Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Final Exam for Computer Communication Networks | CS 742, Exams of Computer Science

Material Type: Exam; Class: Computer Comm Networks; Subject: Computer Science; University: Wichita State University; Term: Fall 2003;

Typology: Exams

Pre 2010

Uploaded on 08/19/2009

koofers-user-9a4
koofers-user-9a4 🇺🇸

5

(1)

10 documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CS 742 Computer Communication Networks Final Exam - Name:
Fall 2003
Part 1: (75 p oints - 3 points for each problem)
( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture
( C ) 2. An Ethernet link is working at 40 Megabaud. What is the data transfer rate for this link?
(A) 5 Mbps (B) 10 Mbps (C) 20 Mbps (D) 80 Mbps.
( A ) 3. Which framing approach is used in PPP?
(A) character stuffing (B) bit stuffing (C) clock-based framing (D) frequency framing
( D ) 4. Which is not a connection-oriented network?
(A) X.25 (B) Frame Relay (C) ATM (D) none of the above.
( B ) 5. Which transmission techniques are not specified in 802.11?
(A) FHSS (B) QPSK (C) DSSS (D) OFDM
( D ) 6. Which statement about IEEE 802.11g is incorrect?
(A) It operates at radio frequencies 2.4 GHz. (B) It uses OFDM modulation.
(C) It makes possible data speeds as high as 54 Mbps. (D) none of the above
( C ) 7. When the Packet InterNet Groper (ping) is executed, which type of message is transmitted:
(A) an ICMP Time Request (B) an ICMP Redirect (C) an ICMP Echo Request (D) none of the above
( C ) 8. What is the header size of a IPv6 packet?
(A) 60 bytes (B) 48 bytes (C) 40 bytes (D) 20 bytes
( B ) 9. Which function is not used in UDP socket programming in C?
(A) bind (B) accept (C) socket (D) sendto
( A ) 10. Based on the QoS, which application requires high reliability?
(A) file transfer (B) audio on demand (C) videoconference (D) none of the above
( D ) 11. An 802.16 network has a channel width of 20 MHz. When QAM64 is used, what is the transfer
rate?
(A) 40 Mbps (B) 64 Mbps (C) 80 Mbps (D) 120 Mbps
( D ) 12. Which types of messages are not encapsulated in IP datagrams?
(A) TCP (B) UDP (C) ICMP (D) ARP
( B ) 13. A DHCP server can be used to provide the same functionality as a(n):
(A) ARP server (B) BOOTP server (C) TFTP server (D) none of the above
( A ) 14. The Internet Protocol (TCP) provides a delivery service that is:
(A) connection-oriented and reliable (B) connectionless and reliable
(C) connection-oriented and unreliable (D) connectionless and unreliable
( C ) 15. In which function do we specify PF UNIX or PF INET?
(A) connect (B) listen (C) socket (D) bind
( C ) 16. If a datagram that is 1420 bytes long (20-byte IP header plus 1400 bytes of data) arrives for
transmission across a network that has the maximum transmission unit (MTU) of 532 bytes.
How long will each of the segments be (including the IP header)?
(A) 512 bytes, 512 bytes, and 376 bytes (B) 532 bytes, 532 bytes, and 376 bytes
(C) 532 bytes, 532 bytes, and 396 bytes (D) none of the above
pf3
pf4
pf5

Partial preview of the text

Download Final Exam for Computer Communication Networks | CS 742 and more Exams Computer Science in PDF only on Docsity!

CS 742 Computer Communication Networks Final Exam - Name: Fall 2003

Part 1: (75 points - 3 points for each problem)

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture

( C ) 2. An Ethernet link is working at 40 Megabaud. What is the data transfer rate for this link? (A) 5 Mbps (B) 10 Mbps (C) 20 Mbps (D) 80 Mbps.

( A ) 3. Which framing approach is used in PPP? (A) character stuffing (B) bit stuffing (C) clock-based framing (D) frequency framing

( D ) 4. Which is not a connection-oriented network? (A) X.25 (B) Frame Relay (C) ATM (D) none of the above.

( B ) 5. Which transmission techniques are not specified in 802.11? (A) FHSS (B) QPSK (C) DSSS (D) OFDM

( D ) 6. Which statement about IEEE 802.11g is incorrect? (A) It operates at radio frequencies 2.4 GHz. (B) It uses OFDM modulation. (C) It makes possible data speeds as high as 54 Mbps. (D) none of the above

( C ) 7. When the Packet InterNet Groper (ping) is executed, which type of message is transmitted: (A) an ICMP Time Request (B) an ICMP Redirect (C) an ICMP Echo Request (D) none of the above

( C ) 8. What is the header size of a IPv6 packet? (A) 60 bytes (B) 48 bytes (C) 40 bytes (D) 20 bytes

( B ) 9. Which function is not used in UDP socket programming in C? (A) bind (B) accept (C) socket (D) sendto

( A ) 10. Based on the QoS, which application requires high reliability? (A) file transfer (B) audio on demand (C) videoconference (D) none of the above

( D ) 11. An 802.16 network has a channel width of 20 MHz. When QAM64 is used, what is the transfer rate? (A) 40 Mbps (B) 64 Mbps (C) 80 Mbps (D) 120 Mbps

( D ) 12. Which types of messages are not encapsulated in IP datagrams? (A) TCP (B) UDP (C) ICMP (D) ARP

( B ) 13. A DHCP server can be used to provide the same functionality as a(n): (A) ARP server (B) BOOTP server (C) TFTP server (D) none of the above

( A ) 14. The Internet Protocol (TCP) provides a delivery service that is: (A) connection-oriented and reliable (B) connectionless and reliable (C) connection-oriented and unreliable (D) connectionless and unreliable

( C ) 15. In which function do we specify PF UNIX or PF INET? (A) connect (B) listen (C) socket (D) bind

( C ) 16. If a datagram that is 1420 bytes long (20-byte IP header plus 1400 bytes of data) arrives for transmission across a network that has the maximum transmission unit (MTU) of 532 bytes. How long will each of the segments be (including the IP header)? (A) 512 bytes, 512 bytes, and 376 bytes (B) 532 bytes, 532 bytes, and 376 bytes (C) 532 bytes, 532 bytes, and 396 bytes (D) none of the above

( B ) 17. Which device operates in the data link layer? (A) repeater (B) bridge (C) router (D) gateway

( D ) 18. Which is not a routing algorithm or protocol? (A) Distance Vector (B) BGP (C) OSPF (D) none of the above

( D ) 19. Which type is set to query the domain name server in nslookup? (A) MX (B) HINFO (C) CNAME (D) NS

( B ) 20. In Java socket programming, which class represents a socket for sending and receiving datagram packets on the server side? (A) DatagramPacket (B) DatagramSocket (C) ServerSocket (D) DatagramServerSocket

( D ) 21. The assigned port for the SMTP server is: (A) 21 (B) 22 (C) 23 (D) 25

( C ) 22. Which server interprets name to IP address and vice versa? (A) SMTP (B) FTP (C) DNS (D) DHCP

( B ) 23. IPv6 represents local loopback address as (A) ::127.0.0.0 (B) ::1 (C) ::0 (D) none of the above

( A ) 24. Which can be used to encrypt and decrypt email? (A) PGP (B) TLS (C) RTP (D) SSH

( A ) 25. Which command prints network connections, routing tables, and interface statistics? (A) netstat (B) ping (C) traceroute (D) dig

Part 2: (125 points)

  1. (15 pts.) Briefly explain these terminologies. If they are acronyms, also write what they stand for.

(a) BGP Border Gateway Protocol (BGP) is a protocol for exchanging routing information between autonomous systems. (b) NAT Network Address Translation (NAT) is the translation of an IP address used within one network to a different IP address known within another network. (c) CSMA/CA Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA) is a protocol used in wireless networking. (d) AODV Ad hoc On-demand Distance Vector (AODV) is a routing algorithm used to solve the problem of mobile routers. (e) HTTPS The HyperText Transport Protocol Secure (HTTPS), is standard encrypted communi- cation mechanism on the World Wide Web. It is just HTTP over SSL.

  1. (10 pts.) Complete the following table listing the seven layers in the OSI 7-Layer Reference Model. Then, identify three of the four layers used in the TCP/IP protocol suite (write TCP/IP beside them). Finally, identify where the following protocols belong: TCP, UDP, IP, ICMP, PPP, RARP, IMAP. - Layer 7: Application Layer - IMAP (TCP/IP) - Layer 6: Presentation Layer - Layer 5: Session Layer - Layer 4: Transport Layer - TCP, UDP (TCP/IP) - Layer 3: Network Layer - IP, ICMP (TCP/IP) - Layer 2: Data Link Layer - PPP, RARP (TCP/IP) - Layer 1: Physical Layer
  1. (7 pts.) Using the divisor polynomial x^4 + x + 1 for CRC, what frame will be transmitted for the data M = 110011001? ns: M(x) = 110011001, C(x) = 10011, r = 4

1101101

10011 ) 10011


10101 10011


11000 10011


10111 10011


10000 10011


1100

So the transmission frame T(x) is 1100110011100

  1. (8 pts.) Suppose that 2n^ stations use the adaptive tree walk protocol to arbitrate access to a shared channel. At a certain instant 2 stations become ready. What are the minimum and maximum number of bit slots needed to walk the tree if 2n^ is much larger than 1?

(a) The minimum number happens when two stations are in two different subtrees from the root. It will be 3 bit slots. (b) The maximum number happens when two stations are in the same deepst subtree. Traversing from the root node, there are n collision nodes and n + 1 nodes without collision. So the maximum number is n + n + 1 = 2n + 1.

  1. (6 pts.) Suppose a router has built up the routing table as shown in the following table. The router can deliver packets directly over interfaces eth0 and eth1, or it can forward packets to other routers in the table.

Destination Netmask Gateway 156.26.10.0 255.255.255.128 eth 156.26.10.128 255.255.255.128 eth 156.26.11.0 255.255.255.192 R R

Describe what the router does with a packet addressed to each of the following destinations:

(a) 156.26.10.239 - deliver packets directly through eth (b) 156.26.11.208 - forward to R (c) 156.26.12.27 - forward to R

  1. (9 pts.) For the network 168.78.16.0/20, answer the following questions:

(a) How many IP addresses can be allocated? (b) What is the last IP address? (c) What is the netmask?

Ans:

(a) 2^32 −^20 = 2^12 = 4096. (b) 16 × 256 = 4096, 16 + 16 − 1 = 31 ⇒ 168. 78. 31 .255. (c) The host ranges from 168.78.16.0 to 168.78.31.255. The first, second, and forth part of the netmask are 255, 255, and 0, respectively. The third part of the netmask 256 − 224 −^20 = 240. Hence, the netmask is 255.255.240.0.

  1. (12 pts.) An organization has a class C network 192.168.1 and wants to form subnets for 3 departments, with hosts as follows:

A 72 hosts B 46 hosts C 52 hosts

(a) There are 170 hosts in all. Give a possible arrangement of network and subnet masks to make this possible. (b) Suggest what the organization might do if the department C grows to 70 hosts.

Ans:

(a) Department Network Netmask IP Addresses A 192.168.1.0/25 255.255.255.128 128 B 192.168.1.128/26 255.255.255.192 64 C 192.168.1.192/26 255.255.255.224 64

(b) These are possible choices: either assign multiple subnets to single department, abandon subnets and buy a bridge, or let B and C use the same subnet. Here is a possible deployment giving A two subnets, of sizes 64 and 32; every other department gets a sigle subnet of size of the next highest power of 2: Department Network Netmask IP Addresses A 192.168.1.0/26 255.255.255.192 64 A 192.168.1.64/27 255.255.255.224 32 B 192.168.1.96/26 255.255.255.192 64 C 192.168.1.160/27 255.255.255.224 32 C 192.168.1.192/26 255.255.255.192 64

  1. (12 pts.) For True or False questions, if it is false, explain why.

(a) Each host computer or router can only be assigned one Internet (IP) address. (b) The address 156.26.255.255 is a valid host IP address. (c) The ARP is used to obtain an IP address. (d) For wireless communication, error-detecting can be used to make the transmission reliable.

Ans:

(a) False, a host with two Ethernet cards should have two IP addresses, also routers always have multiple IP addresses assigned (b) False, the address 156.26.255.255 is used to broadcast a message to all hosts on the network 156.26.0.0. (c) False, the ARP is used to obtain the hardware address. (d) False, error-correcting should be used to make the transmission reliable.

  1. (8 pts.) Encrypt the following plaintext using a transposition cipher based on the key LEOPARD. plaintext = H A V E A G R E A T W I N T E R B R E A K

L E O P A R D

H A V E A G R

E A T W I N T

E R B R E A K

ciphertext = A I E R T K A A R H E E V T B E W R G N A