Sie sind auf Seite 1von 10

Birmingham City University Technology, Engineering and the Environment Undergraduate Programme

EXAMINATION SOLUTION SHEET

Question No/Part

Module Title:Network Technology PG.......................... Exam date:. TBA 2010...... Question1

Marks

1. The diagram shows a network that has been assigned the Classless InterDomain Routing (CIDR) address 12.0.0.0/7.

Figure Q1 a) Employ Variable Length Subnet Masking (VLSM) to design a complete addressing scheme for the topology. Your design must include a table populated with addresses and subnet masks.
12.0.0.0/23 12.0.2.0/23 12.0.0.0/23 512 hosts total 512 hosts useable 256 hosts used on Manchester LAN 12.0.0.1/23 12.0.1.254/23 12.0.1.255/23 12.0.2.0/24 256 hosts total 254 hosts useable 127 hosts used on London LAN 12.0.2.1/24 12.0.2.254/24 12.0.2.255/24

12.0.3.0/24

12.0.3.0/25 128 hosts total 126 hosts useable 63 used on Birmingham LAN 12.0.3.128/25

12.0.3.128/30 4 total 2 useable BHAM-LON WAN 12.0.3.132/30 4 total 2 useable BHAM-MAN WAN

[10 marks]
Examination Solution Sheet

b) Reproduce the network diagram and clearly annotate all network segments with their broadcast addresses and full range of useable addresses. As table [10 marks]

d) Compare the benefits of implementing VLSM within an organisation against a single subnet mask design.

Typical adds All subnetting provides Hierarchical Structure, Management and improved trouble shooting, Improved operation i.e. broadcast containment and security However VLSM provides reduced address space wastage [5 marks]

Examination Solution Sheet

Question 2

2. The diagrams represents the captured output from a Network Protocol Analyser.

Figure Q2

a) i.Justify why the layer four protocol may be suitable for the encapsulation of its upper layer data.

Reliable transport via expectation acknowledgements, supports flow control via sliding windows and sequence number to reorder delivered data HTTP requires reliable delivery of data ii. Distinguish between connectionless-orientated and connectionorientated protocols by comparing each to the relevant parts of the extract. connection-orientated Establish contact with the recipient before data transfer connectionless-orientated No contact with the recipient before data transfer iii. Determine the significance and value of the SYN and ACK flags at the initial and subsequent stages of the communication dialogue. 3 way handshake required to establish initial reliable transport connection SYN initial synchronisation request Host A to B SYN-ACK- synchronisation request and acknowledgement to initial SYN. Host B to A ACK response to second SYN request. Host A to B [15 marks] b) Discuss whether the segment represents a client request or server response.
Examination Solution Sheet

Client request as the destination port is port 80 to a HTTP server [6 marks] c) Describe a typical compatible client or server application. [4 marks]
Web client Browser IE explorer or Firefox Question 3

3. The table shows the output from an intermediary network device.

Figure Q3 a) Briefly describe the operation of a link state routing protocol. Open Shortest Path First (OSPF) and Intermediate System Intermediate system (IS-IS) Also known as shortest path first algorithms-These protocols built around Dijkstras SPF -Each routers learns about its own directly connected networks -Link state routers exchange hello packet to meet other directly connected link state routers. -Each router builds its own Link State Packet (LSP) which includes information about neighbors such as neighbor ID, link type, & bandwidth. -After the LSP is created the router floods it to all neighbors who then store the information and then forward it until all routers have the same information. -Once all the routers have received all the LSPs, the routers then construct a topological map of the network which is used to determine the best routes to a destination [5 marks] b) Sketch the network topology using the information provided in the table. Label each segment in the topology with its network address and mask. Indicate suitable IP addresses for all interfaces on connected networks.
Examination Solution Sheet

[5 marks]

c) Prove the cost to the destination installed by the dynamic routing protocol, given that packets headed to the remote network are transmitted out of two FastEthernet ports, the delay of a 100Mb/s FastEthernet interface is 100s and: metric = 256 *{107/minimum(bandwidth) + delays/10}

Should confirm the answer shown in the graphic i.e. 30720 [10 marks] d) Determine the metric and its value to the destination installed by the EIGRP protocol if the current routing protocol were to be replaced by RIP v1. Comment on whether this change of routing protocol would represent an improvement. 1 hop with RIP but would not be an improvement as RIP takes no account of bandwidth and delay so may result in suboptimal route selection if multiple paths to the same destination exist. EIGRP also has a feasible successor route on standby to be installed as a backup, and therefore reduces convergence time if a change occurs in the topology [5 marks]
Question 4

4. a) Ethernet offers a service called Carrier Sense Multiple Access with Collision Detection (CSMA/CD). Explain the purpose of this service and its principle characteristics. Briefly outline the issues that give rise to the need for such a service. Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks. On Ethernet, any device can try to send a frame at any time. Each device senses whether the line is idle and therefore available to be used. If it is, the device begins to transmit its first frame. If another device has tried to send at the same time, a collision is said to occur and the frames are discarded. Each device then waits a random amount of time and retries until successful in getting its transmission sent.
Examination Solution Sheet

CSMA/CD is specified as a IEEE 802.3 standard. [3 marks]

b) In the context of an Ethernet LAN distinguish between a unicast, multicast and broadcast transmission. Unicast- data is sent from a single source to a single destination Multicast- data is sent from a single host to a group of hosts on a subnet Broadcast- data is sent from a single host to all hosts on a subnet [3 marks] c) Address Resolution Protocol (ARP) and Domain Name Service (DNS) offers services to the TCP/IP protocol stack. Explain the principle and purpose of each service.

Layer 3 service ARP Map destination IP address to destination MAC addresses ARP sends a MAC broadcast request to the entire LAN, asking for the MAC address of a particular known destination IP. The device that is identified by the IP address on the packet responds to the request and replies by sending its MAC address. DNS via TCP or UDP provides name translation of domain names to IP addresses. Query request are directed to the DNS server and the server responds with the destination IP. DNS queries resolve in a number of different ways. A client can sometimes answer a query locally using cached information obtained from a previous query. The DNS server can use its own cache of resource record information to answer a query. A DNS server can also query or contact other DNS servers on behalf of the requesting client to fully resolve the name, then send an answer back to the client. This process is known as recursion. [3 marks]

d) A web server runs on a computer with the domain name eagleserver.example.com. A browser accesses a page with a URL http://eagleserver.example.com/index.html. The browser host, DNS host and web server host are connected to the same Ethernet LAN segment. Give an account of the events that take place as the browser requests the page. Relate your account to protocols described in b), c) and any relevant layers of the OSI model. Assume all caches are empty.

(Answer may vary)


A host start the browser and enters the URL into the browser address box The Browser application formulates a DNS request. The DNS server responds with the IP address of the Web server. The Browser initiates a 3 way handshake with the Web server to establish a reliable TCP communication channel between the host and server.
Examination Solution Sheet

The Bowser application layer formulates a HTTP GET request to the server. The request is encapsulated in a TCP segment at the Transport layer with a randomly assigned source port and a well known destination port of 80, the segment is then passed down to the Network layer. At the Network layer the segment is encapsulated into a packet with the source address of the host and destination IP address of the server. The destination IP address of the server is a response to a DNS request to convert the domain name of the requested page into an IP address. An ARP request is formulated to map the destination IP address to the destination MAC address. This desination MAC address is passed to the Datalink layer At the Datalink layer the Packet is encapsulated into a Frame. The source MAC address is that of the host. The destination MAC is the server MAC address because the host and server are on the same segment . At the physical layer the Frame is encoded into bits onto the physical layer. The data is transmitted across the media. At the destination the data is de-encapsulated upto the application layer. A response is formulated that includes the requested web page. The web page is encapsulated and returned to the source

[14 marks]

Question 5

5 a) The diagram shows a full duplex HDLC layer two frame transfer.

Figure Q5 . The format for frames used in information transfer is IN(S),N(R). Where: N(S) is the current sent frame from the transmitter N(R) is the next expected frame from the receiver

a).Predict the next transmitted acknowledgement frame for host A and B, assuming each host has received the shown block of data without
Examination Solution Sheet

error.

IN(S),N(R). = I2,5. (Host B to A) i.e send what A asks for along with the next expected segment in the sequence IN(S),N(R). = I7,6 .(Host A to B) i.e send what B asks for along with the next expected segment in the sequence [12 marks]

b) Discuss the characteristics of the information transfer and relate it to similar protocols from the OSI model. The characteristics of the dialogue are similar to that of the TCP protocol at the transport layer of the OSI model and include: Connection-orientated Establish contact with the recipient before data transfer 3 way handshake required to establish initial reliable transport connection SYN initial synchronisation request Host A to B SYN-ACK- synchronisation request and acknowledgement to initial SYN. Host B to A ACK response to second SYN request. Host A to B

Reliable transport via expectational acknowledgements, supports flow control via sliding windows and sequence number to reorder delivered data HTTP requires reliable delivery of data Greater over head compared to UDP which does not employ any of the above [13 marks]

Question 6

6 The diagram shows the Input/Output OSI protocol stack of a router

Examination Solution Sheet

Figure Q6

a) Briefly explain the basic characteristics and application for all the layer two and three protocols shown Internet Protocol (IP) Hierarchical connectionless-orientated, 32 bit IPv4 addressing for hosts that provides structure and is faster than a flat addressing scheme Commonly expressed in dotted decimal format and include a network and host portion determined by its subnet mask. IP sits at the Network (layer 3 ) of the OSI model and maps to the Internet layer of the TCP/IP model

Internet Control Messaging Protocol ICMP provides connectivity and error messaging services (e.g. destination or protocol unreachable) up to the Network layer or Internet layer of the OSI and TCP/IP stack respectively [10 marks] b) Identify the type and bandwidth of the physical media upon which the stack is operating Fast Ethernet 100Mb/s [2 marks] c) If all Router FastEthernet interfaces are configured with the first useable IP address of the networks shown. Sketch a physical topology that the stack can represent, include all host IP addresses, segments and relevant physical media

Switches with straight thru cables can be employed to provide more access points

Examination Solution Sheet

[13 marks]

Examination Solution Sheet

Das könnte Ihnen auch gefallen