Escolar Documentos
Profissional Documentos
Cultura Documentos
FINAL EXAMINATION
SEMESTER I 2013/2014
September 2013
INSTRUCTIONS TO CANDIDATES
Page 1 of 14
SECTION A: MULTIPLE CHIOCE (30 QUESTIONS, 30 MARKS)
Instruction: Please choose the best answer. Each correct answer contributes 1
mark.
1. When a host transmits data across a network to another host, which process
does the data go through?
(a) Standardization
(b) Conversion
(c) Encapsulation
(d) Synchronization
2. Which of the following correctly describe steps in the OSI data encapsulation
process?
(a) The transport layer divides a data stream into segments and may add
reliability and flow control information.
(b) The data link layer adds physical source and destination addresses and
an FCS to the segment.
(c) Packets are created when the network layer encapsulates a frame with
source and destination host addresses and protocol-related control
information.
(d) Packets are created when the network layer adds Layer 3 addresses and
control information to a frame.
3. Which layer of the OSI reference model uses the hardware address of a device
to ensure message delivery to the proper host on a LAN?
(a) physical
(b) data link
(c) network
(d) transport
Page 2 of 14
Semester I 2013/2014 Data Communication and Computer Networks
4. Which layer of the OSI reference model uses flow control, sequencing, and
acknowledgments to ensure that reliable networking occurs?
(a) data link
(b) network
(c) transport
(d) presentation
6. Which of the following protocols uses both TCP and UDP ports?
(a) SMTP
(b) Telnet
(c) FTP
(d) DNS
7. An administrator issues the command ping 127.0.0.1 from the command line
prompt on a PC. If a reply is received, what does this confirm?
(a) The PC has connectivity with a Layer 3 device.
(b) The PC has a default gateway correctly configured
(c) The PC has connectivity up to Layer 5 of the OSI model
(d) The PC has the TCP/IP protocol stack correctly installed.
Page 3 of 14
Semester I 2013/2014 Data Communication and Computer Networks
8. When a DHCP server is configured, two IP addresses should never be
assignable to hosts are; the broadcast address on the network and
(a) IP address used by the interfaces
(b) network or subnetwork IP address
(c) manually assigned address to the clients
(d) designated IP address to the DHCP server
10. Refer to figure 1 below. Which value will be configured for Default Gateway
of the Local Area Connection?
Figure 1
(a) 10.0.0.0
(b) 10.0.0.254
(c) 192.223.129.0
(d) 192.223.129.254
Page 4 of 14
Semester I 2013/2014 Data Communication and Computer Networks
11. For the network 192.0.2.0/24, which option is a valid IP address that can be
assigned to a host?
(a) 192.0.2.0
(b) 192.0.2.254
(c) 192.0.3.254
(d) 192.0.4.1
13. What information from a packet does a router use in order to choose a route
for forwarding the packet?
(a) Host portion of destination IP address
(b) Host portion of source IP address
(c) Network portion of destination IP address
(d) Network portion of source IP address
Page 5 of 14
Semester I 2013/2014 Data Communication and Computer Networks
16. When is it acceptable for two hosts to have the same IP address at the same
time?
(a) When they are on different networks that use private IP addresses
(b) When they are on the same network and it uses private IP addresses
(c) When they are on different networks that use public IP addresses
(d) When they are on the same network and it uses public IP addresses
17. What is the network address of the host with IP address 192.168.22.83/28?
(a) 192.168.22.0
(b) 192.168.22.64
(c) 192.168.22.72
(d) 192.168.22.80
18. A network has subnet mask 255.255.255.0. What is the maximum number of
hosts on the network?
(a) 30
(b) 62
(c) 126
(d) 254
20. A TCP sender wants to send data that has a total size of 1000 bytes; this data
is further divided into four segments. Each segment size is 250 bytes. Segment
1 is given a sequence number 100. What is the sequence number for segment
3?
(a) 250
(b) 350
(c) 600
(d) 850
Page 6 of 14
Semester I 2013/2014 Data Communication and Computer Networks
21. Method for converting a stream of data bits into a predefined code is called:
(a) Signaling
(b) Encoding
(c) Coding
(d) Framing Code
22. Bits are represented on the medium by changing one or more of the following
signal characteristics EXCEPT:
(a) Amplitude
(b) Phase
(c) Frequencies
(d) Power
25. Which command can be used from a PC to verify the connectivity between
hosts that connect through path?
(a) Tracert address
(b) Ping address
(c) Arp address
(d) Telnet address
Page 7 of 14
Semester I 2013/2014 Data Communication and Computer Networks
26. One advantage of using a router to segment the network is
27. Refer to the table 1 below. What type of connection would be supported by the
cable given in the table?
Table 1
(a) PC to router
(b) PC to switch
28. Which one Ethernet fiber-optic modes support distances of greater than 550
meters?
(a) 1000BASE-CX
(b) 100BASE-FX
(c) 1000BASE-LX
(d) 1000BASE-SX
Page 8 of 14
Semester I 2013/2014 Data Communication and Computer Networks
29. What is the first 24 bits in a MAC address called?
(a) NIC
(b) BIA
(c) OUI
(d) VAI
Page 9 of 14
Semester I 2013/2014 Data Communication and Computer Networks
SECTION B: STRUCTURE QUESTIONS (17 QUESTIONS, 70 MARKS)
Instruction: Please answer the following questions as concisely as possible.
Question 1
Differentiate in between an intranet and extranet.
[4 marks]
Question 2
A host IP address is 172.16.29.104 and the prefix length is /16.
(a) What are the network address, broadcast address and the subnet mask of the
hosts network?
[3 marks]
(c) If the host want to send a broadcast message to all hosts in its own network,
what is the broadcast address that will be used?
[1 mark]
Question 3
Initially you are given a block of network 201.73.1.0/24. You borrow 2 bits from the
host part for subnetting.
(a) How many subnets can you have?
[1 mark]
(c) What is the prefix number used for all the subnet created?
[1 mark]
Page 10 of 14
Semester I 2013/2014 Data Communication and Computer Networks
(d) Give the network address, broadcast address and range of host addresses for
the first subnet you obtained in question (a) above.
[2 marks]
Question 4
There are two types of broadcast; limited broadcast and directed broadcast.
(a) Differentiate between these two types of broadcast.
[3 marks]
(b) If the network address is 172.168.70.0 / 24, give the IP address that will be
used for the limited and directed broadcast for this network.
[2 marks]
Question 5
What is static IP addressing? Give THREE (3) devices that should be given a static
address.
[4 marks]
Question 6
What was the main reason for developing IPv6? Give TWO (2) advantages of IPv6
over IPv4.
[3 marks]
Question 7
What are the two sub-layers of the Data Link Layer? Give ONE (1) function for each
sub-layer.
[4 marks]
Question 8
CSMA/CD is the medium access control (MAC) protocol used by the popular
Ethernet technology. Explain the behavior of Ethernet in the following situations.
(a) A device has data to transmit. What does it do before it transmits the data?
[2 marks]
Page 11 of 14
Semester I 2013/2014 Data Communication and Computer Networks
(b) What does it do while transmitting the data?
[2 marks]
Question 9
Differentiate in between interference and attenuation in data communication.
[2 marks]
Question 10
Draw a signal for encoded bit stream 11001001 using:
(a) Nonreturn to Zero
[2 marks]
(b) Manchester
[2 marks]
Question 11
(a) Data transfer can be measured using bandwidth, throughput and goodput.
Briefly describe about throughput and goodput.
[4 marks]
(a) A 100BaseT Ethernet LAN has a bandwidth of 100 Mbps. However, due to
the number of hosts connected to the LAN and the amount of traffic generated
by these hosts, the throughput may only be 70 Mbps. Out of all the bits
transmitted, 2/5 of them may just be control bits. Calculate the goodput for
this scenario.
[3 marks]
Page 12 of 14
Semester I 2013/2014 Data Communication and Computer Networks
Question 12
Give THREE (3) criteria that should be considered in selecting network media.
[3 marks]
Question 13
What are the advantages of using switches over hubs in an Ethernet network? Give
THREE (3) of them.
[3 marks]
Question 14
The main advantage of implementing wireless media is that devices are no longer
need to use physical media. However it has several disadvantages. List any TWO (2)
disadvantages of wireless media.
[2 marks]
Question 15
Given below is the MAC addresses or Host A and Host B:
Host Y: 00 60 2F CO 56 1A
Host Z: 00 60 2F 55 47 2B
(b) Host Z wants to send frame to all hosts in a network. What is the MAC
address that will be used?
[1 mark]
Question 16
Give THREE (3) factors that contribute to the success of Ethernet technology.
[3 marks]
Page 13 of 14
Semester I 2013/2014 Data Communication and Computer Networks
Question 17
Explain what a switch would do in each of the following scenarios.
(a) Frame arrives but the destination MAC address is not listed in the MAC table.
[2 marks]
(b) Frame arrives and the destination MAC address is listed in MAC table.
[2 marks]
(c) Frame arrives but the sender MAC address is not listed in MAC table.
[2 marks]
---End of Questions---
Page 14 of 14
Semester I 2013/2014 Data Communication and Computer Networks