0% found this document useful (0 votes)
38 views4 pages

Jan 2018

Uploaded by

Zahir Sher
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
38 views4 pages

Jan 2018

Uploaded by

Zahir Sher
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
KOLEJ UNIVERSITI TUNKU ABDUL RAHMAN FACULTY OF COMPUTING AND INFORMATION TECHNOLOGY ACADEMIC YEAR 2017/2018 JANUARY/FEBRUARY EXAMINATION INFORMATION TECHNOLOGY BAIT2004 FUNDAMENTALS OF COMPUTER NETWORKS, TUESDAY, 30 JANUARY 2018 TIME: 2.00 PM — 4.00 PM (2 HOURS) BACHELOR OF COMPUTER SCIENCE (HONOURS) IN INTERACTIVE SOFTWARE TECHNOLOGY BACHELOR OF INFORMATION SYSTEMS (HONOURS) IN ENTERPRISE INFORMATION SYSTEMS BACHELOR OF INFORMATION TECHNOLOGY (HONOURS) IN INFORMATION SECURITY BACHELOR OF INFORMATION TECHNOLOGY (HONOURS) IN INTERNET TECHNOLOGY BACHELOR OF INFORMATION TECHNOLOGY (HONOURS) IN SOFTWARE SYSTEMS, DEVELOPMENT Instructions to Candidates: Answer ALL questions. All questions carry equal marks, This question paper consists of 4 questions on 4 printed pages. 2 ‘BAIT2004 FUNDAMENTALS OF COMPUTER NETWORKS Question 1 ”) ») °) Ethernet is now the predominant Local Area Network (LAN) technology in the world. Ethernet operates in the data link layer and the physical layer. It relies on the two separate sublayers to operate the date link layer. () Identify the TWO 2) Ethernet IEFE Networking Standards used for the two sublayers in the data link layer. 2 marks) Based on the answer given in Question 1 a) (i), list these two sublayers. (2 marks) ‘Compare and contrast THREE (3) characteristics of these two sublayers. (12 marks) List the fields’ names of an Ethernet frame with minimum length. State the reason for having, a minimum length requirement for a frame in Ethernet. (5 marks) With reference to Figure 1-1 label ‘I” and label ‘2°, describe the types of unshielded twisted pair (UTP) cables used to connect the networking devices. (4 marks) R2 RL 281i Pal 2950 Figure 1-1: A network topology (Total: 25 marks] ») Differentiate between Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) according to the aspects listed below: @ Speed of transfer (2 marks) Gi) Reliability (2 marks) Gi) Ordering of data packets (2 marks) (iv) Header size (2 marks) (v) Data flow control (2 marks) (vi) Name of Protocol Data Unit (PDU) (2 marks) Provide TWO (2) applications that are supported by the TCP and UDP. (4 marks) This question paper consists of 4 questions on 4 printed pages. BAIT2004 F 3 DAMENTALS OF COMPUTER NETWORKS Question 2 (Continued) °) 4) a) » a) List and explain the THREE (3) flags used in the TCP header during three-way handshake, (6 marks) State the protocol name for the following well-known port numbers: (Port number 80 (1 mark) (ii) Port numbers 67 and 68 (1 mark) (iii) Port number 53 (1 mark) (Total: 25 marks} m3 Explain the following network applications: (Email (2 marks) File Transfer Protocol (FTP) (2 marks) Define fragmentation and justify why the Intemet Protocol version 4 (IPv4) and Internet Protocol version 6 ([Pv6) protocols need to fragment some packets. (6 marks) Name the layer and explain the function for each of the following addresses in the Transmission Control Protocol and Internet Protocol (TCP/IP) layered architecture. (Internet Protocol (IP) address (3 marks) Media Access Control (MAC) address 3 marks) (iii) Port number G marks) Determine the number of usable IP addresses of the following subnet masks. (i) 255.255.240.0 G marks) (ii) 255.255.255.0 (3 marks) (Total: 25 marks) This question paper consists of 4 questions on 4 printed pages. 4 BALT2004 FUNDAMENTALS OF COMPUTER NETWORKS Question 4 a) b) °) You have been given the network address 172.58.0.0/16 to create 51 subnets, Answer the following questions: (i) What is the address class? (1 mark) (i) How many bits are required to borrow in order to create $1 subnets? (mark) How many subnets are created? (1 mark) (iv) What is the total hosts per subnet? (1 mark) (v) How many usable hosts addresses per subnet? (1 mark) (vi) Compute and write the decimal value of the custom subnet mask. (2 marks) (vii) Compute and list the first four subnets information in the format given in Table 4-1. ‘Write your answer in dotted decimal format. (8 marks) Subnet | Subnet Address/ | First Usable Last Usable Subnet Number | Prefix Length | Host Host Broadcast Address Subnet 0 Subnet | Subnet 2 ‘Subnet 3 Table 4-1 Device can be assigned with an IP address either statically or dynamically, In what situation a static IP address is required for a device? Justify your answer with an exemple, (6 marks) ‘Write the string of hexadecimal values (128 bits in length) for each of the following Internet Protocol version 6 (IPV6) addresses in preferred format: @—— 2001:A10:C5::A0:BA0 (2 marks) Gi) 2001::1:2536:0 2 marks) (Total: 25 marks} paper consists of 4 questions on 4 printed pages.

You might also like