Вы находитесь на странице: 1из 3

Sarhad University of Science & IT, Peshawar

Department:Computer Science & ITProgram:BS SE/BS CS

Examination: FINAL Term Spring 2020


Course & Course Code:COM 304- Data Communications & Networks Total Marks: 50(50% Weightage)
*Student Name:
*Registration # Instructor: Adam Khan
*Student Email: Duration : 24hrs

IMPORTANT INSTRUCTIONS FOR THE STUDENTS:


 Answer All Questions in the same Question Paper under each question/section subsequently.
 Upload the same at your SUIT PORTAL only and Answer Sheet sent through EMAIL will not be accepted.
 The total size of this file should not exceed 1MB at the time of uploading it at portal so don’t insert images.
 Just type the answers under each question, avoid inserting images and follow the instructions at SUIT Portal.
 Before uploading, save the file in this format FINAL EXAM_DEPARTMENT_COURSE_Student
Name_Reg#.doc
 Copying, plagiarism, and sharing your answers with other students is strictly prohibited and disciplinary action
will be initiated against such students
 The students must submit this answer sheet on SUIT Portal as an assignment till last step as mentioned in this
video/tutorial before the deadline: https://youtu.be/Vnpz5nKkfgM

Attempt All Questions. Each Question Carries 10 marks. Mention the references (if any) as
footnotes or at the end after completing the question.

Q#01: The “store-and-forward network” technique has been phased out in general communications ,
Why? Describe its working and compare it with its counterpart techniques. (Marks=10)

Solution#1 (to be typed here by the student)


Store and forward is a telecommunications technique in which information is sent to an intermediate
station where it is kept and sent at a later time to the final destination or to another intermediate station.
The intermediate station, or node in a networking context, verifies the integrity of the message before
forwarding it. In general, this technique is used in networks with intermittent connectivity, especially in the
wilderness or environments requiring high mobility. It may also be preferable in situations when there are
long delays in transmission and variable and high error rates, or if a direct, end-to-end connection is not
available.
---------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
Q#2
i. Show the sequence of bits sent from a client TELNET for the binary transmission of
11110011 00111100 11111111.

ii. If you are working through character mode on TELNET , then how many characters are
sent back and forth between the client and server to copy a file named file121 to another
file named file122 using the command cp file121file122?

iii. Is FTP having a message format? Why?

iv. Is there any relationship between HTTP and Proxy server? How?

v. Define SNMP functions in three ways.

Page 1 of 3
Solution#2 (to be typed here by the student)

Part (i):

Part (ii):

Part (iii):FTP does not need a message format because there is


no need to send additional information back and forth aside
from the commands and responses, which use the control
connection
Part (iv):

Part (v): Simple Network Management Protocol (SNMP) is an Internet Standard protocol for


collecting and organizing information about managed devices on IP networks and for
modifying that information to change device behaviour. Devices that typically support SNMP
include cable modems, routers, switches, servers, workstations, printers, and more.
Three significant versions of SNMP have been developed and deployed. SNMPv1 is the original
version of the protocol. More recent versions, SNMPv2c and SNMPv3, feature
improvements in performance, flexibility and security.

---------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------

Q#3.
In the following figure a virtual connection is established between A and B.
Locate the following two entities:
a) DLCI
b) Corresponding entries in the tables of each switch.

Solution#3 (to be typed here by the student)

---------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
Q#4.
A.Calculate the address space in each of the following systems?

i. A system with 8-bit addresses:

Page 2 of 3
ii. A system with 16-bit addresses
iii. A system with 64-bit addresses

Solution#4-A (to be typed here by the student)

Part (i):

Part (ii):

Part (iii):

B.An address space uses the three symbols 0, 1, and 2 to represent addresses. If each address is
made of 10 symbols, how many addresses are available in this system?

Solution#4-B (to be typed here by the student)

C.Change the following IP addresses from binary notation to dotted-decimal notation.


11101111 11110111 11000111 00011101

Solution#4-C (to be typed here by the student)

---------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
Q#5.
Cookies cannot harm the PC/Communication device like viruses/Trojans etc. these are just files
in text format that store data directly from any webservers. And helping to track the use of web
to a specific browser of targeted computer.
Most of the internet users are still unaware about these types of activities by the clever websites
that gets information about a user and on the basis of those information they started their
marketing about products/services with the help of cookies and more interestingly they showing
only what the website thinks the user is in need of.
So this phenomena and act is known to be clear breach of privacy and data security. How to
protect our computers from this security breach? And Why a website in interested to get
information from the user?

Solution#5 (to be typed here by the student)

---------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------

Page 3 of 3

Вам также может понравиться