0% found this document useful (0 votes)
6 views10 pages

Test 2

This document is a test paper for the Data Networks course, consisting of various types of questions including True/False, multiple choice, and structured questions. The test is closed-book and lasts for 90 minutes, with a total of 70 marks available. It covers topics such as networking concepts, protocols, and subnetting.

Uploaded by

Bloma Matthews
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views10 pages

Test 2

This document is a test paper for the Data Networks course, consisting of various types of questions including True/False, multiple choice, and structured questions. The test is closed-book and lasts for 90 minutes, with a total of 70 marks available. It covers topics such as networking concepts, protocols, and subnetting.

Uploaded by

Bloma Matthews
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Faculty of Computing and Informatics

Department of Computer Science

Course Name: Data Networks (DTN611S) Date: 03 May 2024


Duration: 90 Minutes Marks: 70

TEST 2
Student No: ______________________________________________________

Surname & full name: ______________________________________________

Group Number: ___________________________________________________

Practical Lecturer: (tick √) Study Mode: (tick √)

□ Ndeshihafela Kakwambi □ Full-time □ Part-time


□ Peter Gallert
□ Lineekela Shishiveni

□ Jovita Mateus

□ Ben Mwashekuna

□ Taleni Andjamba

Test Instructions

1. This is a closed-book test


2. This test contains 9 pages excluding the front page.
3. Answer all questions neatly in the spaces provided.
4. Be led by the number of marks allocated.
5. Using electronic devices (e.g., cell phones) and other study materials is strictly
prohibited.
6. NUST examination rules and regulations apply.
7. Calculators are allowed.
QUESTION 1: TRUE /FALSE [10]
Circle True (T) or False (F)

1. A systems administrator is testing the connectivity between Host A and Host Z using the
ping command. Four (4) packets were echoed back from Host Z, which means that the
connectivity test was successful.

True / False

2. Maria wants to know the IP address of her laptop. She invokes the ipconfig /all command
which displays two distinct subnet IP addresses. Maria’s basic network settings are
misconfigured.

True / False

3. A network administrator is troubleshooting connectivity issues on a server. Using a tester,


the administrator notices that the signals generated by the server NIC are distorted and not
usable. The network administrator categorised this issue as a data link layer problem.

True / False

4. A guest is visiting NUST and connected their laptop to the network using a physical cable.
The ipconfig command was executed and shows that the laptop has the IP address
169.254.255.250. The laptop of the guest should have internet access__

True / False

5. In binary logic, the AND operation compares two input values and provides a single output
value. This process is used to provide the subnet address

True / False
6. Nomiseb is a NUST Computer Science student. He decided to experiment by installing a
second Network Interface Card (NIC) on his desktop computer at home. This means that
his desktop computer has more than one NIC and will have multiple Media Access Control
(MAC) addresses.

True / False

7. A PC technician is given an IP address 172.16.30.50 /22. He is expected to find the subnet


mask of the given IP address. The subnet mask for this network is 255.255.248.0.

True / False

8. A Network Administrator configures a router with five (5) interfaces. Each router interface
is configured with a different IP address from the same subnet ID. This configuration is
correct and the router can forward packets from the subnet.

True / False

9. John executes the command “arp -d” on his laptop to clear the entries in the ARP Table.
The “arp -d” command will delete all the static and dynamic entries in the laptop’s ARP
Table.

True / False

10. Paulina is sending an email to [email protected]. The email address is a user-friendly


address in communication networks.

True / False
QUESTION 2: MULTIPLE CHOICE QUESTIONS [10]
Circle the correct answer(s)

1. How many bits must be borrowed from the host portion of an address to
accommodate a router with five connected networks?
a. 2 bits
b. 3 bits
c. 4 bits
d. 5 bits

2. A host is transmitting a broadcast. Which host or hosts will receive it?


a. All hosts in the same subnet
b. A specially defined group of hosts
c. The closest neighbour on the same network
d. All hosts on the internet

3. Which protocol is used for error reporting?


a. Simple Network Messaging Protocol
b. Internet Control Messaging Protocol
c. PING Protocol
d. Address Resolution Protocol

4. Which command can be used to find the domain name associated with an IP
address?

a. nslookup
b. netstat
c. ping
d. arp

5. What is the default prefix subnet mask for IP address 105.16.3.200?


a. /32
b. /16
c. /8
d. /24

6. Which layers in the new TCP/IP model remained unchanged from the old
model?
a. Layers 2 and 3
b. Layers 1 and 2
c. Layers 5 and 4
d. Layers 3 and 5

7. The Media Access Control (MAC) Address is also referred to as?


a. Home Address
b. Component Address
c. Link-Layer Address
d. Device Address

8. Which option shows the proper notation for an IPv6 address?


a. 2001,0db8,3c55,0015,abcd,ff13
b. 2001-0db8-3c55-0015-abcd-ff13
c. 2001.0db8.3c55.0015.abcd.ff13
d. 2001:0db8:3c55:0015::abcd:ff13

9. What is latency in computer networking?


a. The time it takes for data to travel from source to destination
b. The amount of data that can be transmitted per unit time
c. The number of errors encountered during data transmission
d. The capacity of the network to handle simultaneous connections

10. Which of the following IP addresses is not a private IP Address?


a. 10.1.1.1
b. 172.16.4.4
c. 192.168.5.255
d. 230.6.6.6

QUESTION 3: RANDOM QUESTIONS [15]

1) List two (2) advantages and two (2) disadvantages of the Taking-turns Protocols. (4)
ADVANTAGES DISADVANTAGES
___________________________________________________________________________
Fairness Token Overhead
___________________________________________________________________________
Collision Avoidance Single point of failure
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

2) Explain what is meant by Ethernet is a “Plug and Play” technology. (2)


devices can automatically configure themselves,without requiring manual intervention
___________________________________________________________________________
automatically detects devices
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

3) At each layer of the OSI model, information that is transmitted is processed and
encapsulated into different units. Write down the names given to the unit of
information at each layer. (7)

Layers of the OSI Unit of information

Message
_________________________

Compressed data
_________________________

Synchronized data
_________________________

Segments
_________________________

Packets
_________________________

Frames
_________________________

Bits
_________________________

4) What does “PING” stand for? (2)


Packet Internet Groper
___________________________________________________________________________
QUESTION 4: WIRESHARK [10]

The below image shows the traffic captured between communicating devices.

Figure 1: Wireshark

Consider Figure 1 above and answer the following questions:

a) Identify the command that yielded the output in Figure 1. (1)

________________________________________________________________________

b) Determine which IP class the IP address 24.128.0.153 belongs to. (1)

CLASS A
________________________________________________________________________

c) Determine what type of IP address is 128.50.23.100 (2)

Public IP address
________________________________________________________________________

d) Indicate the MAC address of the Destination in the first entry in Figure 1 (No. 1). (2)

73:8d:ce
________________________________________________________________________

e) Explain what happened when the message “Time to Live exceeded in transit” was
reported to the source. (2)

________________________________________________________________________
QUESTION 5: SUBNETTING [10]

1. Given the IP address 192.168.181.182 /26, calculate the following:

a) The Network Number (2)


IP address-192.168.181.182/26
________________________________________________________________________
Subnet mask-255.255.255.192
________________________________________________________________________
________________________________________________________________________
11000000.10101000.10110101.10110110
________________________________________________________________________
11111111.11111111.11111111.11000000
AND ________________________________________________________________________
11000000. 10101000.10110101.10000000 NETWORK NUMBER
________________________________________________________________________
192.168.181.128

b) The Subnet Mask (2)


CIDR= 26
________________________________________________________________________
11111111.11111111.11111111.11000000
________________________________________________________________________
255.255.255.192
________________________________________________________________________

c) Number of hosts per subnet (2)


6 HOST BITS
________________________________________________________________________
2^6=64
________________________________________________________________________
64-2=62 HOSTS PER SUBNET
________________________________________________________________________

d) Broadcast Address (2)


NETWORK ADDRESS - 1
________________________________________________________________________
192.168.181.128 - 1 = 192.168.181.127
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

e) Wildcard Mask in binary. (2)


INVERSE OF SUBNET
________________________________________________________________________
00000000.00000000.00111111
________________________________________________________________________
________________________________________________________________________
QUESTION 6: STRUCTURED QUESTIONS [15]

1. Explain the significance of IPv6 adoption. (2)


vastly expanded address spaces, 128 bits long, thus supports more devices
________________________________________________________________________
________________________________________________________________________
offers improvements in efficiency and performance
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

2. Explain the difference between Error Detection and Error Correction services at
the Data Link Layer. What is the solution for each method to ensure that the sent
message is received by the destination? (2)

Error Detection Error Correction


________________________________________________________________________
identifying whether errors occured identifying and then correcting errors
________________________________________________________________________
without need for retransmission
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

3. As a network administrator, provide four (4) benefits of subnetting a network. (4)

________________________________________________________________________
Efficient address space utilization
________________________________________________________________________
Improved network performance
________________________________________________________________________
Enhanced network security
________________________________________________________________________
Scalabitity and simplified network management
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
4. What is the purpose of Multiple Access protocols at the data link layer in
computer networks? (2)
coordinating network acces to shared communication mediums
________________________________________________________________________
________________________________________________________________________
Collision free data transmission in networks
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

5. Two nodes are involved in a collision during transmission. Explain how the two
nodes will recover from the collision in an ethernet wired channel. (5)
Collision detection-node listens for collision,recognizes collision
________________________________________________________________________
initiates backoff algorithm, determines random waiting time before attempting to retransmit
________________________________________________________________________
prevents repeated collisions
________________________________________________________________________
Exponential backoff-random waiting time doubles each time a collision occurs
________________________________________________________________________
Retransmission-after random waiting time elapses, nodes attempts to retransmit data
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

------------------------------------------- END OF TEST -------------------------------------------

[70 MARKS]

You might also like