You are on page 1of 7

SCR2213

CONFIDENTIAL

UNIVERSITI TEKNOLOGI MALAYSIA


MIDTERM EXAM 1 (TEST 1)
SEMESTER I 2009/2010

SUBJECT CODE : SCR2213


SUBJECT TITLE : NETWORK COMMUNICATION
COURSE : SCV, SCD, SCR, SCJ, SCI, SCS
DURATION : 2 HOURS 30 MINUTES
DATE : 19 AUGUST 2009

INSTRUCTIONS TO CANDIDATES:

Answer all questions in the answer booklet provided.

Warning!
Students who are caught cheating during the examination will be reported to the
disciplinary board for action to suspend the student for one or two semesters.

Name

Metric No

Lecturer MARINA BINTI MD ARSHAD 01 / 02


SYED OTHMAWI BIN ABD RAHMAN 03 / 04
FIROZ BIN YUSUF PATEL DAWOODI 05 / 06
ANAZIDA BINTI ZAINAL 07 / 08
KAMALRULNIZAM BIN ABU BAKAR 09
MD. ASRI BIN NGADI 10

Page 1
SC
CR2213

Quesstion 1 [20 marks]


m

(a).
i. Draw the OSI model and
a describee the primaryy function off each layer. [7]

ii. What is the benefi


fit of having a layered mo
odel? [2]

iii. Give one


o examplee of layered m
model comm
munication pprotocol. [1]

(b).
m have mulltiple commuunications concurrently i.e ftp, http, email
i. A node may
and instannt messagingg. What enabble multiple services/appplications to run
simultaneeously withouut getting juumbled up? Which
W layer this mechannism is
managed?? [2]

ii. IP addresssing enabless packet to reeach the righht network. Which


W layer is
associated
d with IP add dressing? Which
W addresss is used to eensure that th
he frame
reaches its destinationn node? [3]

iii. Identify X and Y prottocol data unnit (PDU) naaming conveention from the
t table
below. [2]]
Data Applicatiion Layer PDDU
X Transportt Layer PDU U
Packet Internetw
work layer PDDU
Y Network Access Layer PDU
Bits Physical transmissionn of binary data
d over thee media

(c). A high qualitty image is too be sent froom A to B ass depicted beelow. The sizze of the
image is very largge and it is sent
s in continnuous stream m. [3]

A B

C D

Nodees C and D have


h to wait until the trannsmission off the image iis done beforre they
can proceed
p sendding some daata to B. Gennerally, the weaknesses
w oobtained from
m the
scenaario above arre:
• C and D have h to wait causes delayy. They havee to wait unttil A is finishhed with
the transmmission.
• If the imaage has to bee retransmitteed, the wholle image neeeds to be
retransmittted.
• The transm mission of thhe image connsumes large bandwidthh

P
Page 2
SCR2213

How can we rectify the above weaknesses?

Question 2 [20 marks]

(a). Which three layers of the OSI model make up the Application Layer of the
TCP/IP model? [3]

(b). Is the chatting application in Yahoo Messenger (an instant messaging service) a
peer-to-peer or client/server application? Explain. [2]

(c). In the diagram above, there is a user at www.utm.my who wants to connect to his
yahoo email account. Explain the steps taken before an HTTP connection occurs
between the user computer and mail.yahoo.com server. (Hints: Assume that the
utm.my DNS server does not know the IP address of mail.yahoo.com) [8]

(d). The next day, you tried to go to mail.yahoo.com but failed to get the web page.
You complained to the IT manager. Your IT manager verified the cables and network
settings, but nothing unusual was found. Then he typed the IP address of yahoo mail
server directly into the browser and successfully brings up the web page. What do you
think happened and state your reasoning? [3]

Page 3
SCR2213

(e). Now the browser on your PC has the IP number for the mail server at yahoo.com.
It will then send a request message to a server. Name the three common message types
for HTTP protocol that the client uses to request the web page and the server uses to
respond. [3]

(f). What is the top-level domain of the URL http://us.mg1.mail.yahoo.com/dc/ [1]

Question 3 [30 marks]

(a). Indentify (i) to (vii) in the following table. [7]


Application Protocol Type Port Number
(i) (ii) 80
smtp (iii) (iv)
(v) UDP 53
ftp (vi) 20,21
telnet (vii) 23

(b). TCP is a connection oriented protocol. Explain the following TCP Segment
header fields. [6]
• Source port
• Sequence number
• Window

(c). To establish a TCP connection, the hosts perform a three-way handshake. Draw
the following three–way handshake diagram with the given information. [3]
Step 1: Step 2: Step 3:
SEQ = 200 SEQ 400

(d). One way to control the data flow is to use the dynamic windows sizes. When
network resources are constrained, TCP can reduce the window size to require that the
received segments be acknowledge frequently. Draw a diagram that shows the
following scenario. [6]
• Window size for sender and receiver is 6000

Page 4
SCR2213

• Each segment size is 3000 bytes


• Sender needs sends 12000 bytes
• Start with Sequence number 1
• All the segments arrived successfully except for the 3rd segment due to the
congestion in the network
• Receiver sets the new windows size to 3000

(e).
i. Explain the following characteristics of UDP. [6]
• Lower overhead
• Connectionless
• Unreliable

ii. State 2 applications that use UDP. [2]

Question 4 [30 marks]

(a). List two network layer protocol. [2]

(b). Based on the figure below, where are these fields located in a packet? [2]

(c). State the fields (i) to (vi) for the corresponding descriptions. [6]

Description Field
It is used for error checking the packet header. (i)
It contains an 8-bit binary value that is used to determine the (ii)
priority of each packet.
It contains the IP version number (iii)
It contains a 32-bit binary value that represents the packet source (iv)
Network layer host address.
It is an 8-bit binary value that indicates the remaining "life" of the (v)
packet.
There is provision for additional fields in the IPv4 header to (vi)
provide other services but these are rarely used.

Page 5
SCR2213

(d). Refer to the following figure below.

i. Complete the following routing tables: [8]

Router A:
Learned * Network Address Interface

Router B:
Learned * Network Address Interface

* Hint (C for directly connected, R for via router)

ii. Name a tool or command that can be used to identify the connection between two
PCs. [2]

iii. What are the two possible problems if the connection between the two PCs
fails? [4]

(e).
i. Differentiate between static and dynamic routing. [4]

ii. State two common routing protocols. [2]

Page 6
SC
CR2213

Extraa Questionss

Soalaan Firoz

UDP datagrams are


a sent do thhe destinatioon using diffferent paths oor routes. [2]
• What happpens to out ofo order dataagrams?
• If datagraams are lost, what happenns?

TCP is a connecttion orientedd protocol. Exxplain brieflly the follow


wing TCP Seegment
headeer fields. [5]
• Acknowleedgement nuumber
• Checksum m

ween routed and routing protocols. [2]


Diffeerentiate betw [

(b). IP
Pv4 is an exxample of Neetwork Layeer protocol. Briefly
B discuuss 3 basic
charaacteristic of IPv4.
I [6]

Whatt is the functtion of the foollowing fielld base on th


he figure 1:
[5 maarks]
i. source annd destination n address
ii. time to livve
iii. service tyype
iv. ver
v. Flag

(g). Based
B on figuure below iddentify the foollowing info
formation:
i. routing
r tablee contents forr R1 if R1 iss configured the route using next hoop address. [22]
ii. routing taable contentss for R2 if R22 is configurred using intterface. [2]
iii. IP configu uration for both
b PCs, inccludes IP adddress, subnett, default gatteway.
[3]

192.168.2.0/24
.2 .3
R1 R2
.2 .3

192.168.3..0/24 192.168.4.0
0/24

.3 .2

P
Page 7

You might also like