Name: TDC 463 - Midterm Exam – Spring 2000

1. The diagram below depicts the 5-layer TCP/IP model we've used in class. Put the name of each layer inside each box (5 points).


Using the layers from the above diagram, label each technology item below with the best associated layer it fits into (use the layer number from above) (1 point for each):

User Datagram Protocol (UDP)

Medium Access Control (MAC)

HTTP (web browser)

Copper cabling (e.g. Category 5 specification)

Internet Protocol (IP)

Transparent bridging

Distance vector routing algorithms (e.g. RIP)

Transmission signal attenuation

Spanning tree algorithm (802.1d)

Transmission Control Protocol (TCP)

2.  For the following IP address in binary below, answer the following questions (1 point each)

10010111.01100000.11010110.00000100

a.  What is the IP address in dotted decimal notation

b.  If the network mask is 11111111.11111111.11111100.00000000 what is the directed broadcast address in dotted decimal notation for this station’s network?

c.  How many hosts (within 2) can exist on this network?

d.  In the original class hierarchy of IP addresses on the Internet, for which class would this address fall under?

3.  The three possible destination address types in computer networks are unicast, broadcast and:

a.  (fill in the missing term, 1 point)

b.  Briefly explain what it is used for (1 point)

4.  The Transmission Control Protocol (TCP) provides which of the following services? (Circle the best answer) (1 point)

a.  End-to-end station addressing

b.  Application multiplexing

c.  Internetwork routing

d.  Medium Access Control (MAC)

5.  The diagram below depicts a transparent bridged Ethernet network. Below the diagram is a sequence of events on the internetwork. Fill in the blank fields with the state of the bridge tables after the event on the left occurs. (1 point for each table field)


Event / Bridge Table for Segment 1 / Bridge Table for Segment 2
Bridge Boots Up
Station ‘U’ transmits to ‘V’
Station ‘X’ transmits to ‘V’
Station ‘X’ transmits to ‘Z’
Station ‘W’ transmits to ‘Z’

6.  Match the terms with their best corresponding definitions or concepts. (1 point each)

___ SYN, ACK A Layer 4 Protocol

_ Spanning Tree Algorithm One of their primary jobs involves RFCs

_ Repeater Techniques to efficiently use IP addresses

_ IETF This model lacks a setup and tear down phase

_ VLSM, CIDR This layer 2 technology helps prevent bridge loops in

Ethernet LANs and also in Token Ring LANs

_ Connectionless You might this layer 2 technology in Token Ring LANs,

but not in Ethernet LANs

_ Full-duplex Something you might find in the 3-way handshake

_ UDP An example of a wireline technology

___ Source Route Bridging The ability to talk and listen at the same time

___ Optical fiber cabling This device moves bits from one datalink network to another without inspecting the frame’s contents

7.  Ethernet has a minimum frame size requirement. (Circle the best answer) (1 point)

True False

8.  The two basic types of routing protocols are: (Circle the best answers) (2 points, all or nothing)

a.  Link State

b.  ARP

c.  DHCP

d.  Distance Vector

9.  The following are all parts of the Spanning Tree Algorithm (802.1d) except: (Circle the best answer) (1 point)

a.  BDPUs

b.  Root Bridge

c.  Designated Bridge

d.  Routing Information Field

10.  Pick ONE of the bullet points below. Compare and contrast the two items. Be as detailed as possible. Use examples where applicable. Length should be at least 2 paragraphs. Write your answer on the back of this page. (10 points based on completeness and demonstrated mastery of your chosen topic)

·  Connection-Oriented/Connectionless

·  Bridges/Switches

·  Layer 2/Layer 3

·  Token Ring/Ethernet

·  Transparent Bridging/Source Route Bridging

·  UDP/TCP

Optional Question: This midterm was (Circle one):

a.  Easier than I expected

b.  About what I expected

c.  Harder than I expected