Air University Final Examination: Summer, 2008

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

Air University

Final Examination: Summer, 2008

Subject: Computer Networks Total marks: 100


Instructor: M. Sohail Khalid Time allowed: 3 hours
_________________________________________________________________
Attempt all questions, if you think there is any mistake, just mention your assumptions and answer
accordingly

Q # 1: Consider the following network; some of the interfaces are marked with their respective IP and MAC
addresses. (20)

Answer the following in only one line


(1) Computer B requests some web contents from web server E
a. What would be the destination MAC address in frame header between computer B and switch A?
b. What would be the destination MAC address in frame header between switch A and router A?
c. What would be the source MAC address in frame header between switch A and router A?
d. What would be the destination IP address in IP header between computer B and switch A?
e. What would be the destination IP address in IP header between switch A and router A?
f. What would be the source IP address in IP header between switch A and router A?
g. What would be the source and destination IP address in IP header between router B and router C?
h. What would be the source and destination MAC address between router B and router C?
i. What would be the destination MAC address between router C and switch B?
j. Are the interfaces between router A and router B belong to same network?
(2) Computers A, B and D request some multicast video traffic (requiring 2 Mbps for a single stream) of
same group from server E, multicasting is enabled and all the devices are configured accordingly
a. What would be the data rate between switch B and router C?
b. What would be the data rate between router C and router B?
c. What would be the data rate between router A and switch A?
d. What would be the data rate between switch A and computer B?
e. What may be valid destination IP address/addresses on the links connecting computer B and
computer E?
(3) Answer all the above questions of section (2) i.e., (a, b, c, d, e) in the case when multicasting is not
enabled
Q # 2: You are hired by a company having offices in Islamabad, Lahore and Faisalabad. Network of
company is shown in figure. Company has bought the network 200.200.200.128 / 25. Your designated post
is Network Engineer. Company asks you to complete following tasks as your job responsibilities. (20)

(a) Specify IP addressing scheme (fixed mask or VLSM), specifying each interface (IP address) and
network segment (range of IP addresses) along with subnet masks.

It is expected that with the growth of company business there will be 10 more hosts at each company office.
Company is not in a position to buy more global IP addresses. Also company wants high speed internet
connectivity from Islamabad office. For this future concern how would you change your previous scheme,
specifically:

(b) How would you make it possible to save the company budget by spending as few money as possible
on global IP addresses, keeping in mind internet connectivity. Specify the changes (complete IP addressing
if needed) in your previous scheme.

(c) Specify the routing solution that should be optimized to the need of company’s network. Show how
your solution is efficient for issues like routing loops, slow convergence or backup paths in case of a link
failure.

(d) Construct routing table of the Islamabad router according to your routing scheme in part (c).

Kindly keep your answer as precise as possible. DO NOT WRITE PARAGRAPHS, just write features like
sentences in presentation slides. Note also that best solution will give you high reward.

Q # 3: Consider the figure above (figure of question # 2). A host in Lahore in network E wants to access a
web server in Islamabad in network F. Describe the functionality of all the layers involved. Consider actual
IP addresses you have assigned in question # 2. Describe all the processes involved in this communication;
construct messages with appropriate headers where ever necessary. (20)
Again, DO NOT WRITE PARAGRAPHS, just write features like sentences in presentation slides.
Q # 4: Consider the following network and answer the following. Answer should not comprise of sentences
or paragraphs, only name the specific node, term or very short reason. (10)

(a) Router A wants to send packets to Router E, what path it would adopt? WHY?
(b) Which router/routers may be ASBR?
(c) Which router/routers may be ABR?
(d) Router E wants to know about networks in Area 200, what type of LSA it requires?
(e) Router F wants to know about Router E, what type of LSA it requires?
(f) Router G wants to know about networks in Autonomous System in which RIP is running, what type
of LSA it requires?
(g) If a static route with default options is defined on Router A to reach Router E through Router D,
what path will packets actually take to reach Router E?
Bonus Question:
What routing protocol would be running on Router A and Router E? Can you name the term specific to this
mechanism?
Multiple Choice Questions Time allowed: 50 minutes
_______________________________________________________________________________________

Q # 5: All the questions carry equal marks (30)

1. There is a WAN link between two routers, layer-2 can contain any one of the following
a. Ethernet header b. IEEE 802.3 header
c. VLAN header d. none of the above
2. CSMA/CD assumes that medium is shared
a. True b. False
3. CSMA/CD algorithm starts by first sending a beacon frame on the medium
a. True b. False
4. Unicast, multicast and broadcast address can be recognized by the structure of MAC address
a. True b. False
5. What is true about Organizationally Unique Identifier (OUI) in MAC address
a. all or most of the devices of a company have same b. two devices cannot have same
c. OUI is user configurable d. none of the above
6. I/G = Individual/Group bit in MAC address signifies following
a. this address is unicast or not b. an individual node or a group can change the MAC address
c. this address is meant for this network or outside d. none of the above
7. What is true about 802.1Q tagged frames
a. an extra field is added in between Ethernet header b. a tag is added before IP header
c. a whole header is placed before Ethernet header d. none of the above
8. Application layer protocols like http, ftp etc are identified using ____ in TCP header
a. Identification field b. Port number
c. Protocol field d. Code bits
9. Which of the following is must for the first step of TCP connection establishment
a. Port number of source should be correct and well known b. Destination port must be 80
c. Acknowledgement field must be initialized d. SYN flag must be high
10. Sequence numbers can be initialized independently by senders and receivers
a. True b. False
11. Checksum is used to ____
a. Mark the end of segment b. Check if there is any error
c. Synchronize transmitter and receiver d. Check the sum of all the data
12. Function of FIN flag is as following
a. Indicates last byte of the header b. Informs that sending of data is finished
c. Works with ACK flag for reliable transmission d. Informs other node that this is the initiation of
connection termination

13. UDP and TCP are transport protocols


a. True b. False
14. UDP and TCP are reliable for transferring data
a. True b. False
15. There are three routers in between a web browser and web server, the router in between has an empty
routing table, what code of ICMP type 3 would generate
a. host unreachable b. network unreachable
c. protocol unreachable d. port unreachable
16. A multicast IP address can be any valid IP address from the whole address range
a. True b. False
17. In Multicasting, joining a group means
a. broadcasting the IP address b. initiating IGMP messages for multicast applications
c. connecting with a group of IP addresses d. launching the application with Multicast IP address
18. Function of IGMP snooping can be defined as
a. calculating the Multicast MAC address b. connecting with a Multicast server
c. learn which hosts requested to receive Multicast traffic d. perform routing of Multicast traffic
19. Which of the following seems to be a valid Multicast MAC address
a. 01-00-5E-0A-18-05 b. 18-0A-05-00-5E-01
c. 01-00-5E-0A d. none of the above
20. If a router receives a frame with wrong checksum value what would it do
a. correct it using error correcting codes b. will send ACK back
c. will send retransmit request to source d. discard the frame
21. While forwarding a frame after a routing decision, a router performs the following
a. constructs a new frame with new layer2 header b. only updates the checksum and transmit
c. make no change just forwards after decision d. only change the destination and FCS
22. 802.11 standard defines the specifications of following layers
a. Media Access Control (MAC) b. physical
c. All the layers in protocol stack d. a & b
23. 802.11a define separate RF channels that do not overlap
a. True b. False
24. In WLAN, for reliable transfer, a device can only send when no other device is sending
a. True b. False
25. A Clear to Send (CTS) frame can be received only by the station who previously sent the Request to
Send (RTS) frame
a. True b. False
26. Any station receiving a CTS frame can send data
a. True b. False
27. Fragmentation increases the overhead and hence lesser throughput because of
a. overhead OAM bits b. increased amount of payload (data)
c. shifting to higher data rate d. increased acknowledgments/headers for every fragment

28. Coverage area of two AP’s are shown in different shades in above figure, users in both the areas are
having difficulty to connect with each other, what may be the problem
a. both AP’s have same SSID b. two areas cannot be completely overlapped
c. stations are confused to which AP they associate d. both AP’s have conflicting channels
29. Only one station is not responsible for transmitting the beacons in Ad hoc mode of WLAN
a. True b. False
30. What is you guess, should we enable RTS/CTS mechanism in Ad hoc mode when there is hidden node
problem
a. Yes b. No

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy