTRUCTIONS CAREFULLY BEFORE YOU BEGIN THIS EXAMINATION Instructions to Candidates 1. This paper has 8 pages and 7 questions. 2. Calculators are allowed, though not necessary. 3. The total marks for this paper is 100. 4. You are required to return the question paper with your answer script. Key Examination Protocol 1. Students please note that academic dishonesty (or cheating) includes but is not limited to plagiarism, collusion, falsification, replication, taking unauthorised notes or devices into an examination, obtaining an unauthorised copy of the examination paper, communicating or trying to communicate with another candidate during the examination, and being a party to impersonation in relation to an examination. 2. The above mentioned and any other actions which compromise the integrity of the academic evaluation process will be fully investigated and addressed in accordance with UTT s academic regulations. 3. Please be reminded that speaking without the Invigilator s permission is NOT allowed. Page 1 of 8

Question 1 Many network devices work together to transport data across the network, such as bridges, switches, routers among others. a. What is a bridge? b. What ability of a bridge enables it to connect different types of Ethernet? c. At what layer does a switch traditionally operate? d. i. What kind of connection is used to attach a host to a switch? ii. What advantage does this bring? e. What are the main advantages of using a switch over a bridge? f. There are two broad categories of MAC protocols. These are deterministic and non-deterministic. i. Explain what is meant by a deterministic MAC protocol, giving one example. ii. Explain what is meant by a non-deterministic MAC protocol, giving one example. Page 2 of 8

2. An network administrator has done an analysis for his organisation s planned network and found the number and grouping of required hosts to be as follows: Marketing LAN Staff Computers: 40 Router (LAN Gateway): 1 Switches (management): 4 Total for Marketing subnetwork: 49 Shipping LAN Staff Computers: 10 Router (LAN Gateway): 1 Switches (management): 1 Total for Shipping subnetwork: 12 WAN Router - Router WAN: 2 Total for WAN: 2 Purchasing LAN Staff Computers: 6 Router (LAN Gateway): 1 Switches (management): 1 Total for Purchasing subnetwork: 8 HR LAN Administrator Computers: 8 Server: 1 Router (LAN Gateway): 1 Switch (management): 1 Total for HR subnetwork: 11 As an administrator you are assigned an address block of 172.0.0.128 /25 as a whole. Using VLSM, you are required to assign addresses to each subnetwork. Answer the following questions in your answer booklet. Make sure to show your working. a. What is the network address that you assign to each subnetwork in binary format? b. What is the first usable network address for each subnetwork in decimal format? Page 3 of 8

c. What is the broadcast address for each subnetwork in binary format? d. What is the subnet mask for each subnetwork in decimal format? e. How many addresses are expected to remain unused within each subnetwork? Page 4 of 8

Question 3 is based on the following network diagram. Subnet 1 Subnet 2 134.79.10.1 134.79.10.1 134.79.10.2 134.79.15.1 134.79.15.3 134.79.15.5 A B C W X Y R1 134.79.10.254 134.79.15.254 10.10.10.2 a. What IP address should be configured as the default gateway of the hosts on Subnet 1? b. What is the purpose of this default gateway? c. i. What are gratuitous ARP requests and what are they used for? ii. What harm can they cause? d. Host W on Subnet 2 wants to send a packet to the host with IP address 134.79.15.3 on Subnet 2. It needs to resolve the MAC address associated with the IP address of that host. i. What is the full name of the protocol used? ii. Give a detailed explanation of how this protocol works with specific reference to the network shown. [4] Page 5 of 8

Question 4 a. Several encoding methods are used in different communication applications. One such encoding scheme used is Differential Manchester encoding. i. What are the advantages and disadvantages of using this scheme? ii. Given that the signal below is generated using Differential Manchester Encoding which starts at low, what bit pattern does it represent? b. Another possible encoding scheme that may be used is the Non-Return to Zero Inverted or NRZI scheme. i. What are the advantages and disadvantages of using this scheme. ii. Draw the signal that would be generated using this scheme for the bit pattern 0 0 1 0 1 1 0 1 0 Page 6 of 8

Question 5 is based on the diagrams shown below. The Transport layer uses two protocols. These are TCP and UDP. The following diagrams show the UDP header and TCP header respectively. UDP Header TCP Header a. What is TCP used for? b. What are the major characteristics of the TCP? c. What is UDP used for? Page 7 of 8

d. What are the major characteristics of the UDP? e. In the UDP header shown above, why are there no sequence numbers or window size fields as shown in the TCP header? f. i. What does it mean when we say that UDP is unreliable? ii. How is the fact that UDP is unreliable reflected in the header structure when compared to TCP? Question 6 a. Distance-vector routing protocols enjoy major benefits over link-state protocols. What are these benefits? b. Describe the updates sent out by Distance-vector routers? c. Link-state routing leads to faster convergence than distance-vector routing. i. What is convergence? ii. Why is convergence faster on link-state routing than distance-vector routing? d. Name and describe 5 types of metrics commonly used by routers. Question 7 a. Name and describe three different types of network attacks. b. An entry into an ACL is as follows: access-list 1 deny 172.16.4.0 0.0.0.255 i. Will a packet from a machine with IP address 172.16.4.7 be allowed? Explain. ii. What is the 0.0.0.255 called and what is it used for? c. Besides network security, what is another reason to create ACLs? Page 8 of 8