Midterm Exam 2 (4 Pages, 5 Questions)

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

KINGDOM OF SAUDI ARABIA ‫المملكة العربية السعودية‬

AL-IMAM UNIVERSITY ‫جامعة اإلمام محمد بن سعود اإلسالمية‬


FACULTY OF COMPUTER SCIENCE
‫كلية علوم الحاسب والمعلومات‬
AND INFORMATION

Dep.: Computer Science Course: Computer Networks (CS331)


Class: Level 6 (CS-IS) Dr. Miled Tezeghdanti
Year: 1426-1427 Second Semester
Date: 16/04/1427 Allowed time: 1h30

‫اإلسم‬:...........................................................................................
‫الرقم الجامعي‬:................................................................................
‫التوقيع‬:.........................................................................
Midterm Exam 2 (4 pages, 5 questions)
(Marks: 20 Points)

No books, no notes, no calculators. Write in the spaces provided. Be neat.


Frames and packets format are given at the end of the exam sheet.

Question 1 (4 points)
Define briefly following terms:

CSMA/CD
……………………………………………………………………………………
……………………………………………………………………………………

Bridge
……………………………………………………………………………………
……………………………………………………………………………………

Router
……………………………………………………………………………………
……………………………………………………………………………………

Aggregation
……………………………………………………………………………………
……………………………………………………………………………………
Question 2 (2 points)
What is the difference routing and forwarding?
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

1
Question 3 (5 points)
Mark the correct box. If more than one answer is correct for an item, mark all possible correct
responses.

1) Ethernet uses
 a token-based access method
 a random access method
 Aloha as an access method
 uses CSMA/CA as an access method

2) The IP protocol
 is a connection oriented protocol
 does not retransmits lost packets
 acknowledges received packets
 does not drop packets

3) The TTL (Time To Live) field is used by the IP protocol to


 detect errors
 detect payload errors
 detect only header errors
 prevent the packet from looping indefinitely in the network

4) 195.1.1.1 is
 a class C address
 a private address
 a public address
 a multicast address

5) 224.0.0.5 is
 a broadcast address
 a private address
 a loop-back address
 a multicast address

Question 4 (6 points)
The following frame was received over an Ethernet/IEEE 802.3 network. The CRC of the
frame is not displayed.

Frame 1
0180 c200 0000 0000 a2e4 91e1 0026 4242
0300 0000 0000 8000 0000 a2e4 91e0 0000
0000 8000 0000 a2e4 91e0 8004 0000 1400
0200 0f00 aaaa aa55 5555 5555

1) Why an Ethernet/IEEE 802.3 frame is preceded by a preamble and a Start Frame


Delimiter?
……………………………………………………………………………………
……………………………………………………………………………………

2
2) The previous frame is represented using hexadecimal digits. What is the binary value of
the first received bit of the frame?
…………………………………………………………………………………
…………………………………………………………………………………

3) What is the MAC destination address of the frame and what is its type?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
4) What is the MAC source address of the frame and what is its type?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………

5) What is the type of the received frame (Ethernet or IEEE 802.3)?


…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………

6) An Ethernet/IEEE 802.3 frame should have a minimal size of 64 bytes; otherwise padding
bytes are added to the Data field. Why an Ethernet/IEEE 802.3 should have a minimal
size?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………

7) Are there any padding bytes in this frame? If your response is yes, how many padding
bytes are present in the frame?
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

8) What is the next protocol that will process the data field of the frame?
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

9) What is the most high-level protocol transported by this frame?


……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

10) What is the purpose of this protocol?

3
……………………………………………………………………………………
……………………………………………………………………………………
11) What is the type of the equipment that had sent the frame and what are its receivers?
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

Question 5 (3 points)
A company has the class C address 195.14.12.0 to address its proper network. The company
has 5 different subnets. The number of hosts on each subnet may attain 20 hosts. For each
subnet, give the address of the subnet, the correspondent netmask, the broadcast address over
the subnet, and the lowest and highest addresses that could be allocated to hosts on each
subnet.

Subnet Address Netmask Broadcast Address Lowest Host Highest Host


Address Address

You might also like