You are on page 1of 4

Suez Canal University Subject : Computer Network

The Faculty of Engineering Code : ELC 104


Department: Basic Engineering Level : 100
Mid Term Exam 2018/2019 Time: 60 Minute Total Mark 25
student name :………………….……

Question (1): Choose the correct answer (20 Marks)


1. What are two characteristics of fiber-optic cable? (Choose two.)
A. It is not affected by EMI or RFI.
B. Each pair of cables is wrapped in metallic foil.
C. It combines the technique of cancellation, shielding, and twisting to protect data.
D. It typically contains 4 pairs of fiber-optic wires.
E. It is more expensive than UTP cabling is.
2. What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)
A. error correction through a collision detection method
B. session control using port numbers
C. data link layer addressing
D. placement and removal of frames from the media
E. detection of errors through CRC calculations
F. delimiting groups of bits into frames
3. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in
the frame when it leaves host A?
A. DD:DD:DD:DD:DD:DD
B. 172.168.10.99
C. CC:CC:CC:CC:CC:CC
D. 172.168.10.65
E. BB:BB:BB:BB:BB:BB
F. AA:AA:AA:AA:AA:AA
4. Which procedure is used to reduce the effect of crosstalk in copper cables?
A. requiring proper grounding connections
B. twisting opposing circuit wire pairs together
C. wrapping the bundle of wires with metallic shielding
D. designing a cable infrastructure to avoid crosstalk interference
E. avoiding sharp bends during installation
5. Which address on a PC does not change, even if the PC is moved to a different network??
A. IP address
B. Port Address
C. default gateway address
D. MAC address
6. What is one difference between the client-server and peer-to-peer network models?
A. Only in the client-server model can file transfers occur
B. Every device in a peer-to-peer network can function as a client or a server
C. A peer-to-peer network transfers data faster than a transfer using a client- server network
D. A data transfer that uses a device serving in a client role requires that a dedicated server be present
7. What is the protocol that is used to discover a physical address from a known logical address
and what message type does it use?
A. ARP, multicast
B. DNS, unicast
C. ARP, broadcast
D. PING, broadcast
8. What is an important function of the physical layer of the OSI model?
A. It accepts frames from the physical media
B. It encapsulates upper layer data into frames
C. It defines the media access method performed by the hardware interface
D. It encodes frames into electrical, optical, or radio wave signals
9. Refer to the exhibit. Host A is attempting to contact Server B.
Which two statements correctly describe the addressing that
Host A will generate in the process? (Choose two.)
A. A packet with the destination IP address of Router B
B. A frame with the destination MAC address of Switch A
C. A packet with the destination IP address of Router A
D. A frame with the destination MAC address of Router A
E. A packet with the destination IP address of Server B
F. A frame with the destination MAC address of Server B
10. What will a host on an Ethernet network do if it receives a
frame with a destination MAC address that does not match its own MAC address?
A. It will discard the frame.
B. It will forward the frame to the next host.
C. It will remove the frame from the media.
D. It will strip off the data-link frame to check the destination IP address
11. What information is added during encapsulation at OSI Layer 3?
A. source and destination MAC
B. source and destination application protocol
C. source and destination port number
D. source and destination IP address
12. A television broadcast is an example of _______ transmission?
A. Simplex
B. Half Duplex
C. Full Duplex
D. Dual Duplex
13. In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.)?
A. when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated
B. When a faster delivery mechanism is needed
C. when delivery overhead is not an issue
D. when applications do not need to guarantee delivery of the data
E. when destination port numbers are dynamic
14. A computer in a given network is communicating with a specific group of computers. What type
of communication is this?
A. Broadcast
B. Unicast
C. Multicast
D. Any Cast
15. A web client is sending a request for a webpage to a web server. From the perspective of the
client, what is the correct order of the protocol that is used to prepare the request for
transmission?
A. HTTP, IP, TCP, Ethernet
B. HTTP, TCP, IP, Ethernet
C. Ethernet, TCP, IP, HTTP
D. Ethernet, IP, TCP, HTTP
16. In the OSI model, as a data packet moves from the lower to the upper layers, headers are….
A. Added
B. Removed
C. Rearranged
D. Modified
17. In the OSI model, encryption and decryption are functions of the ________ layer
A. Application
B. Presentation
C. Session
D. Transport
Suez Canal University Subject : Computer Network
The Faculty of Engineering Code : ELC 104
Department: Basic Engineering Level : 100
Mid Term Exam 2018/2019 Time: 60 Minute Total Mark 25
student name :………………….……
18. When a beam of light travels through media of two different densities, if the angle of incidence is
greater than the critical angle, _______ occurs
A. Reflection
B. Refraction
C. Incidence
D. Criticism
19. Signals with a frequency below 2 MHz use _______ propagation
A. Ground
B. Sky
C. Line of Sight
D. None of the above
20. Refer to the exhibit. A ping to PC3 is issued from PC0, PC1,
and PC2 in this exact order. Which MAC addresses will be
contained in the S1 MAC address table that is associated
with the Fa0/1 port?
A. just PC0 and PC1 MAC addresses
B. just the PC0 MAC address
C. just the PC1 MAC address
D. PC0, PC1, and PC2 MAC addresses in order
21. Membership in a VLAN can be based on ________.
A. interface numbers
B. MAC Address
C. IP Address
D. ALL above is correct
22. In a fully connected mesh topology with six computers, we need ________ links
A. 6
B. 15
C. 30
D. 5
Second Question (10 Marks)
1) create a system of three LANs with four bridges. The bridges (B1 to B4) connect the LANs as follow:
• B1 connects LAN1 and LAN2.
• B2 connects LAN1 and LAN3.
• B3 connects LAN2 and LAN3.
• B4 connects LAN1, LAN2, and LAN3.
Choose B1 as the root bridge. Show the forwarding and blocking ports, after applying the spanning tree
2) In the next figure, assume that the communication between the process with port address (I)which
running at device (M) and the process with port address (J) which running at device (R). Show the
content of packets and frames at the Network, Data link, and Transport Layers for each hop.

N/34 R1 O/40 P/45 R2 Q/50


M/30

LAN 1 LAN2 LAN3


R/55
LAN 1 LAN 2 LAN 3
R1 R2

Transport layer

I J Data I J Data I J Data


Network layer Data
M R I J Data M R I J Data M R I J Data
Data Link layer
34 30 M R I J Data T2 45 40 M R I J Data T2 55 50 M R I J Data T2

1 1

1 1
1
2

You might also like