B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

Similar documents
MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

BSc (Hons) Business Information Systems, BSc (Hons) Computer Science with Network Security. Cohort: BIS/16B/FT & BCNS/16B/FT

TCP /IP Fundamentals Mr. Cantu

Assignment - 1 Chap. 1 Wired LAN s

OSI Network Layer. Chapter 5

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Faculty of Science and IT Course title. Pre-requisite/corequisite

BEng. (Hons) Telecommunications. Examinations for / Semester 2

Position of IP and other network-layer protocols in TCP/IP protocol suite

Chapter 4 Network Layer: The Data Plane

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Introduction to Internetworking

BSc. (Hons) Web Technologies. Examinations for 2017 / Semester 1

QUESTION BANK EVEN SEMESTER

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

TCP/IP THE TCP/IP ARCHITECTURE

Chapter 7. Local Area Network Communications Protocols

Business Data Networks and Security 10th Edition by Panko Test Bank

CCNA MCQS with Answers Set-1

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Cisco Interconnecting Cisco Networking Devices Part 1.

Network Layer/IP Protocols

EE-311 Data Communication & Networks

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Internet Protocols (chapter 18)

Network Protocols - Revision

ch02 True/False Indicate whether the statement is true or false.

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CCNA Exam File with Answers. Note: Underlines options are correct answers.

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Chapter 2 Network Models 2.1

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

The Internet Protocol (IP)

Internet Protocol (IP)

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Defining Networks with the OSI Model. Module 2

ET4254 Communications and Networking 1

Network Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol

TSIN02 - Internetworking

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

CS164 Final Exam Winter 2013

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Novell TCP IP for Networking Professionals.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Network Layer: Control/data plane, addressing, routers

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

Chapter 5 OSI Network Layer

Institute of Science and Technology 2067

Business Data Communications and Networking

Hands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more...

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Module 7 Internet And Internet Protocol Suite

Outline. Inter-Process Communication. IPC across machines: Problems. CSCI 4061 Introduction to Operating Systems

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

ECE4110 Internetwork Programming. Introduction and Overview

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

NETWORK PACKET ANALYSIS PROGRAM

Data & Computer Communication

SEN366 (SEN374) (Introduction to) Computer Networks

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

Network Architecture Models

Cisco Cisco Certified Network Associate (CCNA)

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

The Internet. The Internet is an interconnected collection of netw orks.

ICS 351: Networking Protocols

Internetwork Protocols

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture

Vorlesung Kommunikationsnetze

Where we are in the Course

INTERNET SYSTEM. Internet Protocol. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. Large Scale Networking

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy

TSIN02 - Internetworking

CSCI Networking Name:

Review of Important Networking Concepts

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Networking: Network Layer

Solved MCQ of Computer networking. Set-1

CHAPTER-2 IP CONCEPTS

Transcription:

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015 / Semester 2 MODULE: NETWORKS MODULE CODE: CAN1102C DURATION: 2¼ HOURS Instructions to Candidates 1. Attempt Section A and any one question each from Section B, C and D. 2. Always start a new section on a fresh page. 3. Questions carry unequal marks. 4. Maximum marks achievable: 100 5. Use of silent calculators is permitted in the Examination Room. 6. Appendix is provided This question paper contains a MCQ Section and 6 questions and 8 pages. Page 1 of 8

SECTION A (30 marks) Attempt the 15 Multiple Choice Questions in this Section There is only one correct response per multiple choice question. 1. How many responses does a host expect to get when it sends an ARP request? a) Unlimited, because it broadcasts the message b) One, because only the destination reply c) None, if the destination is not available at that moment to reply d) b and c 2. If you have an IP address of 17.0.0.0 and a subnet mask of 255.255.0.0, which of the following could be correct? a) You are subnetting for a class C address b) You are subnetting for a class A address c) You are subnetting for a class B address d) That is an invalid address assignment 3. In a connectionless-oriented service, what happens next after the destination computer detects errors during transmission and thus discards the data? a) The destination device verifies source MAC address b) The source device verifies the successful data delivery with the destination c) The destination device does not notify the source that it has discarded data d) None of the above 4. What is the theoretical maximum size of an IPv4 datagram? a) 65,535 bytes b) 32,787 bytes c) 32 bits d) 32 bytes 5. Which of the following best describe the function of a MAC address? a) It is used to physically locate a device on a network b) It is used to resolve domain name to IP address c) It is used to route packets across networks d) It is used to logically locate a device on a network 6. Which best describe the structure of an encapsulated data packet a) Segment header, network header, data, segment trailer b) Segment header, network header, data, frame trailer c) Frame header, network header, segment header, data, frame trailer d) None of the above 7. Which one does not apply to UDP? a) Stands for User Datagram Protocol b) Is a best-effort delivery system c) Uses software to reassemble segments when they reach destination d) It is a connectionless-oriented protocol Page 2 of 8

8. Which field is used in TCP for error detection? a) Checksum b) Sequence Number c) Acknowledgement Number d) Source Port 9. Which of the following is the correct bit pattern of the first octet for a Class C IP address? a) 0xxx xxxx b) 10xx xxxx c) 110x xxxx d) 1110 xxxx 10.Which one of the following is the function to be made by the Transport layer? a) Best path selection for packet travel b) Encoding and Modulation c) Data Encryption d) Reliable Data Transfer 11. Which layer is closest to the end-user? a) Transport Layer b) Network Layer c) Application Layer d) Physical Layer 12. From the following statement, which one is FALSE? a) A client typically has one network interface and does not route datagrams b) Transport Layer is responsible for end-to-end communication. c) Session Layer is responsible for data formatting d) None of the above 13.In a Class C address where 4 bits have been borrowed for subnetting. bits are left for host addresses. a) 24 b) 20 c) 16 d) 4 14. The source and destination address appear in an IP s packet. a) Footer b) Header c) Field d) Trailer 15.Using a Class C address, you need five subnets with a maximum of 18 hosts on each of those subnets. Which subnet mask would you use? a) 255.255.255.192 b) 255.255.255.224 c) 255.255.255.240 d) 255.255.255.248 Page 3 of 8

SECTION B (30 marks) ANSWER ONLY ONE QUESTION IN THIS SECTION QUESTION 2 (a) HTTP is stateless. Discuss this statement. (2 marks) (b) What are the three main ways of authenticating a person? Provide an example of each method. (c) What are the principles for congestion control? (3 marks) (d) FTP is protocol used for the delivery of files across networks. Describe how FTP works. (5 marks) (e) FTP is said to have an out-of-band connection. Explain what it means. (2 marks) (f) List the mechanisms for web site to identify users? Give examples for suitable use of the mechanism. (2 marks) (g) Describe the difference between the network and transport layers. (2 marks) (h) Describe the difference between multiplexing and demultiplexing. (4 marks) (i) Why are both source port number and destination port number required for communication? (2 marks) (j) How does a host get its IP Address? (2 marks) Page 4 of 8

QUESTION 3 (a) HTTP and DNS are two very important application layer protocols for the Internet. i. Explain the difference in operation between HTTP v1.0 and HTTP v1.1. ii. Explain why the DNS protocol is important and how it works. iii. Give a sample HTTP response message with at least 4 main header lines that is sent by the web server. iv. Determine whether HTTP and DNS protocols are connection-oriented or connectionless-oriented and state the port numbers used by both protocols.. (3+4+2+2 marks) (b) Authentication and Authorization are two important network security services. i. Explain what you understand by authentication. ii. Describe one mechanism that you could use to enforce authorization. (4+1 marks) (c) FTP is a popular protocol used to transfer files from one host to another. i. Explain briefly how it works. ii. Give three distinct advantages that it has over HTTP for files transfer. (4+3 marks) (d) In respect of the ISO/OSI Reference model, i. Give three important functions handled by Layer 6. ii. Explain what is meant by 'encapsulation'. iii. Which protocol data unit has both a header and a trailer and state the layer at which it operate. (3+2+2 marks) Page 5 of 8

SECTION C (20 marks) ANSWER ONLY ONE QUESTION IN THIS SECTION QUESTION 4 (a) Describe how TCP connection management works. (3.5 marks) (b) What you understand by flow control and describe how it works in relation to TCP. (2 marks) (c) Each host on the Internet is currently assigned an IP address 32 bits long (Ipv4). Ipv4 addresses are usually written as a series of four decimal numbers. IPv4 addresses traditionally belong to one of five classes of address, depending on the type of network. i. Give the address range for a Class C network. ii. What are Class C network addresses commonly used for? iii. Can two hosts A and B with addresses 17.27.37.47 and 17.57.67.77 respectively communicate directly with each other if they share a subnet mask of 255.240.0.0? iv. Give three main differences between IPv4 and IPv6. (1+1+4+1.5 marks) (d) i. Explain what do you understand by datagram fragmentation. ii. A datagram of 4200 bytes has to travel over a network with a MTU size of 1560 bytes. Describe how fragmentation can address this issue. You should give the value of the 3 key fields used in fragmentation for each fragment created. (1+6 marks) Page 6 of 8

QUESTION 5 (a) Name the 3 fields present in IPv4 no longer present in IPv6. Why are these 3 fields no longer required? (b) What is the difference between an active and a passive intruder? (2 marks) (c) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (d) Consider sending a 5000-byte datagram into a link that has a MTU of 1500 bytes. Suppose the original datagram is stamped with the identification number 256. How many fragments are generated? What are their characteristics? (You should give the value of the 3 key fields used in fragmentation for each fragment created.) Page 7 of 8

SECTION D (20 marks) ANSWER ONLY ONE QUESTION IN THIS SECTION QUESTION 6 (a) Describe how the following protocols work: i. ARP ii. DHCP iii. POP iv. SMTP (4+4+2+2 marks) (b) The IEEE 802.11x standard is popular in extending wired networks. i. Outline two popular flavours of this wireless standard. Elaborate on the operating frequency, range and speed of each flavour. ii. What are the two modes of operation of this standard and explain the difference between them. iii. Mention one security issue with this wireless technology and give two ways how this issue can be addressed. (3+2+3 marks) QUESTION 7 (a) Explain the Virtual Circuit Service Model. (b) Show by means of a diagram the UDP segment structure. (3 marks) (c) Explain the concept of IP Fragmentation and Re-assembly. (8 marks) (d) Compare the bridge and the router. (3 marks) *** End of Exam Paper *** Page 8 of 8