Professional Documents
Culture Documents
Data Communications Computer Networks-II 206
Data Communications Computer Networks-II 206
00331 .
.. .. I~
~~IIII!r;
Sri Lanka Institute of Information Technology
SLIIT
I Duration:
3 Hours
Instructions
to Candidates: This paper has 5 Questions. This paper contains 5 pages and cover page. Some useful commands are given at the end of the paper.
00331 ..
(24 marks)
Question 1) is based on Transmission Control Protocol. 1. Following is a dump of a TCP header in the hexadecimal format.
0644 0017 0000 0025 0000 0012 5012 0400 0000 0000 Source Port Number (16 Bits) Destination Port Number (16 Bits)
Sequence Number (32 Bits) Acknowledgement Header Reserved Length Bits (6) (4 bits) G R C S H S T U A P R S Number (32 Bits) F I N Urgent Pointer (16 Bits) Options & Paddings Data FIgure J Window Size (16 Bits)
Y
N
Answer the following questions. (Mention the base, if it is not in decimal. Ex: a. Write the source port number. b. Write the sequence number. c.
Hex
or
bin)
(J mark)
(1 mark)
Write the window size and briefly explain the information given by this value.
(3 marks)
d. What can you say about this TCP segment by observing the values of six different Control fields (flags)? e. What is the size (in bytes) of this TCP header?
(2 marks) (2 marks)
1)
3. Write three timers used in TCP and briefly explain any two of them. 4. Draw the TCP connection establishment process (3-way-handshake
in a timing
diagram) and write the TCP client states and TCP server states. Assume initially TCP client is in CLOSED state and TCP server is in LISTEN state.
(6 marks)
Technology
.'
00331
Final Examination - 20 I 0 Data Communication & Computer Networks II-
]'1 Semester
Question 2) is based on addressing and routing configuration with Cisco routers. (22 marks) 1. What are the four types of memories used in a router?
(4 marks)
2. Consider the following network diagram and write the commands / configurations to the following questions. You need to mention the router prompt. (Rl, R2 - routers, SW1, SW2 - switches, A to R - computers).
172.17.0.7
a. From user mode of R2, entry to the privilege mode of R2. b. Entry to the configuration c. mode of R2
e. Configure a suitable IP address to the 'serial 0' interface and configure the clock rate as 64000 to the same interface in R2. f.
(4 marks)
Assume that 'Ethernet 0' interface is already configured. Configure dynamic routing in R2. Use IGRP as the routing protocol.
(4 marks) (2 marks) (2 marks)
g. What is the command to verify the configuration you did? h. Save the configuration to the NVRAM.
Technology
Final Examination - 2010 Data Communication & Computer Networks II - I" Semester
00331
Question 3) is based on Switching, Virtual LAN and Spanning Tree Protocol. (20 marks) 1. Write three types of internal switching paths and mention which is the most efficient method. 2. List two advantages of creating VLANs. 3. List two protocols used in VLAN.
(2 marks) (2 marks) (1 mark)
4. Why do we need to have redundant links from one LAN segment to the other? What sort of problems will occur with the redundant links?
(2 marks)
5. The following diagram shows a switched network. Bridge IDs of each switch and the path costs are given in the diagram. Draw this diagram in your answer booklet.
Segme n t 1 Segment 2 2 2 I I Segment 4
19
I
19
A: 300
I
2
I
I
C: 100
I
4
I
19
I
Segment 3
0: 600
2
I
Segment 5
I B: 500 I
2 4 2
!
19
E: 400
I F: 200 I
4
19
Figure 3
Segment 6
a) Mark the Root Bridge in the diagram. b) Select and name the Root Port of each bridge as RP. c) Mark the designated Bridge for each segment. d) Name the designated port in each designated bridge as DP. Explain the method it selects by Spanning Tree Protocol?
Sri Lanka Institute of Information Page 3 of5 Technology
e) If selected Root Bridge is not working, then which is the next root bridge?
(4 marks)
00331.
Final Examination - 20 I0 Data Communication & Computer Networks II- I" Semester
Question 4) is based on the Access Control List Security and Network security.
(18 marks)
I. What are the fields of IP packet that can be checked by Extended Access Control
U~
~~~
2. The network administrator wants to implement ACL security for the following requirements for the network given below. (Assume IGRP has been applied as routing protocol.)
(8 marks)
172.17.0.7
a. Host A is not allowed to telnet to the host P in LAN 2. b. Other hosts in LAN 1 can telnet to the host P in LAN 2. c. Host P is allowed to access any web server in LAN I. d. Host P is not allowed to access any other servers in LANI. e. Any unspecified communication should be not allowed. Select the most suitable routers and configure Access Control Lists for the above requirements. Apply them to most suitable interfaces. (Show the prompt of router in your configuration.)
(2 marks)
4. Write two types offirewalls and mention the ISO OSI layer(s) it operates. (2 marks) 5. Write two servers that can be placed in De Militarized Zone.
(2 marks)
Technology
.'.
pSI
00331 .
Question 5) 1. Explain the ARP and RARP protocols. 2. Briefly explain the IGMP protocol.
3. Briefly explain the fragmentation process in internet protocol and specify how the fragmentation offset value creates. (6 marks)
USEFUL COMMANDS
AND COMPUTER
Standard
Commands
Command
Configuration Description
Mode and
I permit}
Global command for standard numbered access lists Global command for extended numbered access lists
access-list access-list-number { deny I permit} source [ source-wildcard] destination [ destinationwildcard] [ log] ip access-group { number
I name
[ in [out j}
access-list access-list-number {permit I deny} protocol source source-wildcard [operator port] destination destination-wildcard [operator port] [established] [log] ip access-group access-list-number {in lout}
End of Paper
Technology