Académique Documents
Professionnel Documents
Culture Documents
00331 .
..··I~··
~..
••••••
SLIIT
••••••
~~IIII!r;
Final Examination
Year 2, Semester 1 (2010)
I Duration: 3 Hours
Instructions to Candidates:
• This paper has 5 Questions.
• This paper contains 5 pages and cover page.
• Some useful commands are given at the end of the paper.
Final Examination - 20 I0
Data Communication & Computer Networks II - 1" Semester
00331 ..
Question 1) is based on Transmission Control Protocol. (24 marks)
0644 0017 0000 0025 0000 0012 5012 0400 0000 0000
Source Port Number (16 Bits) Destination Port Number (16 Bits)
Data
FIgure J
Answer the following questions. (Mention the base, if it is not in decimal. Ex: Hex or bin)
c. Write the window size and briefly explain the information given by this value.
(3 marks)
d. What can you say about this TCP segment by observing the values of six
different Control fields (flags)? (2 marks)
2. Briefly explain any two of the following Control fields (flags) if it is set to 1.
(Ex. URG flag = 1) (4 marks)
1. URG
11. PSH
111. RST
3. Write three timers used in TCP and briefly explain any two of them. (5 marks)
00331
Final Examination - 20 I 0
Data Communication & Computer Networks II- ]'1 Semester
Question 2) is based on addressing and routing configuration with Cisco routers. (22 marks)
2. Consider the following network diagram and write the commands / configurations to
the following questions. You need to mention the router prompt. (Rl, R2 - routers,
SW1, SW2 - switches, A to R - computers).
192.168.10.6 172.17.0.6
n/w 10.1.0.0 /16
172.17.0.5 172.17.0.7
192.168.10.5 192.168.10.7
Figure 2
a. From user mode of R2, entry to the privilege mode of R2. (1 mark)
e. Configure a suitable IP address to the 'serial 0' interface and configure the
clock rate as 64000 to the same interface in R2. (4 marks)
4. Why do we need to have redundant links from one LAN segment to the other? What
sort of problems will occur with the redundant links? (2 marks)
5. The following diagram shows a switched network. Bridge IDs of each switch and the
path costs are given in the diagram. Draw this diagram in your answer booklet.
Segment 2 Segment 4
Segme n t 1
2 2
I I
19 19 C: 100
H A: 300
I
I
I I
2 4
I I
19 0: 600
I I
2
Segment 3
Segment 5
4 I I
2
I B: 500 I 4 2
! E: 400 I I F: 200 I
19
4
19
Figure 3 Segment 6
b) Select and name the Root Port of each bridge as RP. (2.5 marks)
d) Name the designated port in each designated bridge as DP. (2.5 marks)
e) If selected Root Bridge is not working, then which is the next root bridge?
Explain the method it selects by Spanning Tree Protocol? (4 marks)
Final Examination - 20 I0
Data Communication & Computer Networks II- I" Semester
Question 4) is based on the Access Control List Security and Network security. (18 marks)
I. What are the fields of IP packet that can be checked by Extended Access Control
U~ ~~~
2. The network administrator wants to implement ACL security for the following
requirements for the network given below. (Assume IGRP has been applied as
routing protocol.) (8 marks)
192.168.10.6 172.17.0.6
n/w 10.1.0.0 /16
172.17.0.5 172.17.0.7
192.168.10.5 192.168.10.7 Figure 4
Select the most suitable routers and configure Access Control Lists for the above
requirements. Apply them to most suitable interfaces. (Show the prompt of router in
your configuration.)
4. Write two types offirewalls and mention the ISO OSI layer(s) it operates. (2 marks)
3. Briefly explain the fragmentation process in internet protocol and specify how the
fragmentation offset value creates. (6 marks)
End of Paper