Sei sulla pagina 1di 15

Sri Lanka Institute of Information Technology

te SLIlT ~JIII~
rn

B.Sc. Special Honours Degree . In Information Technology


Final Examination Year 2, Semester 1 (2008)

Data Commu~ication and Comp~ter Networks II (206)


Duration: 3 Hours Friday, 2nd May 2008 (Titne 9.00 a.nl. - 12.00 noon)
Instruction to Candidates: Calculators are allowed. This paper contains 5 questions All questions carry equal marks. Answer All Questions on the paper itself. Total Marks 100.

This paper contains 14 pages excluding the cover page.

Data Communication

Final Examination and Computer Networks II - First Semester

Question 1
1. A TCP client opens a connection with a server using an initial sequence number (ISN) of 12000. The server party opens the connection with an ISN of28000. a) Show the TCP connection establishment process. Indicate the sequence number and the acknowledgement numbers in a diagram. (3 marks)
I
I

Client

Server

b) Following the question above (a), show how the following data segments are sent by the client and the server. Indica~e the sequence number and the acknowledgement numbers in a diagram. (5 marks) Client Server Client 200 Bytes
I

Server

Bytes I

300 500 Bytes

"-

Sri Lanka Institute oOnformation Page 1 of}4

Technology

Data Communication

Final Examination and Computer Networks II - First Semester

C)' Show the TCP COIDlectiontermination process initiated by the client. Indicate the sequence number and the acknowledgement numbers in a diagram. (2 marks)
I

Client

Server

d) Explain the function of a "Retransmission Timer". (3 marks)

e) Explain how 'Error Control' is done for a corrupted segment,(2 marks)

Sri Lanka Institute ofInformation Page 2 of 14

Technology

Data Communication

Final Examination and Computer Networks II - First Semester

f) A Receiver ButTer Size is 2000 Bytes. It's window size is 200 Bytes. How much
data is available in the buffer? (2 marks)

g) Write one of the reasons of sending a segment with an RST flag. (3 marks)

Sri Lanka Institute ofInformation Page 3 of 14

Technology

Data Communication

Final Examination and Computer Networks II - First Semester

Question 2
a) An IP datagram has arrived with the following information in the header (in hexadecimal): Use the diagram of the IP header given below. Answer the following questions, you can answer in hexa decimal or decimal or binary for large numbers. 45 00 00 54 00 03 00 00 20 06 00 00 7C 4E 03 02 B4 OE OF 02
VER 4 bits 8 bitstypebits offset Totallength 8 Protocol HLEN Fragmentation3 bits 16 bits Flags Service 13bits Header checksum

e IP Address

Destination Option IF Address

1.
11. 111.

What is the header size? (1 mark) What is the fJ:agmentation offset? (1 mark) Is the packet fragmented? (1 mark) What is the size of the data? (2 marks) _

_ _

lV.

v. What is the transport Layer protocol of the packet? (1 mark)


VI.

How many more routers can the packet travel to? (l mark) What is the identification number of the packet? (1 mark)

_ _

Vll.

b) An original IP packet contains 6000 data bytes. The identification number is 320. '
1.

Assuming that Ethernet is used at the Data Link Layer (supports only 1500 Bytes for the Data Field), draw how the IP packet is fragmented. Mention how much data is contained in fragments. The standard IP header is used on every IP fragment. (5 marks)

Sri Lanka Institute of Information Technology Page 4 of 14

Final Examination Data Communication and Computer Networks II - First Semester

11.

How many fragments are there? (1 mark)

111.

(a) What is the class of 172.11.5.3 IP address (classful)? (1 mark)

(b) An IP address and subnet mask are 200.5.10.129 255.255.255.128. What is the network address? (3 marks)

(c) You have a class B network address, 130.12.0.0. Write the most suitable subnet mask to create 25 subnetwork addresses. (2 marks)

Sri Lanka Institute of Information Techno logy Page 5 of 14

Data Communication

Final Examination and Computer Networks II - First Semester

Question 3
Teletech is a business process outsourcing (BPO) company based in Colorado. It is now having new branches in Sydney and Shanghai. Teletech has obtained the network address 182.10.0.0/16 tor the company.
10.10.10.0/24

81

20.10.10.0/24 SO

SO EO
Colarado

Sydney

EO

a)

Using the obtained network address, assign subnets to each branch using the minimum number of host bits to the network side. (Do not use the first subnet with all Os and the last subnet with allls.)Write the subnet address given with the sub net mask in decimal. (Assign the first possible subnet to Colorado, second to Sydney and the third to Shanghai.) (5 marks) Network Shanghai Sydney Subnet Mask Subnet Address

b) What is the maximum number of possible hosts per network? (1 mark

c) Assign the first IP.address of the subnet of each branch to the router interface. (1 mark) Network IP Address of the Router Interface of the Network " Shanghai Sydney

Sri Lanka Institute ofInformation Page 6 of 14

Technology

Final Examination Data Communication and Computer Networks II - First Semester

e) ,What is an Autonomous System? (1 mark)

1) Write the commands for configuring IGRP on 'Sydney' router. Indicate the prompts

as well. (3 marks)

g) Explain the following topics briefly. i. Link State Routing (2 marks)

11.

Static Routing (2 marks)

Sri Lanka Institute ofInformation Page 7 of 14

Technology

Data Communication

Final Examination and Computer Networks II - First Semester

111.

Split Horizon (2 marks)

IV.

Route Poisoning (2 marks)

Sri Lanka Institute ofInformation Page 8 of 14

Technology

Final Examination Data Communication and Computer Networks II - First Semester

Question 4
1. Write the two protocols used in VLAN Tagging? State one difference between those two protocols. (3 marks) Two Protocols: DitJerence:

L2.

What is the purpose o[having a trunk E0rl? (1 mark)

3. Implement a VLAN solution for the following scenario. Network consists with 3 switches (CISCO 1912/2950) with 24 Fast Ethernet ports. You have to configure the SWI switch with following details Write the relevant commands. Useful commands are attached at the end of the paper. VLANs in SW1 , ) Create foIl 1. VLAN name is Accounting and VLAN Number is 2 (1 mark)

2. VLAN name

1S

Sales and VLAN Number is 3 (1 mark)

3. VLAN name is Production and VLAN Number is 4 (1 mark)

2. Switch port 3 and 13 for the VLAN 3 (1 mark)

3. Switch port 4 and 14 for the VLAN 4 (1 mark)

c.) Contlgure the switch port 1 as a trunk port (1 mark)

Sri Lanka Institute ofInformation Page 9 of 14

Technology

Data Communication

Final Examination and Computer Networks 11- First Semester

4. Bridge IDs of each bridge and the path costs are given in the diagram. a) Highlight the Root Bridge. (1 mark) b) Select and highlight the Root Port of every bridge. (3 marks) c) Select the designated Bridges for each segment (2.5 marks) d) Show the designated port in each designated bridge. (2.5 marks)

Semnent 1 100 ~:100


19

SeQment 2 100

SeQment 3
4

2 D: 250 2

19

c:
4

150

Segment 4 2 2
19

19

Segment 5

Sri Lanka Institute ofInformation Page 10 of 14

Technology

Data Communication

Final Examination and Computer Networks II - First Semester

Question 5
4. State two differences between Standard Access Control List and Extended Access Control List. Useful commandfj are attached at the end of the paper. 1. (4 marks)

2. The network administrator of the following network wants to implement ACL security to the network.
Galle

.:t

192.168.15.6/24 Tom EO RoulJlr-PT Roiler2

Kandy

"
172.10.0.6/16 Mary

a) Write standard ACL statements for the following criteria. State the prompts as well. L Tony can access the Galle Network. (2 marks)

ii. But any other traffic from the Kandy network should be denied. (2 marks)

b) Apply the above access-list on a suitable router interface. Write the command. Indicate the prompt as well. (1 mark)

Sri Lanka Institute ofInformation Page 11 of 14

Technology

Data Communication

Final Examination and Computer Networks

Il- First Semester

c) Write extended ACL statements for the following criteria. Indicate the prompts as well. i. Telnet traffic to John from the Colombo network should be denied (3.5 marks)

11.

IP packets with TCP protocol, traveling from the 'Colombo' network to any destination with a destination port less than 1023 should be permitted. (3.5 marks)

d) Apply the above access-list on a suitable router interface. Write the command. Indicate the prompt as well. (1 mark)

_______ l
e) Write 2 functions of a firewall. (2 marks) f) Give an example of a server that is placed in the DMZ. (1 mark)
Sri Lanka Institute ofInformation Page 12 of14 Technology

Data Communication

Final Examination and Computer Networks II - First Semester

USEFUL COMMANDS FOR DATACOMMUNICATIONS AND COMPUTER NETWORKS II Commands for Catalvst 1900 Switch Confieuration Command

a restricted be taken byaddress Sets the action gateway address version information the MAC address Description portIP addressMAC in-bandthe the . Displays default to informationthat the interface for so security a permanent static MAC table:

s re} type

from remoteof displays violationdress-table security be reached mac-address mac-adinterfaces a switch show about aths::restricted or can settings management interface static address switch ifoption network infonnation security there isthe restricted static port secure [max-mae-count count]

VLAN Command List vlan vlan [name vlan-name]


"-

ame

Displays aVLAN membership Assigns port to information VLAN

c}

Sri Lanka Institute of Information Technology Page 13 of 14

Data Communication

Final Examination and Computer Networks II - First Semester

Standard IP Access List and Extended Access list Confie:uration Commands

stinationport] mit ny} }

Command Configuration Modenumbered command for standard an Global numberedIPaccess for Global command lists list on Interface the Access-list to enable Activates subcommand extended extended and Extended access lists configuration interface access lists [log] Description [established] destination destination-wildcard [operator port] I access-list access-list-number { deny I permit} ip access-group access-list-number {in lout} ip access-group { number I name [ in lout]}

End of Paper

Sri Lanka Institute of Information Technology Page 14 ofl4

Potrebbero piacerti anche