Csc2b10 Exam Nov 2009 Eng
Csc2b10 Exam Nov 2009 Eng
Csc2b10 Exam Nov 2009 Eng
MODULE CSC2B10
COMPUTER SCIENCE (DATA COMMUNICATION)
CAMPUS APK
NOVEMBER EXAMINATION
/2…
SECTION A
Answer all of the following questions on the answer sheet given at the back of the paper. (20)
2. When a host on network A sends a message to a host on network B, which address does the
router look at?
A. port
B. logical
C. physical
D. none of the above
6. The _________ routing uses the Dijkstra algorithm to build a routing table.
A. distance vector
B. link state
C. path vector
D. none of the above
7. UDP uses ________ to handle outgoing user datagrams from multiple processes on one host.
A. flow control
B. multiplexing
C. demultiplexing
D. none of the above
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -3-
11. In the _______ mode, IPSec protects the whole IP packet, including the original IP header.
A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)
13. Which address could be the beginning address of a block of 16 classless addresses?
A. 2.4.6.5
B. 2.4.6.15
C. 2.4.6.62
D. none of the above
15. _______ is the standard mechanism provided by TCP/IP for copying a file from one host to
another.
A. TELNET
B. SMTP
C. XT_FTP
D. none of the above
18. An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true?
A. The do not fragment bit is set to 1 for all three datagrams.
B. The more fragment bit is set to 0 for all three datagrams.
C. The identification field is the same for all three datagrams.
D. The offset field is the same for all three datagrams.
19. The term ________ means that IP provides no error checking or tracking. IP assumes the
unreliability of the underlying layers and does its best to get a transmission through to its
destination, but with no guarantees.
A. reliable delivery
B. connection-oriented delivery
C. best-effort delivery
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -4-
SECTION B
1. Assume that there is communication between a process running at a computer in LAN 1 with IP
address 192.10.10.3 and physical address 4f:4x on port address 1999, and a process running
on a computer in LAN 2 with IP address 192.77.15.7 and physical address 1f:1x on port
address 25.
192.10.10.3
4f:4x
192.33.1.44 192.33.1.48
6f:8x 9f:9x 192.77.15.7
1f:1x
Show all addresses in packets and frames at the transport, network, and data link layers, as the
information leaves the computer in LAN 1 and arrives at the computer in LAN 2 in the spaces
that have been provided.
(6)
Transport layer:___________________________________________________________________
Network layer:____________________________________________________________________
Transport layer:____________________________________________________________________
Network layer:_____________________________________________________________________
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -5-
________________________________________________________________________________
192.168.3.6/24
________________________________________________________________________________
5. Complete the following table by entering the full name of the acronym, and state its purpose
and the layers at which it is found. (8)
POP Name:
Purpose:
ICMP Name:
Purpose:
TCP Name:
Purpose:
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -6-
DHCP Name:
Purpose:
6. Define fragmentation and explain why the IPv4 protocol needs to fragment some packets. (2)
7. Which fields of the IPv4 header changes from router to router? (2)
8. A router with IPv4 address 130.23.45.8 and physical address 23:45:AB:45:CD has received a
packet for a host with IP address 130.23.45.21. How does the router send the packet to the
host over the data link layer if it does not have the physical address of the host? (5)
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -7-
9. A router receives a IPv4 packet with source IP 192.14.23.12 and destination address
92.45.25.56. The queue of the router overflows with messages when the packet arrives. Which
ICMPv4 message should it send back to the source? (1)
10. Give a diagram of the topology of the network if this table is the routing table for router R1. (4)
11. Name and discuss the core routing protocol of the Internet. (4)
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -8-
12. Explain how process-to-process delivery works. Refer to the API you have used in the practical
classes to highlight your answer. (5)
13. Explain how a connection is established in TCP via three-way handshaking. (6)
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 -9-
14. When does it make sense to use UDP? Give examples. (4)
16. To be able to access remote computers is difficult as each computer is different with respect to
the command it understands. Give the protocol that can be used solve this problem. Explain
how it works. (3)
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 - 10 -
CLIENT: HELO
SERVER: (1)
CLIENT: DATA
SERVER: (3)
CLIENT: (5)
SERVER: 221
_________________________________________________________________________________
2 _______________________
3 _______________________
4 _______________________
5 _______________________
18. Discuss how ICMP can be used to implement the traceroute program. (6)
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 - 11 -
19. Explain why the route displayed by the traceroute program may not correspond to a valid path
through the internet. (2)
20. Name and briefly describe how messages at the network, transport and application layers of
the Internet model can be protected? Label each of the 3 layers you discuss in your answer.
(6)
21. Explain how the DatagramPacket object is used to send data to a remote machine. (2)
13/…
COMPUTER SCIENCE (DATA COMMINICATION) CSC2B10 - 12 -
SECTION A:
1. 11.
2. 12.
3. 13.
4. 14.
5. 15.
6. 16.
7. 17.
8. 18.
9. 19.
10. 20.
13/…