Review Questions
Review Questions
2. To find the route, i.e. the sequence of routers, from s source to a specified destination host,
the following utility command can be used:
a ping .
b. tracert (or traceroute in Unix).
c .netstat .
d .ipconfig.
e. all of the above.
3. The source address in the base header always contains the address of the ________.
a. original sender .
b. last router.
c. next router.
d. any of the above.
e. none of the above.
5. Management wants to compare the transmission times for two different routes. What
extension header must be used?
a. source routing.
b. authentication .
c. fragmentation.
d. destination option.
e.. non of the above.
7. TCP is:-
a. a network layer protocol..
b. a transport layer protocol..
c. A type of device driver.
d. a message oriented protocol
e. an error correcting mechanism for IP networks.
8. What symbol is used to separate a computer name from the port number in a URL?
a. ;
[2]
b. :
c. .
d. #
e. none of the above.
11. A primary disadvantage of using RIP as an interior routing protocol for larger organizational
networks is that BGP
a. can only accommodate a maximum of 15 hops between source and destination.
b. relies on class-based network masks, even in version 2.
c. does not have a long history as a stable protocol.
d. is not as popular as OSPF.
e. all are above are correct.
12. The following is true about IP version 6 protocol.
a. the base header is 8 bytes long.
b. the extension headers form part of the base header.
c. the Fragmentation is carried out by the destination host.
d. none of the above.
e. both a and b are correct .
13. Assuming the FTP is running in stand-alone mode, which file lists accounts that are not
allowed to access it?
a. /etc/ftpusers.
b. /etc/hosts.deny.
c. /etc/shutdown.msg.
d. /var/ftp/pub/ftpusers.
e. /etc/ftp/intruders.
14 The class of an IP address can be determined from ………. and determines the
…………………….
a. the first 3 quads ------network part.
b. the number of netmask bits ------ network address.
c. the routing table ----- destination IP address.
d. the first 4 bits -------- number of hosts in the network.
e. the host bits -------- netmask.
15. Flooding is an attractive routing scheme for some network environments because of its:
a. simplicity
b. robustness
c. low delay for packet delivery
d. all of the above
e. none of the above
[3]
SECTION B: [Answer any two questions from this section]
(a). An extension (Network 4) to the following local network will be made using the IP range
220.2.1.128/25 as shown using dashed lines in figure 1 below. The existing routing table entries
are partially given below. Complete the routing tables according to your assignments to the
new network. Try to avoid causing minimum disturbance to the existing network.
[8 marks]
Network 1 Network 4
220.2.0/24 G1
Network 3
Network 2 220.2.1.0/25
G2
220.2.3.0/24
Figure 1
(c). List and discuss any three major differences between IP version 4 and IP version 6 protocols.
[5 marks]
(
(a). A UDP user datagram is to carry a message from a TFTP client to a TFTP server.
8 bytes
header data
Figure 2
Show the entries for this header. Fill the checksum field with zeroes. Choose an appropriate
ephemeral port number and the correct well-known port number. Keep the length of data at
40 bytes.
[5 marks]
[4]
(b). Show the entries for the header of a TCP segment that carries a message from an FTP client
to an FTP server. Fill the checksum field with zeroes.
Header data
(n bits) (n- bits)
HLEN reserved
URG
ACK
RST
PSH
SYN
FIN
4-bits 6 bits
Figure 3
Choose an appropriate ephemeral port number and the correct well-known port number. The
length of the data is 40 bytes. You may use the format shown above.
[5 marks]
0 16 31
Version Prio Flow Label
Payload Length Next Header Hop Limit
Source Address
128 bits
40 bytes
Destination Address
128 bits
Figure 4
. What is the purpose of the version, flow label and Payload length fields?
[ 3 marks]
QUESTION 4
(a). The school of Electrical, Electronic and Computer Engineering is allocated the block
146.230.50.0/26 containing 64 IP addresses. The school has four office sites and needs to
divide the addresses into four equal sub blocks of 16, 16,16 and 16.
[5]
(i). Sketch the resultant network (remember it will comprise three subnets) and the
subnet/net masks for each.
[6 marks]
(b). The diagram below illustrates the basic packet format for the Transmission Control Protocol
(TCP).
Header data
(n bits) (n- bits)
Using your knowledge of TCP and the diagram, identify any two of the transport-level
mechanisms that are present in this reliable byte stream protocol, providing a brief description
of what they are and how they work.
(c). A student tries to fetch a webpage from a non-existent URL www.southafrica.com. The
university’s DNS systems support both recursive and iterative querying. With the aid of well
detailed/annotated block diagrams explain the following:
QUESTION
a. A network is using a virtual circuit packet switching mode to transmit data from a
source (X) to a destination (Y). In a given instance of data transmission, a message
of size 80 M bits is to be transmitted from X to Y. The identified virtual circuit
network path comprises 3 intermediate nodes, a, b, and c equally spaced apart
equally by 5 km links. The link speed is r = 2kbps . The speed of propagation of
additional 0.5 Mbits header that contains the necessary control information. By
[6]
ignoring path clearing time, determine the time of transmission of the message sent
from X to Y in each of the following cases:
i. The entire message is sent as a single packet
QUESTION
a. Using the design steps outlined in the recommended textbook, design
a 800 x 800 three-stage non-blocking switching fabric (network).
[7]
N
How many crosspoints does the network contain? Note that n= .
2
Note that you are not required to sketch the entire switch as such.
[8]
b. You are to design multiplexing system to simultaneously transmit 3
standard voice channels (each of bandwidth), 0.3 to 3.4 kHz ) between two
points A and B.
(i) Determine the overall bandwidth required if frequency division
multiple access (FDMA) is the multiplexing choice. Do explain and
justify any assumptions you made.
QUESTION 1
[20 marks]
1.1. Describe how an optical fibre transmission medium is able to transmit a
signal from point A to B.
[6 marks]
1.2. Coaxial cable is a two-wire transmission system. State its 2 advantages over a
simple symmetrical cable pair system (UTP)?
[4 marks]
1.3 A generic IP datagram header structure is shown I the figure below:
[10]
i. Explain how a packet whose TTL (time-to-live) packet is set to zero (TTL=0)
will be handled by the network.
ii. Explain how a packet whose TTL Fag’s field is set to “”0”” would be handled by
a router at the entry of a network whose MTU value is smaller than that of
the sending network?
iii. What is the significance or rather the difference between the HLEN versus
Total Length fields?
QUESTION2
2.1. Design a three stage non-blocking circuit switched network switch with 32
inputs by 32 outputs ports. Provide full schematic (block diagram) clearly showing (a), the
size of each switch array at each switching stage and (b) the total number of crosspoints.
[ 10 marks],
2.1. In the figure below, a data frame of size 10 million bits is to be exchanged
between the source s and destination switches (see figure1 below)
Figure 5
[11]
The following network specification apply:
• each link’s length is as indicated on the figure (in meters).
• the speed of propagation in the link is 2 108 m / s .
• each switch (including the source/destination) has a queuing delay of 2 s and a
processing time of 1s
• each link has a 5Mbps speed .
• setup time is 4 s .
Calculate the total delay Tdelay in transmitting the data frame for the following network
i. circuit switching
ii. Datagram switching
iii. Virtual Circuit switching
QUESTION
3.1. List down any three services (function) provided by the link layer
3.2. An organization’s subnet is granted the block 130.56.0.0/24.
3.3. Discuss the three methods of saving IP version 4 address space [5 marks]
[12]
An organization is granted a block of addresses with the beginning address 14.24.74.0/24.
The organization needs to have 3 subblocks of addresses to use in its three subnets: one
subblock of 10 addresses, one subblock of 60 addresses, and one subblock of 120
addresses. Design the subblocks.
Solution
There are 232– 24 = 256 addresses in this block. The first address is 14.24.74.0/24; the
last address is 14.24.74.255/24. To satisfy the third requirement, we assign addresses to
subblocks, starting with the largest and ending with the smallest one.
a. The number of addresses in the largest subblock, which requires 120 addresses, is not a
power of 2. We allocate 128 addresses. The subnet mask for this subnet can be found as n1
= 32 − log2 128 = 25. The first address in this block is 14.24.74.0/25; the last address is
14.24.74.127/25.
b. The number of addresses in the second largest subblock, which requires 60 addresses, is
not a power of 2 either. We allocate 64 addresses. The subnet mask for this subnet can be
found as n2 = 32 − log2 64 = 26. The first address in this block is 14.24.74.128/26; the last
address is 14.24.74.191/26
The number of addresses in the largest subblock, which requires 120 addresses, is not a
power of 2. We allocate 128 addresses. The subnet mask for this subnet can be found as n1
= 32 − log2 128 = 25. The first address in this block is 14.24.74.0/25; the last address is
14.24.74.127/25
If we add all addresses in the previous subblocks, the result is 208 addresses, which means
48 addresses are left in reserve. The first address in this range is 14.24.74.208. The last
address is 14.24.74.255. We don’t know about the prefix length yet. Figure 18.23 shows the
configuration of blocks. We have shown the first address in each block
[13]
.
15. Explain the role of each of the IP v4 header fields shown in the figure below.
Explain, which of them are likely to change as the packet traverses one router to another.
16. An IP datagram has arrived with the following partial information in the
header (in hexadecimal):
[14]
d. Is the packet fragmented?
e. How many more routers can the packet travel to?
f. What is the protocol number of the payload being carried by the packet?
[15]