Académique Documents
Professionnel Documents
Culture Documents
Table 1
No.
10
11
Time
1.666157
1.760113
Source
172.17.11.37
172.17.11.40
Destination
172.17.11.25
172.16.3.109
Protocol
NBNS
TCP
12
1.957625
172.17.11.46
172.17.11.25
BROWSER
13
14
15
2.270758
2.416319
2.979961
HewlettP_b8:d9:a7
172.17.11.37
172.17.11.40
Broadcast
172.17.11.25
172.16.3.222
ARP
NBNS
TCP
16
2.980320
172.16.3.222
172.17.11.40
TCP
17
2.980330
172.17.11.40
172.16.3.222
TCP
18
19
2.980395
3.180575
172.17.11.40
172.16.3.222
172.16.3.222
172.17.11.40
HTTP
TCP
20
3.181975
172.17.11.40
209.85.175.103
ICMP
21
3.182155
209.85.175.103
172.17.11.40
ICMP
(a)
Info
Identify and describe the function of the TCP/IP application layer protocol
captured in Table 1.
(b)
[2 marks]
[4 marks]
Page 2 of 9
(c) The capture shown in Table 1 shows a series of ping process. Compare the
ICMP requests and replies TTL values: why are there differences?
[3 marks]
(d) The trace for ICMP turns to be continuous from Line 22 onwards. As a
network consultant, propose and justify a plan to curb the event from
recurring in the network.
[6 marks]
Page 3 of 9
(a)
Router
WAN
192.17.15.1/30
192.17.15.2/30
PC1
130.45.30.4/16
Switch
Server
130.45.30.110/16
PC2
130.45.30.15/16
Figure 1
(i) Identify the default gateway of the network. Justify your answer.
[3 marks]
(ii) The IP addresses of the router and the immediate connected router
to the Internet are 192.17.15.1/30 and 192.17.15.2/30 respectively.
Identify the network address of the WAN connection and the
subnet mask.
[2 marks]
[3 marks]
Page 4 of 9
(b)
The packet is checked on its integrity. It relies on its frames CRC to check
on the content by using a four-bit error detection scheme and is constructed
for a four-bit information.
The generator polynomial is G(x) = x3 + x + 1.
[4 marks]
[3 marks]
Page 5 of 9
(a)
Figure 2
[1 mark]
[1 mark]
(iii) State the other TWO (2) UTP cable types other than stated in
Question (a(i)) and their usages.
(iv)
[4 marks]
(b)
[5 marks]
Page 6 of 9
[4 marks]
Figure 3
Analyze the
(b)
[4 marks]
[4 marks]
(c) Does the Domain Name System (DNS) application use the same transport
layer protocol as the one used in transmitting the file in Figure 3?
Justify your answer.
[3 marks]
(d) The quality of the transmitted image can be quite a problem when the web
traffic is congested.
[4 marks]
Page 7 of 9
(a)
Figure 4
[5 marks]
(b)
[5 marks]
A group of friends walks into a caf and uses the free wifi for Internet
services. Demonstrate the protocol used for IP address assignment in this
situation.
[5 marks]
Page 8 of 9
Zalora Malaysia intends to open three new branches in Penang, Johor and Pahang. These
three branches are connected to the headquarters in Kuala Lumpur.
As a network
administrator, you are asked by the organization to suggest the most appropriate network
planning for these offices based on the following requirements:
Propose and design the chosen network based on the given requirements above. Provide
a sketch and justify your design to allow further expansion.