



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Material Type: Exam; Class: Computer Comm Networks; Subject: Computer Science; University: Wichita State University; Term: Fall 2003;
Typology: Exams
1 / 6
This page cannot be seen from the preview
Don't miss anything!
CS 742 Computer Communication Networks Final Exam - Name: Fall 2003
Part 1: (75 points - 3 points for each problem)
( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture
( C ) 2. An Ethernet link is working at 40 Megabaud. What is the data transfer rate for this link? (A) 5 Mbps (B) 10 Mbps (C) 20 Mbps (D) 80 Mbps.
( A ) 3. Which framing approach is used in PPP? (A) character stuffing (B) bit stuffing (C) clock-based framing (D) frequency framing
( D ) 4. Which is not a connection-oriented network? (A) X.25 (B) Frame Relay (C) ATM (D) none of the above.
( B ) 5. Which transmission techniques are not specified in 802.11? (A) FHSS (B) QPSK (C) DSSS (D) OFDM
( D ) 6. Which statement about IEEE 802.11g is incorrect? (A) It operates at radio frequencies 2.4 GHz. (B) It uses OFDM modulation. (C) It makes possible data speeds as high as 54 Mbps. (D) none of the above
( C ) 7. When the Packet InterNet Groper (ping) is executed, which type of message is transmitted: (A) an ICMP Time Request (B) an ICMP Redirect (C) an ICMP Echo Request (D) none of the above
( C ) 8. What is the header size of a IPv6 packet? (A) 60 bytes (B) 48 bytes (C) 40 bytes (D) 20 bytes
( B ) 9. Which function is not used in UDP socket programming in C? (A) bind (B) accept (C) socket (D) sendto
( A ) 10. Based on the QoS, which application requires high reliability? (A) file transfer (B) audio on demand (C) videoconference (D) none of the above
( D ) 11. An 802.16 network has a channel width of 20 MHz. When QAM64 is used, what is the transfer rate? (A) 40 Mbps (B) 64 Mbps (C) 80 Mbps (D) 120 Mbps
( D ) 12. Which types of messages are not encapsulated in IP datagrams? (A) TCP (B) UDP (C) ICMP (D) ARP
( B ) 13. A DHCP server can be used to provide the same functionality as a(n): (A) ARP server (B) BOOTP server (C) TFTP server (D) none of the above
( A ) 14. The Internet Protocol (TCP) provides a delivery service that is: (A) connection-oriented and reliable (B) connectionless and reliable (C) connection-oriented and unreliable (D) connectionless and unreliable
( C ) 15. In which function do we specify PF UNIX or PF INET? (A) connect (B) listen (C) socket (D) bind
( C ) 16. If a datagram that is 1420 bytes long (20-byte IP header plus 1400 bytes of data) arrives for transmission across a network that has the maximum transmission unit (MTU) of 532 bytes. How long will each of the segments be (including the IP header)? (A) 512 bytes, 512 bytes, and 376 bytes (B) 532 bytes, 532 bytes, and 376 bytes (C) 532 bytes, 532 bytes, and 396 bytes (D) none of the above
( B ) 17. Which device operates in the data link layer? (A) repeater (B) bridge (C) router (D) gateway
( D ) 18. Which is not a routing algorithm or protocol? (A) Distance Vector (B) BGP (C) OSPF (D) none of the above
( D ) 19. Which type is set to query the domain name server in nslookup? (A) MX (B) HINFO (C) CNAME (D) NS
( B ) 20. In Java socket programming, which class represents a socket for sending and receiving datagram packets on the server side? (A) DatagramPacket (B) DatagramSocket (C) ServerSocket (D) DatagramServerSocket
( D ) 21. The assigned port for the SMTP server is: (A) 21 (B) 22 (C) 23 (D) 25
( C ) 22. Which server interprets name to IP address and vice versa? (A) SMTP (B) FTP (C) DNS (D) DHCP
( B ) 23. IPv6 represents local loopback address as (A) ::127.0.0.0 (B) ::1 (C) ::0 (D) none of the above
( A ) 24. Which can be used to encrypt and decrypt email? (A) PGP (B) TLS (C) RTP (D) SSH
( A ) 25. Which command prints network connections, routing tables, and interface statistics? (A) netstat (B) ping (C) traceroute (D) dig
Part 2: (125 points)
(a) BGP Border Gateway Protocol (BGP) is a protocol for exchanging routing information between autonomous systems. (b) NAT Network Address Translation (NAT) is the translation of an IP address used within one network to a different IP address known within another network. (c) CSMA/CA Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA) is a protocol used in wireless networking. (d) AODV Ad hoc On-demand Distance Vector (AODV) is a routing algorithm used to solve the problem of mobile routers. (e) HTTPS The HyperText Transport Protocol Secure (HTTPS), is standard encrypted communi- cation mechanism on the World Wide Web. It is just HTTP over SSL.
10011 ) 10011
10101 10011
11000 10011
10111 10011
10000 10011
1100
So the transmission frame T(x) is 1100110011100
(a) The minimum number happens when two stations are in two different subtrees from the root. It will be 3 bit slots. (b) The maximum number happens when two stations are in the same deepst subtree. Traversing from the root node, there are n collision nodes and n + 1 nodes without collision. So the maximum number is n + n + 1 = 2n + 1.
Destination Netmask Gateway 156.26.10.0 255.255.255.128 eth 156.26.10.128 255.255.255.128 eth 156.26.11.0 255.255.255.192 R
Describe what the router does with a packet addressed to each of the following destinations:
(a) 156.26.10.239 - deliver packets directly through eth (b) 156.26.11.208 - forward to R (c) 156.26.12.27 - forward to R
(a) How many IP addresses can be allocated? (b) What is the last IP address? (c) What is the netmask?
Ans:
(a) 2^32 −^20 = 2^12 = 4096. (b) 16 × 256 = 4096, 16 + 16 − 1 = 31 ⇒ 168. 78. 31 .255. (c) The host ranges from 168.78.16.0 to 168.78.31.255. The first, second, and forth part of the netmask are 255, 255, and 0, respectively. The third part of the netmask 256 − 224 −^20 = 240. Hence, the netmask is 255.255.240.0.
A 72 hosts B 46 hosts C 52 hosts
(a) There are 170 hosts in all. Give a possible arrangement of network and subnet masks to make this possible. (b) Suggest what the organization might do if the department C grows to 70 hosts.
Ans:
(a) Department Network Netmask IP Addresses A 192.168.1.0/25 255.255.255.128 128 B 192.168.1.128/26 255.255.255.192 64 C 192.168.1.192/26 255.255.255.224 64
(b) These are possible choices: either assign multiple subnets to single department, abandon subnets and buy a bridge, or let B and C use the same subnet. Here is a possible deployment giving A two subnets, of sizes 64 and 32; every other department gets a sigle subnet of size of the next highest power of 2: Department Network Netmask IP Addresses A 192.168.1.0/26 255.255.255.192 64 A 192.168.1.64/27 255.255.255.224 32 B 192.168.1.96/26 255.255.255.192 64 C 192.168.1.160/27 255.255.255.224 32 C 192.168.1.192/26 255.255.255.192 64
(a) Each host computer or router can only be assigned one Internet (IP) address. (b) The address 156.26.255.255 is a valid host IP address. (c) The ARP is used to obtain an IP address. (d) For wireless communication, error-detecting can be used to make the transmission reliable.
Ans:
(a) False, a host with two Ethernet cards should have two IP addresses, also routers always have multiple IP addresses assigned (b) False, the address 156.26.255.255 is used to broadcast a message to all hosts on the network 156.26.0.0. (c) False, the ARP is used to obtain the hardware address. (d) False, error-correcting should be used to make the transmission reliable.
ciphertext = A I E R T K A A R H E E V T B E W R G N A