You are on page 1of 15

CONFIDENTIAL CS/DEC 2018/ITT300

UNIVERSITI TEKNOLOGI MARA


TEST 2

COURSE : INTRODUCTION TO DATA COMMUNICATION &


NETWORKING
COURSE CODE : ITT300
DATE : 11 DECEMBER 2018
TIME : 2 HOURS

INSTRUCTIONS TO CANDIDATES

1. This question paper consists of THREE (3) parts.

PART A (15 Questions)


PART B (4 Questions)
PART C (2 Question)
2. Answer ALL questions in the Answer Booklet. Start the answer for each question
on a new page.

NAME : PART MARK

STUDENT ID : A

GROUP : B

LECTURER : C

TOTAL
50

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


PART A (15 MARKS)

ANSWER ALL QUESTIONS

1. One of the fields in Ethernet frame is ________________.

A. MAC address
B. IP address
C. Port address
D. Hop address

2. Field of MAC frame that alerts receiver and enables it to synchronize is known as
________________.

A. SFD
B. preamble
C. source address
D. destination address

3. CSMA/CD is not used in Ten-Gigabit Ethernet because it _______________.

A. operates only in half-duplex mode


B. operates only in simplex mode
C. operates only in full-duplex mode
D. operates in half-duplex and simplex modes

4. The Standard Ethernet is designed to operate at ______________.

A. 1 Mbps
B. 10 Mbps
C. 100 Mbps
D. 1000 Mbps

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


5. Thick Ethernet (10Base5) uses _______________ topology with an external transceiver
connected via a tap to a ______________cable.

A. star, fiber optic


B. star, unshielded twisted pair (UTP)
C. bus, thick coaxial
D. bus, thin coaxial

6. In Bluetooth, the _____ link is used when data integrity is more important than avoiding
latency.

A. Synchronous Connection-oriented ( SCO)


B. Point Coordination Function (PCF)
C. Asynchronous Connectionless Link (ACL)
D. Distributed Connection Function (DCF)

7. In IEEE 802.11 wireless LAN, the addressing mechanism can include up to


______addresses.

A. Two addresses
B. Three addresses
C. Four addresses
D. Eight addresses

8. In IEEE 802.11 wireless LAN, a BSS with an AP is sometimes referred to as ________.

A. Infrastructure network
B. Ad-hoc network
C. Inclusive architecture
D. No-transition architecture

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


9. A Bluetooth piconet consists of _____ primary device(s) and up to ____ secondary
devices.

A. One ; Four
B. One ; Eight
C. Two ; Fourteen
D. One ; Seven

10. In Bluetooth, the baseband layer is roughly equivalent to ___________ sublayer in


Ethernet.

A. Physical
B. Logical Link Control (LLC)
C. Media Access Control (MAC)
D. Digital Service Access Point (DSAP)

11. A ______ normally connects LANs and WANs in the Internet and has a table that is used
for making decisions about the route.

A. router
B. bridge
C. repeater
D. none of the above

12. A repeater is a connecting device that operates in the _______ layer of the Internet
model.

A. network
B. data link
C. physical
D. all of the above

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


13. In a(n) _______ configuration, the administrator types the port numbers, the IP
addresses, or other characteristics, using the VLAN software.

A. automatic
B. manual
C. semiautomatic
D. none of the above

14. A ________ bridge can forward and filter frames and automatically build its forwarding
table.

A. dual
B. transparent
C. simple
D. none of the above

15. In a bridged LAN, the _______ algorithm creates a topology in which each LAN can be
reached from any other LAN through one path only.

A. binary tree
B. spanning tree
C. unary tree
D. none of the above

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


PART A (15 MARKS)

Answer:

1. =A= =B= =C= =D= 9. =A= =B= =C= =D=

2. =A= =B= =C= =D= 10. =A= =B= =C= =D=

3. =A= =B= =C= =D= 11. =A= =B= =C= =D=

4. =A= =B= =C= =D= 12. =A= =B= =C= =D=

5. =A= =B= =C= =D= 13. =A= =B= =C= =D=

6. =A= =B= =C= =D= 14. =A= =B= =C= =D=

7. =A= =B= =C= =D= 15. =A= =B= =C= =D=

8. =A= =B= =C= =D=

PART A

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


PART B (22 MARKS)

QUESTION 1 (3 Marks)

a) The following data is to be send, 1011001. If the divisor given is 1011, determine the
dividend in polynomial form.

1011001000

= X9+x7+x6+x3
¼ mark for each x

(1 mark)

b) If the following data is going to be transferred

10000101 10100100 1101010 10110111

Find the extra bits of the above data if odd parity is used.

100001010 101001000 11010101 101101111

½ marks for each extra bits

(2 marks)

Q1

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


QUESTION 2 (5 Marks)

a) List THREE (3) implementations of Ethernet technologies and give the appropriate speed
for each.

Standard Ethernet – 10 Mbps


Fast Ethernet – 100 Mbps
Gigabit Ethernet – 1Gbps
Ten-Gigabit Ethernet – 10 Gbps

(ANY *each correct listing and speed is 1 mark)

(3 marks)

b) Define the type of the following Ethernet destination address.

i) 5C:20:30:12:01:1A
ii) A5:1B:2E:20:08:EE

i) 5C:20:30:12:01:1A -- C = 1100 – unicast address


ii) A5:1B:2E:20:08:EE -- 5 = 0101 – multicast address
(*each correct listing - 1 mark)

(2 marks)

Q2

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


QUESTION 3 (7 Marks)

a) Briefly explain the Basic Service Set (BSS) and Extended Service Set (ESS) in 802.11
wireless LAN.

The basic service set (BSS) is the building block of a wireless LAN. A BSS
without an AP is called an ad hoc architecture; a BSS with an AP is sometimes
referred to as an infrastructure network. (2 marks)

An extended service set (ESS) is made up of two or more BSSs with APs. In this
case, the BSSs are connected through a distribution system, which is usually
a wired LAN. (2 marks)

(3 marks)
b) Briefly explain two categories of frames in IEEE 802.11 wireless LAN.

i) Management Frames are used for initial communication between


stations and access points
ii) Control frames are used for accessing the channel and acknowledging
frames.
iii) Data frames are used for carrying data and control information.

(ANY 2 answer correct 2 marks each)

(4 marks)

Q3

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


QUESTION 4 (4 Marks)

The Zenty Sdn.Bhd company has three offices. All offices are connected with back links and
three switches. The company has three departments Development, Production and
Administration. Development department has six computers. Production department has three
computers. Administration department also has three computers. Each office has two PCs
from development department and one from both production and administration department
shown in the diagram as follow:

OFFICE 1 OFFICE 2 OFFICE 3

Administration and production department have sensitive information and need to be separate
from development department. The network administrator wants to create three VLANs for
their network and assigned them to the related computers based on the following categories

VLAN Admin for Administration department

VLAN Dev for Development department

VLAN Pro for Production department

Draw the VLAN diagram based on the above information.

Q4

(4 marks)

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


PART C (16 MARKS)

QUESTION 1 (8 Marks)

a) Generate the CRC bits for the following dataword 110110100 with divisor 1101.

1 0 0 0 1 1 0 1 0
1101 1 1 0 1 1 0 1 0 0 0 0 0
1 1 0 1
. 0 0 0 1
0 0 0 0
. 0 0 1 0
0 0 0 0
. 0 1 0 1
0 0 0 0
. 1 0 1 0
1 1 0 1
. 1 1 1 0
1 1 0 1
. 0 1 1 0
0 0 0 0
. 1 1 0 0
1 1 0 1
. 0 0 1 0
0 0 0 0
. 0 1 0

CRC – 3marks
Codeword = 110110100010 – 1mark

(4 marks)

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


b) Suppose the following message received using checksum of hexadecimal number:

FACE 7641 DEAF 9592 1AAD

Show the checksum process of the codeword at the receiver and identify either the
data accepted or rejected.

FACE
7641
DEAF
9592
1AAD
_____
2 FFFD - SUM(PARTIAL) – 1marks
2 - CARRY – ½ marks
_____
FFFF – WRAPPED SUM ½ marks
0000 – CHECKSUM – 1 mark

No error on data – data accepted – 1 mark

C1

(4 marks)

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


QUESTION 2 (8 Marks)

a) Briefly explain the function of router.

- routers implement layer 3 or network layer functions.


- to forward packets based upon a routing table.
- It evaluates the network addresses of the incoming packets and decides
which interface to forward the packet
Any 1 answer – 2 marks each

(2 marks)

b)

A / 37 B / 19 C / 78 D / 45

E / 25
F / 61

Figure above shows that three LANs are connected to the bridge that uses a dynamic table.
The given number represents the node address (B/24).

Fill in the dynamic table below after the given scenario has taken place.

Operation Address Port

Node B send a frame to node D 19 1


Node F send a frame to node E 61 2

Node D send a frame to node A 45 3

(3 marks)

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


c) The figure below shows the graph representation for a system of three LANs with three
bridges. Show the forwarding and blocking ports if spanning tree algorithm is used to
eliminate loop problem.

B1 (ID- 271) LAN 1 B2 (ID- 65)

LAN 2 B3 (ID- 77) LAN 3

(3 marks)

B1 (ID- 271) LAN 1 B2 (ID- 65)

LAN 2 B3 (ID- 77) LAN 3

Blocking port – 1.5 marks


Forwarding port – 1.5 marks

C2

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


-END OF ANSWER SCHEME-

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

You might also like