Past Paper Networking
Past Paper Networking
CHAPTER XI
SECTION VIII | PAST PAPER
AL 2021
1. Which of the following is/are correct with respect to guided media used for data transmission?
A. Denoted by a square wave.
B. Contains a continuous range of values.
C. Uses discrete values to represent information.
2. Which of the following is/are correct with respect to guided media used for data transmission?
A. A physical path is used for data transmission.
B. Signal is broadcast through air.
C. Example: Radio waves.
What is the protocol that the writer in above sentence is referring to?
5. Given below are some characteristics of Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP):
A. Best suited for applications that need high reliability and where the transmission time is
less critical.
B. Faster and requires fewer resources.
C. Guarantees that no packets are missing.
D. Packets may not arrive in order.
E. Used for voice communications over internet.
6. Which of the following is/are examples for the use of the Client-Server model?
A. A user orienting a document using a printer connected to her computer.
B. A bank customer accessing online banking services with a web browser.
C. A cashier of a shop that accepts payments by credit cards.
When there are multiple computers in an office, each computer can be given a private IP
address. The router in the office gets a ….A…. IP address, and each of the computers
connected to that router through guided/ unguided media gets a private IP address from the
….B…. via the ….C…. protocol.
1) A – Private, B – File server, C – HTTP
2) A – Private, B – Internet, C – DHCP
3) A – Private, B – Router, C – FTP
4) A – Public, B – File server, C – FTP
5) A – Public, B – Router, C – DHCP
9.
a. Parity Check is a simple technique to detect errors on data communication.
Assume the seven bits 1010110 need to be transmitted. Explain how the odd parity check
can be performed to detect any error in its transmission.
b. The ABC Company has two main divisions, namely Production and Marketing. Under the
Production division, there are three units, namely Stores, Supplies and Operations
having 12 and 18 computers, respectively. Marketing division has 40 computers. ABC
Company has been given the 192.174.19.0/25 IP address block. All the computers of the
ABC Company are to be assigned IP addresses after making the subnets from this address
block.
The following incomplete table shows the sub netting. Copy it to your answer sheet and fill
the empty entries.
Marketing 192.174.19.0 64
Stores 192.174.19.79 16
Supplies 192.174.19.96 16
Operations 192.174.19.159 32
Mohan wants to start an Internet Browsing Center with the above equipment and seeks
your advice for it, He informs you that he is not in a position to invest money for any new
equipment.
II. Draw the logical arrangement of the network that you propose.
III. Mohan would like to improve the connection speed to the clients while saving the
existing bandwidth of the Internet connection. Further he needs to have the
control of the Internet access while ensuring the privacy of the client. What is the
technical suggestion you would give for this?
IV. There is a need to protect this private network by filtering the communication
traffic and blocking outsiders from gaining unauthorized access. What mechanism
will you suggest to achieve this?
V. Include the solutions that you proposed for (III) and (IV) above in the logical
network arrangement that you drew for (II).
10. Which of the following statement regarding guided and unguided media are correct?
A – Guided media transmission support higher data speed than unguided media transmission
B – Guided media is subjected to less interference than unguided media.
C – Unguided media transmission is more secure than guided media transmission
D- Unguided Media transmission uses low bandwidth than guided media transmission
i. A, B and C only iii. A, C and D only v. All above
ii. A, B and D only iv. B, C and D only
11. What is the process carried out in the modulation technique in data transmission?
i. Encoding information in transmitted signal
ii. Encoding signals in transmitted information
iii. Extracting signal from the transmitted information
iv. Transfer information with minimum distortion
12. Which of the following statement about bus topology are incorrect?
A- Computers and network devices are connected to a single cable
B- All traffic flows are either clockwise or anti clockwise
C- Each node is connected to two of its neighbors
i. A and B only iii. B and C only v. C and D only
ii. A and D only iv. B and D only
14. You are requested to create 16 subnets with a class C IP. Which subnet mask is suitable to
create the subnet?
i. 255.255.255.240 iii. 255.255.255.250 v. 255.2552.55.224
ii. 255.255.255.248 iv. 255.255.255.252
The PQR Company has three departments namely, Finance, Marketing and Human Resource
(HR).
At Present all the activities of the PQR Company are conducted manually. The Company
decided to computerize all their activities by establishing an IT Unit with a computer lab for
staff training.
Resources will be allocated for each department and the IT unit as follows.
Resource
Department
Computers Printer Type Software Server
a) Which network topology is the most suitable to satisfy all the above-mentioned
requirements? Give on reason to justify your answer
b) The Network administrator has received 192.168.14.0/24 as the IP address block for the
company
The IP address for the nodes is to be allocated after making four subnets from this address
block for each department/Unit.
The following incomplete table shows the sub-netting. Write down the missing IP address for each
department/Unit using the following table format. (Assume that subnetting is done under
consideration of future expansion of each department/Unit.)
255.255.255.192
FINANCE
192.168.14.63 192.168.14.1 -
192.168.14.0
192.168.14.62
255.255.255.192
192.168.14.127 192.168.14.65
192.168.14.64
-192.168.14.12
HR
6
255.255.255.192
192.168.14.128 192.168.14.191
IT UNIT
192.168.14.129
255.255.255.192 -192.168.14.19
0
MARKETING
192.168.14.192 192.168.14.255 255.255.255.192
192.168.14.193
c) Showing clearly the connection topology and the devices, Draw the logical arrangement for
The company network that the network administrator can implement to fulfill the
company’s requirement (Assume that additional IP address can be obtained)
c. The principal has received the 192.248.16.0/24 IP address block for the school. The IP
addresses for the computer are to be allocated after making three subnets from this
address block for the three buildings
Assume such subnetting is done; write down the relevant network address, subnet mask
and the allocated range of IP address using the following table format to present your
answer
d. Give one reason as to why a fully connected network topology is not suitable for this
school computer network
e. The lab administrator who is responsible to setup the school computer network has
requested for switches and a router.
Showing clearly the network connection topology and the devices, draw the network
diagram to represent the logical arrangement for the school computer network that the
lab administrator can implement to fulfill the school requirement.
f. Give one reason as to why TCP Is preferred over UDP as the transport protocol for the
school computer network.
20. In the OSI reference model, the network layer is responsible for …………………………
communication.
Which of the following is suitable to fill the blank in the above statements?
a. Node to Node
b. Switch to Router
c. Source to Destination
d. Process to Process
e. Hop to Hop
21. Which of the following network classes does the IP address 192.248.254.1belongs?
a. A b. B c. C d. D e. E
22. In the OSI reference model, a protocol data unit of the network layer is referred to as a
……………………
a. Frame c. Window e. Packet
b. Segment d. Message
(a) The XYZ Company has six departments namely Production, Accounts, Sales, Administration,
Maintenance and IT Service. The following table shows the number of computers available
in each of the departments.
D01 Production 25
D02 Accounts 30
D03 Sales 18
D04 Administration 30
D05 Maintenance 25
D06 IT Service 28
Each Department needs to have their own local area network. Network administrator has received
a class C IP address block 192.248.154.0/24. It is required to subnet the IP address block to satisfy
the requirements of each department and allocate IP address to them.
i. How many addresses are available in the IP address Block?
ii. What are the first and last addresses of the IP address Block
iii. How Many Host Bits are required to create the required subnets?
iv. After subnetting, write the relevant Network Address, Subnet Mask and Allocated range
of IP for each department
D01
D02
D03
D04
D05
D06
(b) The XYZ Company links the five departments and connects those departments to the
internet through the IT Service Department. The network has been completed by laying the
cables and installing six switches, a router and a firewall. All six departments are situated in
six separate buildings.
The Administrator allows all subnets to access the Internet through a proxy server. The
proxy server and the DNS server are located in the IT Service Department, Draw a Labelled
Network Diagram.
(c) After setting up the network any employee of any department was able to access the URL
http://www.nie.lk through a web browser in a computer. However, one day an employee
finds that he cannot access the website from computer in his department
Write three possible reasons for the above problem.
24. In electronic mail systems, the protocol used by the mail clients to retrieve message from the
mail server is
a. SMTP
b. FTP
c. ICMP – Internet control Message Protocol
d. IMAP – Internet Message Access Protocol
e. Telnet
25. The Transport layer protocol User Datagram Protocol (UDP) can be used for
a. Reliable communication
b. Guaranteed Delivery
c. Connection Oriented Communication
d. Ordered Delivery
e. Exchanging state information among routers
27. The first and the Last IP address of a subnet are 192.192.48.0 and 192.192.63.255 respectively.
Which of the followings is the subnet mask of this subnet?
a. 255.255.255.0
b. 255.255.192.0
c. 255.255.255.192
d. 255.255.240.0
e. 255.240.0.0
28. 172.168.48.200/24 is a
a. host address in a class B network
b. network address of a class C network
c. host address in 172.16.48.0/24 subnet
d. Network address of a subnet with 255 hosts
e. Host address with 8 network bits
29. In TCP/IP computer networks, Transport Protocol Data Unit (PDU) is referred to as a
a. Packet
b. Frame
c. Segment
d. Window
e. Message
123.45.67.3/27
123.45.67.2/27
NA 10.0.0.0/10
Part B
30. A “DEMILITARIZED ZONE - DMZ” is a subnet that contains and exposes an organization’s
external facing services such as web servers (Public IP addresses) to the Internet while hiding
away the rest of the network behind a firewall (Using Local IP Addresses)
A network with a DMZ belonging to an organization has been assigned the public IP address
NA 10.192.0.0/10 range 123.45.67.0 with subnet mask 255.255.255.224. The DMZ contains the web server and
the mail server. It has 4 additional subnets for internal use having the private IP address range
NA 10.64.0.0/10 NA 10.128.0.0/10 10.0.0.0 with the subnet mask 255.0.0.0. Computers in each subnet can access resources in all
other subnets. The organization decided to connect the 4 subnets to the Internet through a
proxy server. There is also an application server for its internal clients.
Identify the devices required to establish this network and draw a network diagram to show
the logical arrangement of the organization’s computer network.
Show all the elements of the network with appropriate IP addresses. Clearly show all
calculations stating assumptions you made.
Further, it is also required to explain the changes done to an IP packet released by a computer
to a subnet by the proxy server when it travels to the Internet.
31. “An analog signal is sampled at regular intervals and represented as 16 bits values”
Which of the following is best described by the above statement?
a. Amplitude Modulation AM d. Phase Modulation PM
b. Frequency Modulation FM e. Pulse width Modulation PWM
c. Pulse code Modulation PCM
32. Two Machines with the IP addresses 192.248.16.30 and 192.248.16.90 are connected to a local
area network (LAN). Which of the following is a suitable subnet mask for this network?
a. 192.255.255.255. c. 255.255.255.224 e. 255.255.255.255
b. 192.248.16.0 d. 255.255.255.128
33. In a public Key Cryptographic System, the private Key of a person X is given by the function
Private(X) and the public key is given by the function Pub(X)
Consider the following Statements:
a. Private(X) and Pub(X) should be the same for better security
b. A Message encrypted using Pub(X) can be Decrypted using Pub(X)
c. The Person X knows both Private(X) and Pub(X)
Which of the above statements is/are correct?
34. LAN has 500 network Devices. What is the most appropriate subnet mask for this computer
network?
a. 255.255.255.0 c. 255.255.255.192 e. 255.255.254.0
b. 255.255.255.128 d. 355.255.255.254
Part B
35. There are two Local Area Networks (LANs) L1 and L2 which are connected only by a router R.
These LANs are not connected to any other networks. Machines P and Q are connected to
LANs L1 and L2 respectively. The machine P has successfully delivered an IP packet IP1 to
machine Q.
In a LAN, an IP packet is sent from the source device to the destination device by inserting it
into a frame, generated in the data link layer at the source device. In that LAN, source and
destination devices are uniquely identified by the MAC addresses in that frame.
An IP address is recognized by the network layer but it is not recognized by the data link layer.
(a) Draw a network diagram to depict the network described above using commonly used
symbols and notations.
(b) State whether the destination IP address of the packet IP1 is the IP address of Q or R when
it is going through LAN Ll. Justify your answer.
(c) Assume that the IP packet ·1Pl was in a frame F2 in LAN L2. State whether the source MAC
address of frame F2 is the MAC address of P or R. Justify your answer.
37. A company in a network is configured with the IP address 192.248.16.91 and the subnet mask
255.255.255.128
Which of the following IP address cannot be assigned to a computer in the same network?
a. 192.248.16.161 c. 192.248.16.110 e. 192.248.16.120
38. Which of the following statements is correct with respect to the Transmission Control Protocol
(TCP)?
A Network has been assigned a. TCP is a network layer protocol
with a Subnet Mask of 255.255.248.0 b. TCP guarantees that each byte sent is received at the receiver
c. Only one application at a time can use TCP in a computer
d. HTTP uses TCP
e. TCP uses UDP as the Transport Protocol
Find out How many Host per Subnet
can be allocated for the above network 39. A LAN uses the subnet Mask 255.255.240.0. How many different IP address can be assigned to
devices in this LAN?
a. 254 b. 256 c. 1024 d. 2046 e. 4094
40. Which of the following statements is correct with respect to routing in the Internet?
a. There can be at most one router in any given LAN
b. A router can have more than one network interface
c. Routing is a functionality of the transport layer
d. All routers function as HTTP proxies
41. In a public Key Cryptographic System, the private Key of a person X is given by the function
Private(X) and the public key is given by the function Pub(X).
a. Pub(x) is used to encrypt a message that can only be decrypted using priv(x)
b. Pub(x) is used to sign a message to be sent to x
c. A message encrypted using pub(x) can be destroyed using pub(x)
Which of the above statements is/are correct?
1. A only 3. C only 5. B and C
2. B only 4. A and B
42. Consider the following statements regarding a server with the domain name www.bogus.lk.
A : The server www.bogus.lk can be located anywhere in the world
B : www.bogus.lk must be a web server
C : The domain names www.bogus.lk and www.bogus.com can be resolved to the same IP
address.
Which of the above statements is/are correct?
a. A only c. C only e. A and C
b. B only d. A and B