Vous êtes sur la page 1sur 8

EECB423, Semester II 2013/2014

PART A: STRUCTURED QUESTION [75 marks]


QUESTION 1 [15 marks]

The following table shows a sniffing capture run in a local computer.

Table 1
No.

10
11

Time

1.666157
1.760113

Source

172.17.11.37
172.17.11.40

Destination

172.17.11.25
172.16.3.109

Protocol

NBNS
TCP

12

1.957625

172.17.11.46

172.17.11.25

BROWSER

13
14
15

2.270758
2.416319
2.979961

HewlettP_b8:d9:a7
172.17.11.37
172.17.11.40

Broadcast
172.17.11.25
172.16.3.222

ARP
NBNS
TCP

16

2.980320

172.16.3.222

172.17.11.40

TCP

17

2.980330

172.17.11.40

172.16.3.222

TCP

18
19

2.980395
3.180575

172.17.11.40
172.16.3.222

172.16.3.222
172.17.11.40

HTTP
TCP

20

3.181975

172.17.11.40

209.85.175.103

ICMP

21

3.182155

209.85.175.103

172.17.11.40

ICMP

(a)

Info

Name query NB DHP4_Wheat<00>


ravehd > opsmgr [syn] Seq=0 Win=65535 Len=0
MSS=1460
Host Announcement DHP4_Rye, Workstation,
Server, NT Workstation
Who has 172.17.11.1? Tell 172.17.11.30
Name query NB DHP4_Wheat<00>
fazzt-ptp > http-alt [SYN] Seq=0 Win=65535 Len=0
MSS=1460
http-alt > fazzt-ptp [SYN,ACK] Seq=0 Ack=1
Win=8192 Len=0 MSS=1460
fazzt-ptp > http alt [ACK] Seq=1 Ack=1 Win=65535
Len=0
GET http://www.mph.com.my/HTTP/1.1
http-alt > fazzt ptp [ACK] Seq=1 Ack=578
Win=64240 Len = 0
74 Echo (ping) request id=0x0200, seq=15618/573,
ttl=128
74 Echo (ping) reply id=0x0200, seq=15618/573,
ttl=52

Identify and describe the function of the TCP/IP application layer protocol
captured in Table 1.

(b)

[2 marks]

Among the processes captured in Table 1 is a connection set up. Analyze


the capture to identify the connection set up lines, the source and the
destination device IP addresses.

[4 marks]

Page 2 of 9

EECB423, Semester II 2013/2014

(c) The capture shown in Table 1 shows a series of ping process. Compare the
ICMP requests and replies TTL values: why are there differences?
[3 marks]

(d) The trace for ICMP turns to be continuous from Line 22 onwards. As a
network consultant, propose and justify a plan to curb the event from
recurring in the network.

[6 marks]

Page 3 of 9

EECB423, Semester II 2013/2014

QUESTION 2 [15 marks]

(a)

The network diagram in the following Figure 1 shows an IP protocol-based network.


The network is connected to the Internet.

Router

WAN
192.17.15.1/30
192.17.15.2/30

PC1
130.45.30.4/16

Switch

Server
130.45.30.110/16

PC2
130.45.30.15/16

Figure 1

(i) Identify the default gateway of the network. Justify your answer.

[3 marks]

(ii) The IP addresses of the router and the immediate connected router
to the Internet are 192.17.15.1/30 and 192.17.15.2/30 respectively.
Identify the network address of the WAN connection and the
subnet mask.

[2 marks]

(iii) During a testing and validating process from a remote PC outside


of the network, an IP packet has been sent to PC1
(130.45.30.4/16). The packet has never reached PC1. However,
the packet managed to pass through the router.
Examine TWO (2) possible causes that might have caused the
incident.

[3 marks]

Page 4 of 9

EECB423, Semester II 2013/2014

(b)

The packet is checked on its integrity. It relies on its frames CRC to check
on the content by using a four-bit error detection scheme and is constructed
for a four-bit information.
The generator polynomial is G(x) = x3 + x + 1.

(i) Encode the information sequence I(x) using the generator


polynomial if the data is given as 1100.

[4 marks]

(ii) E(x) = 1101 is received. Justify whether the packet contains


any error.

[3 marks]

Page 5 of 9

EECB423, Semester II 2013/2014

QUESTION 3 [15 marks]

(a)

The following figure shows the pinouts of a type of cable.

Figure 2

(i) What is the cable shown in Figure 2 above?

[1 mark]

(ii) Where do we usually use the cable type in Question (a(i))?

[1 mark]

(iii) State the other TWO (2) UTP cable types other than stated in
Question (a(i)) and their usages.

(iv)

[4 marks]

A student doing an experiment has used the cable in Figure 2 to


connect two routers. Later on, the student used the same cable as
a console. Justify your answer on the cable selection.

(b)

[5 marks]

Fatimah made a phone call to her hometown. During her conversation


with her parents, she realized that she has been hearing another
ongoing conversation across the line.
Explain the situation happened in relation to the physical layer.

Page 6 of 9

[4 marks]

EECB423, Semester II 2013/2014

QUESTION 4 [15 marks]

The following figure shows an image captured from a file transmission.

Figure 3

(a) Figure 3 shows an effect from a file transmission.

Analyze the

transmission method and the protocols involved in this process.

(b)

[4 marks]

Suggest a solution that can overcome the problem encountered in Figure 3.


Next, illustrate the mechanism that is available to solve the quality of the
transmitted picture over the Internet.

[4 marks]

(c) Does the Domain Name System (DNS) application use the same transport
layer protocol as the one used in transmitting the file in Figure 3?
Justify your answer.

[3 marks]

(d) The quality of the transmitted image can be quite a problem when the web
traffic is congested.

Compare and contrast the advantages of the two

transport control protocols in managing traffic congestions and integrity of


data.

[4 marks]
Page 7 of 9

EECB423, Semester II 2013/2014

QUESTION 5 [15 marks]

(a)

The following figure shows a physical connection in a LAN segment.

Figure 4

(i) The technology above has been obsolete as of the functionalities.


Examine the technology above and explain the mechanism of
operation and how the topology works.

[5 marks]

(ii) Propose a solution to overcome the problem of the network in


Question 5(a(i)) with elaboration on the mechanism of operation
and the topology used.

(b)

[5 marks]

A group of friends walks into a caf and uses the free wifi for Internet
services. Demonstrate the protocol used for IP address assignment in this
situation.

[5 marks]

Page 8 of 9

EECB423, Semester II 2013/2014

PART B: DESIGN QUESTION [25 marks]

Zalora Malaysia intends to open three new branches in Penang, Johor and Pahang. These
three branches are connected to the headquarters in Kuala Lumpur.

As a network

administrator, you are asked by the organization to suggest the most appropriate network
planning for these offices based on the following requirements:

IPv4 network address: 172.130.0.0/16

Kuala Lumpur needs to accommodate at least 200 hosts

Penang needs to accommodate at least 50 hosts

Johor needs to accommodate at least 100 hosts

Pahang needs to accommodate at least 25 hosts

Bandwidth requirement: 100 Mbps

Propose and design the chosen network based on the given requirements above. Provide
a sketch and justify your design to allow further expansion.

-END OF QUESTION PAPERPage 9 of 9

Vous aimerez peut-être aussi