Professional Documents
Culture Documents
APRIL/MAY 2019
02 May 2019
INSTRUCTIONS TO CANDIDATES
Question 1
(i) ping
(ii) arp
[2+2 marks]
[Total 25 marks]
Page 1 of 5
CSE 3126Y – Network Information Systems
Question 2
(a) Consider sending a 6050-byte datagram into a link that has a Maximum
Transmission Unit of 1196 bytes. Suppose the original datagram is stamped with
the identification number 222, how many fragments are generated? What are
their characteristics?
(You should give the value of the 5 key fields (ID, Datagram Length, Data, M,
and offset) as used in fragmentation for each fragment created).
[6 marks]
(c) Describe TWO ways by which a router populates its routing table.
[2*2 marks]
(d) Making use of state diagram, explain the following Transmissions Control
Protocol scenarios
(i) Loss Acknowledgement (use the initial sequence number of 140 and a data of
20 bytes to be sent).
(ii) Connection establishment.
[2 + 2 marks]
[1+3 marks]
[Total 25 marks]
Page 2 of 5
CSE 3126Y – Network Information Systems
Question 3
(b) Provide TWO advantages and TWO disadvantages of using a star topology.
[4 marks]
(c) A movie having a screen resolution of 1900 x 1200 pixels, usually played at 25
frames per second, uses 3 bytes/pixel. This movie needs to be streamed over a
medium. Find the time taken in minutes, to stream the movie, given that the
length of the movie is 45 minutes, and the medium used is 1000Base-LX (1Gbps).
[3 marks]
(d) You are working as a network consult and you have been asked to advise a client
on the use of the Token based access control method. Briefly elaborate on the
operation of the token based access control method.
[4 marks]
(f) With the aid of a diagram, describe in details how the Secure Socket Layer (SSL)
handshake protocol works.
[8 marks]
[Total 25 marks]
Page 3 of 5
CSE 3126Y – Network Information Systems
Question 4
(a) Study Figure 1. Assume that the Client PC wants to retrieve the homepage of the
company Foodhub, www.foodhub.co.mu, but the Client PC does not possess the
www.foodhub.co.mu web server IP address.
Local DNS
for foodhub.co.mu
Root DNS Server
Internet
Local DNS
Client PC
Figure 1
(i) Using iterative query, describe the process by which the Client PC will
obtain the IP address for the webserver www.foodhub.co.mu. Assume
there is no cached entry for the .mu at the Local Domain Name Server
(DNS) server.
[5 marks]
(ii) Write down the resource record, for the web server, www.foodhub.co.mu,
whose IP address is 172.89.2.112 and it is stable for 5 hours.
[3 marks]
Page 4 of 5
CSE 3126Y – Network Information Systems
(b) Explain, in detail, how an end node (for example a personal computer) finds the
DHCP (Dynamic Host Configuration Protocol) server when it first boots up.
[4 marks]
(c) There are different Data Traffic Analysis processes available. Describe the Traffic
Volume analysis process.
[2 marks]
(d) You are currently designing the network for a multinational company and you
have adopted a Hierarchical Network design approach.
(e) A customer network would like to deploy a network management system (NMS)
to monitor multiple network devices such as a router. As a result, the customer
network will be using Simple Network Management Protocol (SNMP) as its
network management protocol.
Page 5 of 5