0% found this document useful (0 votes)
699 views10 pages

Itt542 PDF

Uploaded by

miorsocceroos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
699 views10 pages

Itt542 PDF

Uploaded by

miorsocceroos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 10
CONFIDENTIAL aS CSIJAN 2018/ITT542 UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION COURSE TCP/IP COURSE CODE ITT542 EXAMINATION : JANUARY 2018 TIME : 3HOURS INSTRUCTIONS TO CANDIDATES 1 ‘This question paper consists of two (2) parts: PART A (30 Questions) PART 6 (7 Questions) 2. ‘Answer ALL questions from all two (2) parts i) Answer PART A in the Objective Answer Sheet ii) Answer PART B in the Answer Booklet. Start each answer on a new page. 3. Do not bring any material into the examination room unless permission is given by the invigilator. 4 Please check to make sure that this examination pack consists of i) the Question Paper ji) an Answer Booklet ~ provided by the Faculty ii) an Objective Answer Sheet — provided by the Faculty 5 ‘Answer ALL questions in English. DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO This examination paper consists of 10 printed pages {© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL, 2 CSIJAN 2018/ITT542 PART A (30 MARKS) 1. Which of the following is NOT part of the Requirement levels of an RFC? A. Required. B. Elective. C. Not recommended. D. Approved. 2. Which of the following is the regulatory agency that regulates radio, television and wire/cable communications? A. FCC, B. ISO. C. IEEE, D. ITU-T. 3. Which layer of the OS! Model is responsible for the source-to-destination delivery of a packet across multiple network links? A. Transport. B. Physical C. Network. D. Data Link. 4. An IPv4 address is normally represented in base or dotted-decimal notation. A 16 B. 10 C. 256 D8 5. Which of the following is the range for Class B private IP address? ‘A. 170.0.0.0 through 170.255.255.255. B. 172.16.0.0 through 172.31.255.255. C. 192.168.0.0 through 192.168.255.255, D. 168.172.0.0 through 168.172.255.255, 6. Which address could be the beginning address of a block of 32 classless addresses? 246.5, 2.46.16. 2.46.24, 2.4.6.62, pomp (© Hak Cipta Universit Teknologi MARA CONFIDENTIAL CONFIDENTIAL, 3 CSIJAN 2018/ITT542 7. Some of the FSKM routers have been configured with default routes. What is the advantage of using default routes? A. They allow connectivity to remote networks that are not in the routing table. B. They direct traffic from the Internet into corporate networks. C. They establish routes that will never go down. D. They require a great deal of CPU power. 8. Which of the following is a source IP address? ‘A. This host on this network. B. Limited broadcast address. ©. Loopback address. D. Specific host on this network. 9. What does the IP address 0.0.0.78 refer to? ‘A. Node 78 on network 0.0.0.0. B. The multicast node 78 address. C. Any host on network 78. D. Node 78 on “this” network. 10. The definition of reliable delivery includes. A. error-free delivery B. Receipt of the complete message C. in-order delivery D. all of the above 11. You work as a network consultant. Your customer, UITM has a class C network license. UITM wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts. Which network mask should you use? A. 255.255.255.192, B. 255.255.255.224. C. 255.255.255.240, D. 255.255.255.248, 12. ABC Sdn Bhd. is assigned a network of 200.10.5.0/24. You want to create 7 subnets from the assigned address. Which subnet mask will give you 7 subnets and the most possible hosts per subnet? A. 127. B. 24 C. 123. D. 129, (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL, 4 CSIJAN 2018/ITT542 13. You have a single Class B IP address and a point-to-point serial link that you want to implement VLSM on. Which subnet mask is the most efficient? A. 127, B. 123, Cc. 130. D. 132. 14. What is the primary reason for using subnets? ‘A. To reduce the size of the collision domain. B. To increase the number of host address. C. To reduce the size of the broadcast domain. D. None of the above. 15. The size of the option field of an IP datagram is 33 bytes. What is the value of HLEN? A. 20 bytes B. 23 bytes. C. 33 bytes, D. 53 bytes. 16. The source port address on the UDP user datagram header defines the A. sending computer B. receiving computer C. application program of the sending computer D. application program of the receiving computer 17. What is the protocol number for TCP? A. 80, B. 21. c. 14. D. 6. 18, Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it sends out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of connectionless windowing connection-oriented protocol flow control 9om> © Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL, CONFIDENTIAL 5 CSIJAN 2018/ITT542 19. What does a router do with a packet with an unknown destination network address? A. Sends it to the serial port. B. Drops the packet. C. Sends it back out the same interface it received it in. a Forwards the packet tothe next hop. 20. TCP uses to check the safe and sound arrival of data, ‘A. an acknowledgment mechanism B. out-of-band signaling C. the services of another protocol D. None of the above. 21. The ports ranging from 0 to 1,023 are assigned and controlled by ICANN. These are the ports. well-known, registered dynamic None of the above. gomr 22.Whenever a router receives a datagram with a time-to-live value of discards the datagram and sends a time-exceeded message to the sender. A. three B. two C. one D. zero 23. An area border router can be connected to only another router another router or another network only another network only another area border router gom> 24. In the DNS structure, each node in the tree has a , Which is a string with a maximum of __ characters. label; 127 label; 63 name; 64 name; 128 com> (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL, 6 CSIJAN 2018/ITT542 25.When the secondary downloads information from the primary, it is called transfer. A. domain B. zone C. file D. label 26.In resolution, the server returns the IP address of the server that it thinks can resolve the query. A. iterative B. recursive C. straight D. reflective 27. To make addresses more readable, IPv6 specifies A. dotted decimal B. hexadecimal colon C. decimal D. None of the above. 28. In IPV6, options are inserted between the and the A. base header; extension header B. base header; upper-layer C. base header; frame header D. None of the above. 29.1PV6 allows security provisions than IPv4. A. more B. less C. the same level D. None of the above. notation. data, 30. When the majority of the Internet has moved to the IPv6 but some still use IPv4, which transition strategy should be used? A. Tunneling. B. Header translation. C. Either tunneling or header translation. D. None of the above. (© Hak Cipta Universiti Teknolog! MARA, CONFIDENTIAL CONFIDENTIAL, 7 CSIJAN 2018/ITT542 PART B (70 MARKS) QUESTION 1 Describe the THREE (3) different levels of addresses that are used in an internet using the TCPIIP protocols. (3 marks) QUESTION 2 a) Stark (M) Corp has been assigned with the network address of 144.120.0.0, The corporation is in need of 60 physical segments with at least 600 hosts per physical ‘segment. As the company’s network administrator, find the following: ‘Stark (M) Cor ‘The Proposed Subnet Mask: Number of Subnets Supported: ‘Maximum Number of Host ID per Subnet: ‘The First Subnet address: The Last Subnet address: The Second Subnet address: First useable host address: Last useable host address: Broadcast address: @ marks) b) Compare error control and congestion control in terms of its mechanisms. (2 marks) (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL, 8 CSIJAN 2018/ITT542 QUESTION 3 ‘An IP datagram has arrived with the following information in the header (in hexadecimal), 49 00 05 DC 26 2E 20 B7 10 11 8D 57 CO 0A OC 0B 00 00 00 Co a) Justify if the packet is the first, middle, last fragment or the original fragment and state the offset number of this fragment. (2 marks) b) Calculate the size of data this packet is carrying. (2 marks) ©) State the checksum value contained in this datagram, (1 mark) 4) Calculate how far the packet is allowed to travel to from this point before it is being dropped, (2 marks) e) This IP packet is then entering a network with MTU of 440 bytes, find the value of the following fields for each of the resulting fragments. Assume that the fragments (all but the last one) have the maximum possible size. i) Total length. ii) Data size. ill) More fragments flag. iv) Fragment offset. v) _ First byte. vi) Last byte. (12 marks) QUESTION 4 In a TCP connection, the value of cwnd is 5,000 and the value of rwnd is 6,500. The host has already sent bytes up to the 5800" byte and the previous ACK number received was 5600. a) Draw a diagram to illustrate the new situation of the window. (4 marks) b) The host has sent 2,500 bytes more and had received an ACK value of 5800 and an advertisement window of 6000 bytes. Draw the new window. (4 marks) (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL, CONFIDENTIAL, 9 CSIJAN 2018/ITT542 QUESTION 5 a) Distinguish between RIP and OSPF routing protocols in terms of type of routing protocol, convergence speed and metric. Point of comparison RIP ‘OSPF Type of routing protocol Convergence speed Metric (marks) b) A routing table has currently twenty-five (25) entries. It does not receive information from a group of twelve (12) routes for 190 seconds, however 100 seconds after that, came updates of six (6) routes from the non-responding group. i) List the number of periodic, expiration and garbage collection timers running precisely on the 190” second and also on the 290" second. ii) Calculate the total amount of timers running at 190" second and 290" second. Timers as at 190" second Timers as at 290 second Periodic Periodic Expiration Expiration Garbage Garbage Collection | Collection Total Total (marks) QUESTION 6 a) Analyze the flag 0x8F80. (3 marks) b) ADNS client is looking for the IP address of Coufefe.corp.com. Show the query message with value for each field. Assume the message is of no error, with recursion desired and identifier 4779. (6 marks) QUESTION 7 a) Represent the shortest form of the following IPv6 addresses. i) 2243:12AB:111A:ABC0:0000:0000:0000:0000 ii) 0000:00AA:0000:0000:0000:0000:1238:A123 iii) 0000:0000:0000:ABCD:0000:0000:0000:0000 (3 marks) (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL 10 CSIJAN 2018/TT542 b) List THREE (3) types of IPv6 addresses, (3 marks) ¢) List THREE (3) strategies used to handle the transition from IPv4 to IPV6. (3 marks) END OF QUESTION PAPER ‘© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL,

You might also like