0 ratings0% found this document useful (0 votes) 782 views10 pagesItt542 PDF
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
CONFIDENTIAL aS CSIJAN 2018/ITT542
UNIVERSITI TEKNOLOGI MARA
FINAL EXAMINATION
COURSE TCP/IP
COURSE CODE ITT542
EXAMINATION : JANUARY 2018
TIME : 3HOURS
INSTRUCTIONS TO CANDIDATES
1 ‘This question paper consists of two (2) parts: PART A (30 Questions)
PART 6 (7 Questions)
2. ‘Answer ALL questions from all two (2) parts
i) Answer PART A in the Objective Answer Sheet
ii) Answer PART B in the Answer Booklet. Start each answer on a new page.
3. Do not bring any material into the examination room unless permission is given by the
invigilator.
4 Please check to make sure that this examination pack consists of
i) the Question Paper
ji) an Answer Booklet ~ provided by the Faculty
ii) an Objective Answer Sheet — provided by the Faculty
5 ‘Answer ALL questions in English.
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 10 printed pages
{© Hak Cipta Universiti Teknologi MARA CONFIDENTIALCONFIDENTIAL, 2 CSIJAN 2018/ITT542
PART A (30 MARKS)
1. Which of the following is NOT part of the Requirement levels of an RFC?
A. Required.
B. Elective.
C. Not recommended.
D. Approved.
2. Which of the following is the regulatory agency that regulates radio, television and
wire/cable communications?
A. FCC,
B. ISO.
C. IEEE,
D. ITU-T.
3. Which layer of the OS! Model is responsible for the source-to-destination delivery of a
packet across multiple network links?
A. Transport.
B. Physical
C. Network.
D. Data Link.
4. An IPv4 address is normally represented in base or dotted-decimal notation.
A 16
B. 10
C. 256
D8
5. Which of the following is the range for Class B private IP address?
‘A. 170.0.0.0 through 170.255.255.255.
B. 172.16.0.0 through 172.31.255.255.
C. 192.168.0.0 through 192.168.255.255,
D. 168.172.0.0 through 168.172.255.255,
6. Which address could be the beginning address of a block of 32 classless addresses?
246.5,
2.46.16.
2.46.24,
2.4.6.62,
pomp
(© Hak Cipta Universit Teknologi MARA CONFIDENTIALCONFIDENTIAL, 3 CSIJAN 2018/ITT542
7. Some of the FSKM routers have been configured with default routes. What is the
advantage of using default routes?
A. They allow connectivity to remote networks that are not in the routing table.
B. They direct traffic from the Internet into corporate networks.
C. They establish routes that will never go down.
D. They require a great deal of CPU power.
8. Which of the following is a source IP address?
‘A. This host on this network.
B. Limited broadcast address.
©. Loopback address.
D. Specific host on this network.
9. What does the IP address 0.0.0.78 refer to?
‘A. Node 78 on network 0.0.0.0.
B. The multicast node 78 address.
C. Any host on network 78.
D. Node 78 on “this” network.
10. The definition of reliable delivery includes.
A. error-free delivery
B. Receipt of the complete message
C. in-order delivery
D. all of the above
11. You work as a network consultant. Your customer, UITM has a class C network license.
UITM wants you to subnet the network to provide a separate subnet for each of its 5
departments. Each subnet must support at least 24 hosts. Which network mask should
you use?
A. 255.255.255.192,
B. 255.255.255.224.
C. 255.255.255.240,
D. 255.255.255.248,
12. ABC Sdn Bhd. is assigned a network of 200.10.5.0/24. You want to create 7 subnets
from the assigned address. Which subnet mask will give you 7 subnets and the most
possible hosts per subnet?
A. 127.
B. 24
C. 123.
D. 129,
(© Hak Cipta Universiti Teknologi MARA CONFIDENTIALCONFIDENTIAL, 4 CSIJAN 2018/ITT542
13. You have a single Class B IP address and a point-to-point serial link that you want to
implement VLSM on. Which subnet mask is the most efficient?
A. 127,
B. 123,
Cc. 130.
D. 132.
14. What is the primary reason for using subnets?
‘A. To reduce the size of the collision domain.
B. To increase the number of host address.
C. To reduce the size of the broadcast domain.
D. None of the above.
15. The size of the option field of an IP datagram is 33 bytes. What is the value of HLEN?
A. 20 bytes
B. 23 bytes.
C. 33 bytes,
D. 53 bytes.
16. The source port address on the UDP user datagram header defines the
A. sending computer
B. receiving computer
C. application program of the sending computer
D. application program of the receiving computer
17. What is the protocol number for TCP?
A. 80,
B. 21.
c. 14.
D. 6.
18, Station A is transmitting data to station B faster that station B can handle it. When station
B's buffer fills up, it sends out a message to station A to stop sending data. After B
empties out its buffer, station B sends a message to station A to start sending data again.
This is most directly an example of
connectionless
windowing
connection-oriented protocol
flow control
9om>
© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL,CONFIDENTIAL 5 CSIJAN 2018/ITT542
19. What does a router do with a packet with an unknown destination network address?
A. Sends it to the serial port.
B. Drops the packet.
C. Sends it back out the same interface it received it in.
a Forwards the packet tothe next hop.
20. TCP uses to check the safe and sound arrival of data,
‘A. an acknowledgment mechanism
B. out-of-band signaling
C. the services of another protocol
D. None of the above.
21. The ports ranging from 0 to 1,023 are assigned and controlled by ICANN. These are the
ports.
well-known,
registered
dynamic
None of the above.
gomr
22.Whenever a router receives a datagram with a time-to-live value of
discards the datagram and sends a time-exceeded message to the sender.
A. three
B. two
C. one
D. zero
23. An area border router can be connected to
only another router
another router or another network
only another network
only another area border router
gom>
24. In the DNS structure, each node in the tree has a , Which is a string with a
maximum of __ characters.
label; 127
label; 63
name; 64
name; 128
com>
(© Hak Cipta Universiti Teknologi MARA, CONFIDENTIALCONFIDENTIAL, 6
CSIJAN 2018/ITT542
25.When the secondary downloads information from the primary, it is called
transfer.
A. domain
B. zone
C. file
D. label
26.In resolution, the server returns the IP address of the server that it thinks
can resolve the query.
A. iterative
B. recursive
C. straight
D. reflective
27. To make addresses more readable, IPv6 specifies
A. dotted decimal
B. hexadecimal colon
C. decimal
D. None of the above.
28. In IPV6, options are inserted between the and the
A. base header; extension header
B. base header; upper-layer
C. base header; frame header
D. None of the above.
29.1PV6 allows security provisions than IPv4.
A. more
B. less
C. the same level
D. None of the above.
notation.
data,
30. When the majority of the Internet has moved to the IPv6 but some still use IPv4, which
transition strategy should be used?
A. Tunneling.
B. Header translation.
C. Either tunneling or header translation.
D. None of the above.
(© Hak Cipta Universiti Teknolog! MARA,
CONFIDENTIALCONFIDENTIAL, 7 CSIJAN 2018/ITT542
PART B (70 MARKS)
QUESTION 1
Describe the THREE (3) different levels of addresses that are used in an internet using the
TCPIIP protocols.
(3 marks)
QUESTION 2
a) Stark (M) Corp has been assigned with the network address of 144.120.0.0, The
corporation is in need of 60 physical segments with at least 600 hosts per physical
‘segment. As the company’s network administrator, find the following:
‘Stark (M) Cor
‘The Proposed Subnet Mask:
Number of Subnets Supported:
‘Maximum Number of Host ID per
Subnet:
‘The First Subnet address:
The Last Subnet address:
The Second Subnet address:
First useable host address:
Last useable host address:
Broadcast address:
@ marks)
b) Compare error control and congestion control in terms of its mechanisms.
(2 marks)
(© Hak Cipta Universiti Teknologi MARA, CONFIDENTIALCONFIDENTIAL, 8 CSIJAN 2018/ITT542
QUESTION 3
‘An IP datagram has arrived with the following information in the header (in hexadecimal),
49 00 05 DC 26 2E 20 B7 10 11 8D 57 CO 0A OC 0B 00 00 00 Co
a) Justify if the packet is the first, middle, last fragment or the original fragment and state
the offset number of this fragment.
(2 marks)
b) Calculate the size of data this packet is carrying.
(2 marks)
©) State the checksum value contained in this datagram,
(1 mark)
4) Calculate how far the packet is allowed to travel to from this point before it is being
dropped,
(2 marks)
e) This IP packet is then entering a network with MTU of 440 bytes, find the value of the
following fields for each of the resulting fragments. Assume that the fragments (all but the
last one) have the maximum possible size.
i) Total length.
ii) Data size.
ill) More fragments flag.
iv) Fragment offset.
v) _ First byte.
vi) Last byte.
(12 marks)
QUESTION 4
In a TCP connection, the value of cwnd is 5,000 and the value of rwnd is 6,500. The host
has already sent bytes up to the 5800" byte and the previous ACK number received was
5600.
a) Draw a diagram to illustrate the new situation of the window.
(4 marks)
b) The host has sent 2,500 bytes more and had received an ACK value of 5800 and an
advertisement window of 6000 bytes. Draw the new window.
(4 marks)
(© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL,CONFIDENTIAL, 9 CSIJAN 2018/ITT542
QUESTION 5
a) Distinguish between RIP and OSPF routing protocols in terms of type of routing protocol,
convergence speed and metric.
Point of comparison RIP ‘OSPF
Type of routing protocol
Convergence speed
Metric
(marks)
b) A routing table has currently twenty-five (25) entries. It does not receive information from
a group of twelve (12) routes for 190 seconds, however 100 seconds after that, came
updates of six (6) routes from the non-responding group.
i) List the number of periodic, expiration and garbage collection timers running
precisely on the 190” second and also on the 290" second.
ii) Calculate the total amount of timers running at 190" second and 290" second.
Timers as at 190" second Timers as at 290 second
Periodic Periodic
Expiration Expiration
Garbage Garbage
Collection | Collection
Total Total
(marks)
QUESTION 6
a) Analyze the flag 0x8F80.
(3 marks)
b) ADNS client is looking for the IP address of Coufefe.corp.com. Show the query message
with value for each field. Assume the message is of no error, with recursion desired and
identifier 4779.
(6 marks)
QUESTION 7
a) Represent the shortest form of the following IPv6 addresses.
i) 2243:12AB:111A:ABC0:0000:0000:0000:0000
ii) 0000:00AA:0000:0000:0000:0000:1238:A123
iii) 0000:0000:0000:ABCD:0000:0000:0000:0000
(3 marks)
(© Hak Cipta Universiti Teknologi MARA, CONFIDENTIALCONFIDENTIAL 10 CSIJAN 2018/TT542
b) List THREE (3) types of IPv6 addresses,
(3 marks)
¢) List THREE (3) strategies used to handle the transition from IPv4 to IPV6.
(3 marks)
END OF QUESTION PAPER
‘© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL,