The document is a midterm exam for a computer networks course consisting of multiple choice and diagram questions. Question 1 has 20 multiple choice questions about topics like fiber optic cable characteristics, OSI model layers, Ethernet addressing, and network protocols. Question 2 asks the student to draw a diagram of a bridged network with spanning trees and identify forwarding and blocking ports.
The document is a midterm exam for a computer networks course consisting of multiple choice and diagram questions. Question 1 has 20 multiple choice questions about topics like fiber optic cable characteristics, OSI model layers, Ethernet addressing, and network protocols. Question 2 asks the student to draw a diagram of a bridged network with spanning trees and identify forwarding and blocking ports.
Department: Basic Engineering Level : 100 Mid Term Exam 2018/2019 Time: 60 Minute Total Mark 25 student name :………………….……
Question (1): Choose the correct answer (20 Marks)
1. What are two characteristics of fiber-optic cable? (Choose two.) A. It is not affected by EMI or RFI. B. Each pair of cables is wrapped in metallic foil. C. It combines the technique of cancellation, shielding, and twisting to protect data. D. It typically contains 4 pairs of fiber-optic wires. E. It is more expensive than UTP cabling is. 2. What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.) A. error correction through a collision detection method B. session control using port numbers C. data link layer addressing D. placement and removal of frames from the media E. detection of errors through CRC calculations F. delimiting groups of bits into frames 3. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A? A. DD:DD:DD:DD:DD:DD B. 172.168.10.99 C. CC:CC:CC:CC:CC:CC D. 172.168.10.65 E. BB:BB:BB:BB:BB:BB F. AA:AA:AA:AA:AA:AA 4. Which procedure is used to reduce the effect of crosstalk in copper cables? A. requiring proper grounding connections B. twisting opposing circuit wire pairs together C. wrapping the bundle of wires with metallic shielding D. designing a cable infrastructure to avoid crosstalk interference E. avoiding sharp bends during installation 5. Which address on a PC does not change, even if the PC is moved to a different network?? A. IP address B. Port Address C. default gateway address D. MAC address 6. What is one difference between the client-server and peer-to-peer network models? A. Only in the client-server model can file transfers occur B. Every device in a peer-to-peer network can function as a client or a server C. A peer-to-peer network transfers data faster than a transfer using a client- server network D. A data transfer that uses a device serving in a client role requires that a dedicated server be present 7. What is the protocol that is used to discover a physical address from a known logical address and what message type does it use? A. ARP, multicast B. DNS, unicast C. ARP, broadcast D. PING, broadcast 8. What is an important function of the physical layer of the OSI model? A. It accepts frames from the physical media B. It encapsulates upper layer data into frames C. It defines the media access method performed by the hardware interface D. It encodes frames into electrical, optical, or radio wave signals 9. Refer to the exhibit. Host A is attempting to contact Server B. Which two statements correctly describe the addressing that Host A will generate in the process? (Choose two.) A. A packet with the destination IP address of Router B B. A frame with the destination MAC address of Switch A C. A packet with the destination IP address of Router A D. A frame with the destination MAC address of Router A E. A packet with the destination IP address of Server B F. A frame with the destination MAC address of Server B 10. What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address? A. It will discard the frame. B. It will forward the frame to the next host. C. It will remove the frame from the media. D. It will strip off the data-link frame to check the destination IP address 11. What information is added during encapsulation at OSI Layer 3? A. source and destination MAC B. source and destination application protocol C. source and destination port number D. source and destination IP address 12. A television broadcast is an example of _______ transmission? A. Simplex B. Half Duplex C. Full Duplex D. Dual Duplex 13. In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.)? A. when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated B. When a faster delivery mechanism is needed C. when delivery overhead is not an issue D. when applications do not need to guarantee delivery of the data E. when destination port numbers are dynamic 14. A computer in a given network is communicating with a specific group of computers. What type of communication is this? A. Broadcast B. Unicast C. Multicast D. Any Cast 15. A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol that is used to prepare the request for transmission? A. HTTP, IP, TCP, Ethernet B. HTTP, TCP, IP, Ethernet C. Ethernet, TCP, IP, HTTP D. Ethernet, IP, TCP, HTTP 16. In the OSI model, as a data packet moves from the lower to the upper layers, headers are…. A. Added B. Removed C. Rearranged D. Modified 17. In the OSI model, encryption and decryption are functions of the ________ layer A. Application B. Presentation C. Session D. Transport Suez Canal University Subject : Computer Network The Faculty of Engineering Code : ELC 104 Department: Basic Engineering Level : 100 Mid Term Exam 2018/2019 Time: 60 Minute Total Mark 25 student name :………………….…… 18. When a beam of light travels through media of two different densities, if the angle of incidence is greater than the critical angle, _______ occurs A. Reflection B. Refraction C. Incidence D. Criticism 19. Signals with a frequency below 2 MHz use _______ propagation A. Ground B. Sky C. Line of Sight D. None of the above 20. Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port? A. just PC0 and PC1 MAC addresses B. just the PC0 MAC address C. just the PC1 MAC address D. PC0, PC1, and PC2 MAC addresses in order 21. Membership in a VLAN can be based on ________. A. interface numbers B. MAC Address C. IP Address D. ALL above is correct 22. In a fully connected mesh topology with six computers, we need ________ links A. 6 B. 15 C. 30 D. 5 Second Question (10 Marks) 1) create a system of three LANs with four bridges. The bridges (B1 to B4) connect the LANs as follow: • B1 connects LAN1 and LAN2. • B2 connects LAN1 and LAN3. • B3 connects LAN2 and LAN3. • B4 connects LAN1, LAN2, and LAN3. Choose B1 as the root bridge. Show the forwarding and blocking ports, after applying the spanning tree 2) In the next figure, assume that the communication between the process with port address (I)which running at device (M) and the process with port address (J) which running at device (R). Show the content of packets and frames at the Network, Data link, and Transport Layers for each hop.
N/34 R1 O/40 P/45 R2 Q/50
M/30
LAN 1 LAN2 LAN3
R/55 LAN 1 LAN 2 LAN 3 R1 R2
Transport layer
I J Data I J Data I J Data
Network layer Data M R I J Data M R I J Data M R I J Data Data Link layer 34 30 M R I J Data T2 45 40 M R I J Data T2 55 50 M R I J Data T2