Beruflich Dokumente
Kultur Dokumente
te SLIlT ~JIII~
rn
Data Communication
Question 1
1. A TCP client opens a connection with a server using an initial sequence number (ISN) of 12000. The server party opens the connection with an ISN of28000. a) Show the TCP connection establishment process. Indicate the sequence number and the acknowledgement numbers in a diagram. (3 marks)
I
I
Client
Server
b) Following the question above (a), show how the following data segments are sent by the client and the server. Indica~e the sequence number and the acknowledgement numbers in a diagram. (5 marks) Client Server Client 200 Bytes
I
Server
Bytes I
"-
Technology
Data Communication
C)' Show the TCP COIDlectiontermination process initiated by the client. Indicate the sequence number and the acknowledgement numbers in a diagram. (2 marks)
I
Client
Server
Technology
Data Communication
f) A Receiver ButTer Size is 2000 Bytes. It's window size is 200 Bytes. How much
data is available in the buffer? (2 marks)
g) Write one of the reasons of sending a segment with an RST flag. (3 marks)
Technology
Data Communication
Question 2
a) An IP datagram has arrived with the following information in the header (in hexadecimal): Use the diagram of the IP header given below. Answer the following questions, you can answer in hexa decimal or decimal or binary for large numbers. 45 00 00 54 00 03 00 00 20 06 00 00 7C 4E 03 02 B4 OE OF 02
VER 4 bits 8 bitstypebits offset Totallength 8 Protocol HLEN Fragmentation3 bits 16 bits Flags Service 13bits Header checksum
e IP Address
1.
11. 111.
What is the header size? (1 mark) What is the fJ:agmentation offset? (1 mark) Is the packet fragmented? (1 mark) What is the size of the data? (2 marks) _
_ _
lV.
How many more routers can the packet travel to? (l mark) What is the identification number of the packet? (1 mark)
_ _
Vll.
b) An original IP packet contains 6000 data bytes. The identification number is 320. '
1.
Assuming that Ethernet is used at the Data Link Layer (supports only 1500 Bytes for the Data Field), draw how the IP packet is fragmented. Mention how much data is contained in fragments. The standard IP header is used on every IP fragment. (5 marks)
11.
111.
(b) An IP address and subnet mask are 200.5.10.129 255.255.255.128. What is the network address? (3 marks)
(c) You have a class B network address, 130.12.0.0. Write the most suitable subnet mask to create 25 subnetwork addresses. (2 marks)
Data Communication
Question 3
Teletech is a business process outsourcing (BPO) company based in Colorado. It is now having new branches in Sydney and Shanghai. Teletech has obtained the network address 182.10.0.0/16 tor the company.
10.10.10.0/24
81
20.10.10.0/24 SO
SO EO
Colarado
Sydney
EO
a)
Using the obtained network address, assign subnets to each branch using the minimum number of host bits to the network side. (Do not use the first subnet with all Os and the last subnet with allls.)Write the subnet address given with the sub net mask in decimal. (Assign the first possible subnet to Colorado, second to Sydney and the third to Shanghai.) (5 marks) Network Shanghai Sydney Subnet Mask Subnet Address
c) Assign the first IP.address of the subnet of each branch to the router interface. (1 mark) Network IP Address of the Router Interface of the Network " Shanghai Sydney
Technology
1) Write the commands for configuring IGRP on 'Sydney' router. Indicate the prompts
as well. (3 marks)
11.
Technology
Data Communication
111.
IV.
Technology
Question 4
1. Write the two protocols used in VLAN Tagging? State one difference between those two protocols. (3 marks) Two Protocols: DitJerence:
L2.
3. Implement a VLAN solution for the following scenario. Network consists with 3 switches (CISCO 1912/2950) with 24 Fast Ethernet ports. You have to configure the SWI switch with following details Write the relevant commands. Useful commands are attached at the end of the paper. VLANs in SW1 , ) Create foIl 1. VLAN name is Accounting and VLAN Number is 2 (1 mark)
2. VLAN name
1S
Technology
Data Communication
4. Bridge IDs of each bridge and the path costs are given in the diagram. a) Highlight the Root Bridge. (1 mark) b) Select and highlight the Root Port of every bridge. (3 marks) c) Select the designated Bridges for each segment (2.5 marks) d) Show the designated port in each designated bridge. (2.5 marks)
SeQment 2 100
SeQment 3
4
2 D: 250 2
19
c:
4
150
Segment 4 2 2
19
19
Segment 5
Technology
Data Communication
Question 5
4. State two differences between Standard Access Control List and Extended Access Control List. Useful commandfj are attached at the end of the paper. 1. (4 marks)
2. The network administrator of the following network wants to implement ACL security to the network.
Galle
.:t
Kandy
"
172.10.0.6/16 Mary
a) Write standard ACL statements for the following criteria. State the prompts as well. L Tony can access the Galle Network. (2 marks)
ii. But any other traffic from the Kandy network should be denied. (2 marks)
b) Apply the above access-list on a suitable router interface. Write the command. Indicate the prompt as well. (1 mark)
Technology
Data Communication
c) Write extended ACL statements for the following criteria. Indicate the prompts as well. i. Telnet traffic to John from the Colombo network should be denied (3.5 marks)
11.
IP packets with TCP protocol, traveling from the 'Colombo' network to any destination with a destination port less than 1023 should be permitted. (3.5 marks)
d) Apply the above access-list on a suitable router interface. Write the command. Indicate the prompt as well. (1 mark)
_______ l
e) Write 2 functions of a firewall. (2 marks) f) Give an example of a server that is placed in the DMZ. (1 mark)
Sri Lanka Institute ofInformation Page 12 of14 Technology
Data Communication
USEFUL COMMANDS FOR DATACOMMUNICATIONS AND COMPUTER NETWORKS II Commands for Catalvst 1900 Switch Confieuration Command
a restricted be taken byaddress Sets the action gateway address version information the MAC address Description portIP addressMAC in-bandthe the . Displays default to informationthat the interface for so security a permanent static MAC table:
s re} type
from remoteof displays violationdress-table security be reached mac-address mac-adinterfaces a switch show about aths::restricted or can settings management interface static address switch ifoption network infonnation security there isthe restricted static port secure [max-mae-count count]
ame
c}
Data Communication
Command Configuration Modenumbered command for standard an Global numberedIPaccess for Global command lists list on Interface the Access-list to enable Activates subcommand extended extended and Extended access lists configuration interface access lists [log] Description [established] destination destination-wildcard [operator port] I access-list access-list-number { deny I permit} ip access-group access-list-number {in lout} ip access-group { number I name [ in lout]}
End of Paper