Test 2
Test 2
TEST 2
Student No: ______________________________________________________
□ Jovita Mateus
□ Ben Mwashekuna
□ Taleni Andjamba
Test Instructions
1. A systems administrator is testing the connectivity between Host A and Host Z using the
ping command. Four (4) packets were echoed back from Host Z, which means that the
connectivity test was successful.
True / False
2. Maria wants to know the IP address of her laptop. She invokes the ipconfig /all command
which displays two distinct subnet IP addresses. Maria’s basic network settings are
misconfigured.
True / False
True / False
4. A guest is visiting NUST and connected their laptop to the network using a physical cable.
The ipconfig command was executed and shows that the laptop has the IP address
169.254.255.250. The laptop of the guest should have internet access__
True / False
5. In binary logic, the AND operation compares two input values and provides a single output
value. This process is used to provide the subnet address
True / False
6. Nomiseb is a NUST Computer Science student. He decided to experiment by installing a
second Network Interface Card (NIC) on his desktop computer at home. This means that
his desktop computer has more than one NIC and will have multiple Media Access Control
(MAC) addresses.
True / False
True / False
8. A Network Administrator configures a router with five (5) interfaces. Each router interface
is configured with a different IP address from the same subnet ID. This configuration is
correct and the router can forward packets from the subnet.
True / False
9. John executes the command “arp -d” on his laptop to clear the entries in the ARP Table.
The “arp -d” command will delete all the static and dynamic entries in the laptop’s ARP
Table.
True / False
True / False
QUESTION 2: MULTIPLE CHOICE QUESTIONS [10]
Circle the correct answer(s)
1. How many bits must be borrowed from the host portion of an address to
accommodate a router with five connected networks?
a. 2 bits
b. 3 bits
c. 4 bits
d. 5 bits
4. Which command can be used to find the domain name associated with an IP
address?
a. nslookup
b. netstat
c. ping
d. arp
6. Which layers in the new TCP/IP model remained unchanged from the old
model?
a. Layers 2 and 3
b. Layers 1 and 2
c. Layers 5 and 4
d. Layers 3 and 5
1) List two (2) advantages and two (2) disadvantages of the Taking-turns Protocols. (4)
ADVANTAGES DISADVANTAGES
___________________________________________________________________________
Fairness Token Overhead
___________________________________________________________________________
Collision Avoidance Single point of failure
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
3) At each layer of the OSI model, information that is transmitted is processed and
encapsulated into different units. Write down the names given to the unit of
information at each layer. (7)
Message
_________________________
Compressed data
_________________________
Synchronized data
_________________________
Segments
_________________________
Packets
_________________________
Frames
_________________________
Bits
_________________________
The below image shows the traffic captured between communicating devices.
Figure 1: Wireshark
________________________________________________________________________
CLASS A
________________________________________________________________________
Public IP address
________________________________________________________________________
d) Indicate the MAC address of the Destination in the first entry in Figure 1 (No. 1). (2)
73:8d:ce
________________________________________________________________________
e) Explain what happened when the message “Time to Live exceeded in transit” was
reported to the source. (2)
________________________________________________________________________
QUESTION 5: SUBNETTING [10]
2. Explain the difference between Error Detection and Error Correction services at
the Data Link Layer. What is the solution for each method to ensure that the sent
message is received by the destination? (2)
________________________________________________________________________
Efficient address space utilization
________________________________________________________________________
Improved network performance
________________________________________________________________________
Enhanced network security
________________________________________________________________________
Scalabitity and simplified network management
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
4. What is the purpose of Multiple Access protocols at the data link layer in
computer networks? (2)
coordinating network acces to shared communication mediums
________________________________________________________________________
________________________________________________________________________
Collision free data transmission in networks
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
5. Two nodes are involved in a collision during transmission. Explain how the two
nodes will recover from the collision in an ethernet wired channel. (5)
Collision detection-node listens for collision,recognizes collision
________________________________________________________________________
initiates backoff algorithm, determines random waiting time before attempting to retransmit
________________________________________________________________________
prevents repeated collisions
________________________________________________________________________
Exponential backoff-random waiting time doubles each time a collision occurs
________________________________________________________________________
Retransmission-after random waiting time elapses, nodes attempts to retransmit data
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
[70 MARKS]