Professional Documents
Culture Documents
INSTRUCTIONS TO CANDIDATES
STUDENT ID : A
GROUP : B
LECTURER : C
TOTAL
50
A. MAC address
B. IP address
C. Port address
D. Hop address
2. Field of MAC frame that alerts receiver and enables it to synchronize is known as
________________.
A. SFD
B. preamble
C. source address
D. destination address
A. 1 Mbps
B. 10 Mbps
C. 100 Mbps
D. 1000 Mbps
6. In Bluetooth, the _____ link is used when data integrity is more important than avoiding
latency.
A. Two addresses
B. Three addresses
C. Four addresses
D. Eight addresses
A. Infrastructure network
B. Ad-hoc network
C. Inclusive architecture
D. No-transition architecture
A. One ; Four
B. One ; Eight
C. Two ; Fourteen
D. One ; Seven
A. Physical
B. Logical Link Control (LLC)
C. Media Access Control (MAC)
D. Digital Service Access Point (DSAP)
11. A ______ normally connects LANs and WANs in the Internet and has a table that is used
for making decisions about the route.
A. router
B. bridge
C. repeater
D. none of the above
12. A repeater is a connecting device that operates in the _______ layer of the Internet
model.
A. network
B. data link
C. physical
D. all of the above
A. automatic
B. manual
C. semiautomatic
D. none of the above
14. A ________ bridge can forward and filter frames and automatically build its forwarding
table.
A. dual
B. transparent
C. simple
D. none of the above
15. In a bridged LAN, the _______ algorithm creates a topology in which each LAN can be
reached from any other LAN through one path only.
A. binary tree
B. spanning tree
C. unary tree
D. none of the above
Answer:
PART A
QUESTION 1 (3 Marks)
a) The following data is to be send, 1011001. If the divisor given is 1011, determine the
dividend in polynomial form.
1011001000
= X9+x7+x6+x3
¼ mark for each x
(1 mark)
Find the extra bits of the above data if odd parity is used.
(2 marks)
Q1
a) List THREE (3) implementations of Ethernet technologies and give the appropriate speed
for each.
(3 marks)
i) 5C:20:30:12:01:1A
ii) A5:1B:2E:20:08:EE
(2 marks)
Q2
a) Briefly explain the Basic Service Set (BSS) and Extended Service Set (ESS) in 802.11
wireless LAN.
The basic service set (BSS) is the building block of a wireless LAN. A BSS
without an AP is called an ad hoc architecture; a BSS with an AP is sometimes
referred to as an infrastructure network. (2 marks)
An extended service set (ESS) is made up of two or more BSSs with APs. In this
case, the BSSs are connected through a distribution system, which is usually
a wired LAN. (2 marks)
(3 marks)
b) Briefly explain two categories of frames in IEEE 802.11 wireless LAN.
(4 marks)
Q3
The Zenty Sdn.Bhd company has three offices. All offices are connected with back links and
three switches. The company has three departments Development, Production and
Administration. Development department has six computers. Production department has three
computers. Administration department also has three computers. Each office has two PCs
from development department and one from both production and administration department
shown in the diagram as follow:
Administration and production department have sensitive information and need to be separate
from development department. The network administrator wants to create three VLANs for
their network and assigned them to the related computers based on the following categories
Q4
(4 marks)
QUESTION 1 (8 Marks)
a) Generate the CRC bits for the following dataword 110110100 with divisor 1101.
1 0 0 0 1 1 0 1 0
1101 1 1 0 1 1 0 1 0 0 0 0 0
1 1 0 1
. 0 0 0 1
0 0 0 0
. 0 0 1 0
0 0 0 0
. 0 1 0 1
0 0 0 0
. 1 0 1 0
1 1 0 1
. 1 1 1 0
1 1 0 1
. 0 1 1 0
0 0 0 0
. 1 1 0 0
1 1 0 1
. 0 0 1 0
0 0 0 0
. 0 1 0
CRC – 3marks
Codeword = 110110100010 – 1mark
(4 marks)
Show the checksum process of the codeword at the receiver and identify either the
data accepted or rejected.
FACE
7641
DEAF
9592
1AAD
_____
2 FFFD - SUM(PARTIAL) – 1marks
2 - CARRY – ½ marks
_____
FFFF – WRAPPED SUM ½ marks
0000 – CHECKSUM – 1 mark
C1
(4 marks)
(2 marks)
b)
A / 37 B / 19 C / 78 D / 45
E / 25
F / 61
Figure above shows that three LANs are connected to the bridge that uses a dynamic table.
The given number represents the node address (B/24).
Fill in the dynamic table below after the given scenario has taken place.
(3 marks)
(3 marks)
C2