Sie sind auf Seite 1von 4

UNIKL BMI

UniKL BRITISH MALAYSIAN INSTITUTE


SOLUTION AND MARKING SCHEME
FINAL EXAM S22015

DATA COMMUNICATIONS & NETWORK 1 (BTD22103)


Question
No.

Topics Covered

Marks Allocated

Answer ALL questions.


A
1
2
3
B
1
2
3

Computer hardware & OS


Connecting Network
Network Service

20 marks
20marks
20marks

Network Addressing
Ethernet
Design Network

20 marks
20 marks
20 marks

Subject Leader
Signature
Name
Date

Question
No.
IA/ISO

Verification
Head of Section

IEB

MGMT

Topics Covered

Marks Allocated

UNIKL BMI
Part 1
Q1
a

1.
2.
3.
4.
5.
6.

GHz
TB
MB
Mb/s
Pixel
Mb/s

marks

kernel communicates with hardware


shell works with the application

can correct a problem or


enhance the functionality

6 marks

47
101010101

Q2
a

Build computer peer-to-peer network and verify


The ability to act as both a client and server

2
2
2

1.

Hub- broadcast frame to all host

2.

Switch- forward frame to intended host

3.

Modem- modulate and demodulated signal to different net

4.

Router- forward packet to other network

15Mb=1s

128GB=128Gx8bx1s/15Mb

4 marks

c
12marks

IA/ISO

UNIKL BMI

3
a

15Mb=1s

128GB=128Gx8bx1s/15Mb

2
2
2

= 1hr
Server will offer the useful network services to Client

b
c

Port 21
Port 143
Port 25
Port 53
Port 110
Port 80
PART B
1
a

IA/ISO

FTP
HTTP
DNS
IMAP4
SMTP
POP3

4
10
File Transfer Protocol
Hyper Text Transfer Protocol
Domain Name System
Internet messahe access protocol
Simple Mail Transfer Protocol
Post office protocol

Mobility
Scalability
Flexibility
Cost

inexpensive to install

reduced installation costs

1
1
1
1

Information theft
Identity theft
Data loss / manipulation
Disruption of service

1
1
1
1

A virus is a program that runs and spreads by modifying other


programs or files. A virus cannot start by itself; it needs to be
activated. Once activated, a virus may do nothing more than
replicate itself and spread.
A worm is similar to a virus, but unlike a virus does not need to
attach itself to an existing program. A worm uses the network to
send copies of itself to any connected hosts. Worms can run
independently and spread quickly.

UNIKL BMI
d

i.
ii.
iii.
iv.

2
a

Single firewall configuration


demilitarized zone (DMZ)
Block all incoming and Permit all outgoing.
Port 80, 25, 143, 110, 444

2
2
2
2

Cable : UTP cat 5e


Terminator: RJ45
Bandwidth : 100MB/s
Length: 100M

2
2
2
2

1.
2.
3.
4.

White Orange
Orange
WGreen
Blue

5.
6.
7.
8.

WBlue
Green
WBrown
Brown

1
1
1
1

A.
B.
C.
D.
E.

Access Switch
Distribution Switch
Distribution Switch
Core Switch
Router

F.
G.
H.
I.

Distribution Switch
Access Switch
Access Switch
Access Switch

2
2
2
2

3
a

PC1,PC2&PC3 = 192.150.11.1-254

PC4,PC5&PC6 = 192.150.12.1-254
b

E0= 192.150.11.1
E1=192.150.12.1

R1> enable
R1#
R1# config terminal
R1 (config)# interface fastethernet 0/0
R1 (config-if)# ip address 198.250.11.1 255.255.255.0
R1 (config-if)# no shutdown
R1 (config-if)# exit
R1 (config)# interface fastethernet 0/1
R1 (config-if)# ip address 198.250.12.1 255.255.255.0
R1 (config-if)# no shutdown
R1 (config-if)# exit
R1 (config)# interface serial 0/0/0
R1 (config-if)# ip address 209.165.200.5 255.255.255.252
R1 (config-if)# clock rate 64000
R1 (config-if)# no shutdown
R1 (config-if)# exit

IA/ISO

6 marks

7 marks
7 marks

Das könnte Ihnen auch gefallen