CMU-CS 252 - Test Banks For Student - On Tap

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28

MU-CS 252

Introduction to Network & Telecommunications Technology


Part I: Multiple Choice

1. (0.2 point)
Which layer of the OSI model is responsible for data encryption (mã hóa dữ liệu ) ?
A. Presentation
B. Session
C. Network
D. Data Link
Note: Mô hình OSI gồm 7 layer
7.Physical Layer : chịu trách nhiệm cho truyền dữ liệu
6.Data Link Layer : phát hiện lỗi , sữa lỗi và phân tích.
5.Network layer : định tuyến
4.Transport layer : vận chuyển
3.Session layer
2.Presentation layer : mã hóa và giãi mã dữ liệu
1. Application layer : cung cấp cấc dịch vụ cho người dùng
2. (0.2 point)
You have been hired by a company that uses a topology shown below. In looking at the physical
layout of your network, which of the following types of topologies is being used?

A. Bus
B. Star
C. Mesh
D. Ring
3. (0.2 point)
You are designing a 1000Base-T network. In creating this network, what distance limitation will you
be facing when installing the cabling?
1
A. 100 m
B. 185 m
C. 500 m
D. 2 km
4. (0.2 point)
Which service listed below is used to resolve IP addresses and domain names?
A. DNS
B. DHCP

2
C. ARP
D. TCP
5. (0.2 point)
Identify the class of IP Address for the following IP address 114.101.101.101?
A. Class A
B. Class B
C. Class C
D. Class D
6. (0.2 point)
Which example is a network adapter loopback address?
A. 255.0.0.1
B. 192.0.0.1
C. 127.10.20.30
D. 10.0.0.1
7. (0.2 point)
Which example below is the default subnet mask of Class B (IP Version 4)?
A. 255.255.255.224
B. 255.255.255.0
C. 255.255.0.0
D. 255.0.0.0
8. (0.2 point)
Your network has 10 computers that are networked together using a star topology. Which of
the following is a possible point of failure for this topology, which could bring down the entire
network?
A. Cable
B. Network card
C. T-Connector
D. Hub
9. (0.2 point)
The network layer protocol of the internet is:
A. ethernet
B. internet protocol
C. hypertext transfer protocol
D. user datagram protocol
3
10. (0.2 point)
You are the network administrator of a 10BaseT network. On the weekend, when a few people are
working, you run 110 m of cable to a new server that is being used as a file server. The cable is
installed in a new section of the building, where no cabling currently exists. When you attempt to
access files on the server, they are experiencing errors and corrupt data. Which of the following is
most likely the cause of this problem?
A. Bandwidth
B. Attenuation
C. Crosstalk from a neighboring cable ( nhiễu sóng )
D. CSMA/CD issues
11. (0.2 point)
You are designing a new network and are concerned about interference from other wires. Which of the
following is most susceptible to transmission errors due to crosstalk?
A. Coaxial
B. UTP
C. STP
D. Fiber optic
12. (0.2 point)
You are designing a new network for a grocery store. Cabling will have to run along the ceiling, where
there are a significant number of florescent lights. You are concerned about interference from these
lights. Which of the following cable types could be used, which would not be susceptible to this type
of interference?
A. Coaxial ( cáp đồng trục )
B. UTP
C. STP ( cáp xoắn đông được bảo vệ )
D. Fiber optic (cáp quang )
13. (0.2 point)
A new technician for 123 Corp plans out the maximum length of a Gigabit Ethernet segment using
MMF optic cable. What is the correct distance? (Choose only one)
A. 100m
B. 125m
C. 550m
D. 10km
14. (0.2 point)
For which type of connection should a straight-through cable be used?
4
A. switch to switch
B. switch to hub
C. switch to router
D. router to PC
15. (0.2 point)
What are the first 24 bits in a MAC address called?
A. NIC
B. BIA
C. OUI
D. VAI
Note : first 24 bit OUI
Last 24 bit NIC
16. (0.2 point)
Fast Ethernet has a data rate of Mbps.
A. 10
B. 100
C. 1000
D. 10000
17. (0.2 point)
IEEE has defined the specifications for a wireless LAN, called , which covers the physical and
data link layers.
A. IEEE 802.3
B. IEEE 802.5
C. IEEE 802.11
D. IEEE 802.12
Note : IEEE 802.11 is the set of standards that define the technical specifications for wireless local
area networks (WLANs), commonly known as Wi-Fi. It covers both the physical (PHY) and data link
layers (DLL) of the network architecture.
18. (0.2 point)
Which transmission media has the highest transmission speed in a network?
A. coaxial cable ( cáp đồng trục
B. twisted pair cable ( cáp xoắn đôi )
C. Optical fiber
D.electrical cable ( cáp điện )
19. (0.2 point)
Which of these is not a guided medium?
5
A. Fiber optical cable
B. Coaxial cable
C. Wireless LAN
D. Copper wire

6
20. (0.2 point)
You are a network technician assigned to install a new network hub. Which layer of the OSI model
does a standard hub operate at? Select only one answer.
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
21. (0.2 point)
You are a network technician assigned to install a new NIC on a PC. Which layer of the OSI model
does a NIC operate at?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
Note : operate at both Physical layer and Data link layer
22. (0.2 point)
What is the unique physical address that is found on all NICs called?
A. DNS address
B. NAT address
C. IP address
D. MAC address
Note : NICs is called a Media Access Control address, or MAC address for short
23. (0.2 point)
From the list of choices, which of the following media access methods is used for an IEEE 802.5
network?
A. Direct Sequence
B. Token passing
C. CSMA/CD
D. CSMA/CA
24. (0.2 point)
POP3 is identified by which TCP/IP port number?
A. UDP Port 21
B. TCP Port 23
C. UDP Port 25
D. TCP Port 110
7
25. (0.2 point)
You are a network administrator looking to implement technology into a company. You are told you
need to build a network using the IEEE 802.11 standarD. From the list below, the IEEE 802.11
standard maps to which of the following? Select only one answer.
A. Token Ring
B. Wired Ethernet
C. Metropolitan Area Network (MAN)
D. Wireless in Infrastructure mode
26. (0.2 point)
When a host transmits data across a network to another host, which process does the data go through?
A. standardization
B. conversion
C. encapsulation
D. synchronization
27. (0.2 point)
Two sub-layers of the OSI Data Link layer are which of the following?
A. Logical Link Control, Data Link Control
B. Media Access Control, Physical Layer Control
C. Logical Link Control, Media Access Control
D. Data Link Control, Physical Layer Control
Note : LLC and MAC
28. (0.2 point)
The network layer concerns with
A. bits
B. frames
C. packets
D. segment
29. (0.2 point)
Which one of the following is NOT a function of the network layer?
A. routing
B. inter-networking
C. Congestion control
D. best path

Note : include of

8
1. Routing

2. Congestion control

3. Inter-networking

4. address resolution

5. packet Forwarding

6. Error handling

7. Subneting

8. Security

9
30. (0.2 point)
Your company uses UTP cable ( vấn đề là nhiễu điện từ ) for all of its network connections including
workstations and servers. The users have reported problems connecting to one of the most important
servers on the network and you have been called in to look at it, due to a possible physical security
breach by a former employee. While examining the server, you find that a small battery-powered
motor has been placed and is running next to the server’s network connection. What is causing the
network problem?
A. Electromagnetic interference ( nhiễu điện từ )
B. Static electricity ( tĩnh điện )
C. Transceivers ( thu phát )
D. Unknown, but the motor is probably unrelated
31. (0.2 point)
Your network uses vampire taps and AUI connectors to access data from the network cable. Which of
the following cabling types is being used?
A. Thinnet
B. Thicknet
C. STP
D. Fiber optic
32. (0.2 point)
You are designing a 10Base2 network. In creating this network, what distance limitation will you be
facing when installing the cabling?
A. 100m
B. 185m
C. 200m
D. 2km

33. (0.2 point)


Your network uses 100BaseFX so that data can be transferred at higher speeds and up to distances of
400 m. During transmission, data can travel in both directions, but only in one direction at a given
time. Which of the following transmission methods is used?
A. Simplex
B. FireWire
C. Half-Duplex
D. Full Duplex

10
34. (0.2 point)
You are the network engineer assigned to implement a new 100 Mbps network connection. You
need to select the correct cabling, as well as the correct standard. From the selections below, choose
which 100 Mbps networking standard makes use of only two pairs of a Category 5 UTP cable.
A. 10BaseT
B. 100BaseFL
C. 100BaseTX
D. 100BroadT4
35. (0.2 point)
uses thick coaxial cable.
A. 10Base5
B. 10Base2
C. 10BaseT
D. 10BaseF
36. (0.2 point)
Gigabit Ethernet has a data rate of Mbps.
A. 10
B. 100
C. 1000
D. 10000
37. (0.2 point)
In IEEE 802.11, the access method used in the DCF sub-layer is
A. ALOHA
B. CSMA/CD
C. CSMA/CA
D. Token Passing
38. (0.2 point)
A Bluetooth network is called a
A. piconet
B. scatternet
C. bluenet
D. none of the above
39. (0.2 point)
Which OSI model layer is responsible for frame sequencing?

11
A. The physical layer
B. The transport layer
C. The data link layer
D. The application layer
40. (0.2 point)
You are a network technician assigned to install a new network switch. Which layer of the OSI model
does a standard switch (or bridge) operate at? Select only one answer.
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
41. (0.2 point)
You are a network technician assigned to install a new network Router. Which layer of the OSI model
does a standard router operate at?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
42. (0.2 point)
Which of the following is a valid MAC address?
A. 00:05:J6:0D:91:K1
B. 10.0.0.1-255.255.255.0
C. 00:05:J6:0D:91:B1
D. 00:D0:A0:5C:C1:B5
43. (0.2 point)
You are the system administrator for a small company that runs two Windows servers (Windows
Server 2016) and two Linux servers (SUSE Linux). You need to lock down the connections to the
switch via port security; this essentially means you will need to retrieve the MAC addresses on the
systems. MAC addresses are found on the Linux server by issuing which command?
A. ipconfig /a
B. ifconfig /a
C. winipcfg /a
D. ifconfig -a
44. (0.2 point)
Standards for CSMA/CD are specified by which IEEE 802 sublayer?
12
A. 802.1
B. 802.3
C. 802.4
D. 802.5
45. (0.2 point)
From the choices listed, which of the following protocols represents e-mail protocols?
A. POP3
B. SMCP
C. IMAP5
D. Telnet
46. (0.2 point)
When discussing the OSI model and the TCP/IP model, which layer of the OSI model handles what
you would find in the Application layer of the TCP/IP model?
A. Application, Presentation, and Session
B. Presentation, Session, and Transport
C. Network, Data Link, and Physical
D. Session, Transport, and Network
46. (0.2 point)
Match the following:
~A. Repeaters ~1. Data Link Layer
~B. Bridges ~2. Network Layer
~C. Routers ~3. Physical Layer
A. ~ A vs 2; B vs 3, C vs 1
B. ~A vs 3; B vs 1; C vs 2
C. ~A vs 3; B vs 2; C vs 1
D. ~A vs 1; B vs 2; C vs 3
47. (0.2 point)
The center connection point of a star network is a
A. Repeater
B. Bridge
C. Router
D. Switch/Hub
47. (0.2 point)
A two-way nonsimultaneous connection is an example of
A. Simplex
B. Haft Duplex
C. Full Duplex
13
D. Multiplexing
48. (0.2 point)
Does a typical star topology use which type of media to connect between nodes and the center
connection point (switch/hub)?
A. FDDI
B. Coaxial Cable
C. Fiber optic
D. UTP – CAT 5
49. (0.2 point)
Which device is the best choice for routing?
A. Router
B. Gateway
C. Hub
D. Switch
50. (0.2 point)
Which service listed below is used for dynamic IP address allocation?
A. DNS
B. DHCP
C. ARP
D. TCP

14
Part II. Short Answer

1. What is encapsulation?
Encapsulation: This is the process of wrapping the data into packets with additional information (headers) like
source and destination addresses, routing protocols, and error-checking mechanisms. These packets are the
fundamental units of data transmission on a network, making encapsulation the crucial process for sending
data from one host to another.

2. Which layer is responsible for creating, managing, and terminating sessions


between applications?
=> Session layer
3. Which layer defines how data is formatted, presented, encoded, and converted for
use on the network?
=> presentation layer
4. What is the difference between the OSI model and the TCP/IP model?

* OSI Model (Open Systems Interconnection Model)


+ 7 layers: Physical, Data Link, Network, Transport, Session, Presentation,
Application
+ Conceptual framework: Developed as a theoretical model to guide network
development
Khung khái niệm: Được phát triển như một mô hình lý thuyết để hướng dẫn
phát triển mạng
+ Protocol-independent: Not tied to specific protocols
+ Độc lập với giao thức: Không bị ràng buộc với các giao thức cụ thể
+ Detailed and comprehensive: Defines clear boundaries and functions for
each layer
+ Chi tiết và toàn diện: Xác định ranh giới và chức năng rõ ràng cho từng lớp
*TCP/IP Model (Transmission Control Protocol/Internet Protocol Model)
+ 5 layers: Physical, Data Link, Network, Transport , Application
+ Practical implementation: Developed from real-world network
technologies
+ Triển khai thực tế: Phát triển từ các công nghệ mạng trong thế giới thực
+Protocol-specific: Based on TCP/IP protocols
+Less rigid structure: Layers can overlap and combine functions
+Cấu trúc ít cứng nhắc hơn: Các lớp có thể chồng lên nhau và kết hợp các
chức năng

5. (0.500 Point)
15
You are creating a DHCP scope for your 192.168.1.32/28 subnet. The subnet consists of Windows 7,
Windows 8, and Windows 10 computers. You have two UNIX computers on this subnet that will be
assigned the two highest available static IP addresses. The subnet's default gateway will be assigned
the lowest available IP address on the subnet. Which scope should you create on your DHCP server?
6. (0.500 Point)
Refer to the exhibit.

http://hfs2.duytan.edu.vn/ndJK184IUkdfn23df675/TestBank/210619_lab-5.2-static-
route_4925_C3612_013159.png
Write commands to configure IP on the interface Fa0/0 of router DTU1.
Interface FastEthernet0/0
Ip address 172.16.0.1/16 255.255.0.0
No shutdown
7. Compare and contrast copper wire, glass fiber, and satellite transmission media.
 Copper wire is the most affordable option but is limited in distance and speed. It's a good choice
for short-distance connections like home networks or within buildings.
 Glass fiber is the best option for high-speed, long-distance data transmission, such as backbone networks
and internet connections. However, it's more expensive and requires specialized equipment.
 Satellite is suitable for covering wide areas, especially in remote locations, but it has limited bandwidth,
high latency, and is weather-dependent.

8. Computer networks are typically classified according to what? What are the types
of computer networks?

1. Geographic Scope:
Personal Area Network (PAN):
Local Area Network (LAN):
Campus Area Network (CAN):
Metropolitan Area Network (MAN):
Wide Area Network (WAN):
2. Network Topology:
Bus:
Star:
Ring:
Mesh:
3. Network Device Role:
Peer-to-peer:
Client-server:

16
4. Network Function:
Public network:
Private network:
5. Network Protocol:
Ethernet:
Wi-Fi:
TCP/IP:

17
• What is the difference between a connection-oriented network and a
connectionless network?
Connection-oriented networks:
Establish a connection: Before sending data, devices set up a virtual circuit between them, This
involves handshakes, exchanging information like sequence numbers, and ensuring a dedicated path for
data flow.
Guaranteed delivery: Data packets are transmitted in order and retransmitted if errors occur, ensuring
complete and accurate delivery.
Flow control: Both sender and receiver manage the data flow to avoid overloading the network.
Congestion control: Mechanisms like backpressure are used to prevent network congestion when traffic
is high.
Security: Connection setup offers opportunities for authentication and encryption, potentially enhancing
security.
Connectionless networks:
No prior connection: Data packets are sent individually without establishing a dedicated path.
No guaranteed delivery: Packets travel independently and may arrive out of order, be duplicated, or
even lost.
No flow control or congestion control: Data is sent without explicit flow management, potentially
leading to congestion.
Simple and efficient: Less overhead due to the lack of connection setup makes this approach faster and
more lightweight.
Lower cost: Requires less infrastructure and management, making it a cost-effective solution for some
applications.

9. What are the two kinds of twisted-pair cable? Which is preferred? Why?

+ Unshelded Twisted Pair (UTP)

+ Shielded Twisted Pair (STP)


Which is preferred depends on several factors:
+Cost: UTP is significantly cheaper than STP.
+Performance: STP generally offers better signal quality and noise immunity, making it more reliable
for high data rates and critical applications.
+Environment: If your cable runs through areas with high levels of EMI, like fluorescent lights or
power lines, STP will provide better protection.
+Installation: STP cables are thicker and more difficult to work with than UTP, potentially increasing
installation costs.
Generally:
For home networks and low-noise environments, UTP is usually sufficient and cost-
effective.
For high-speed data networks, critical applications, and noisy environments, STP is the
preferred choice for its superior performance and noise immunity.
18
10. (0.500 Point)
Refer to the exhibit.

http://hfs2.duytan.edu.vn/ndJK184IUkdfn23df675/TestBank/210619_lab-5.2-static-
route_4925_C3612_013159.png
Router DTU1 needs to connect to PCB. What is the static route configuration on Router DTU1?

DTU1(config)# ip route 172.18.0.0 255.255.0.0 Serial0/0/0


Hoặc:
DTU1(config)# ip route 172.18.0.0 255.255.0.0 172.17.0.2
11. (0.500 Point)
Refer to the exhibit.
http://hfs2.duytan.edu.vn/ndJK184IUkdfn23df675/TestBank/210619_bkt-1_4925_862ED_015137.png

What is the default route configuration on Router R1?

Ip router
12. (0.500 Point)

19
List ten devices that can be considered end devices and intermediary devices on a network (list five
for each type).

End Devices (5 Examples):


Computers: .
Mobile Devices:
Printers:
Smart TVs and Streaming Devices:
IoT Devices:
Intermediary Devices (5 Examples):
Routers:
Switches:
Access Points:
Firewalls
Load Balancers:

20
13. (0.500 Point)
Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections
are made through FastEthernet links. Which types of cables are 1, 2, and 3?

1: Console
2: copper Straight-thought
3: copper Cross-over
14. (0.500 Point)
List the layers of the OSI model from top to bottom, and the layers of the TCP/IP model from bottom
to top.
OSI Model (Top to Bottom):
Application Layer: Provides network services to applications like HTTP, FTP, and SMTP.
Presentation Layer: Handles data encryption, decryption, and format conversion.
Session Layer: Establishes, manages, and terminates sessions between applications.
Transport Layer: Provides reliable data transmission and error checking (e.g., TCP, UDP).
Network Layer: Handles routing and addressing (e.g., IP, RIP).
Data Link Layer: Provides error-free data transfer over a single link (e.g., Ethernet, PPP).
Physical Layer: Deals with the physical transmission of data across the network medium (e.g., cables, connectors).
TCP/IP Model (Bottom to Top):
+ Physical layers :
+ Data Link layers :
Internet Layer: Deals with routing and addressing across networks (similar to Network layer of OSI).
Transport Layer: Provides reliable data transmission and error checking (similar to Transport layer of OSI).
Application Layer: Houses various protocols used by applications (similar to Application and Presentation layers
of OSI combined).

15. What four protocols are needed for communication between a web server and a
web client?
 internet Protocol (IP): This protocol is responsible for routing and addressing data packets on the
network.
 Transmission Control Protocol (TCP): This protocol provides reliable data transmission between
devices on the network.
 Hypertext Transfer Protocol (HTTP): This protocol is used to transmit web pages and other web
resources between web servers and web clients.
 Hypertext Transfer Protocol Secure (HTTPS): This protocol provides encryption for the
information exchanged between web servers and web clients.

16. What will happen if the default gateway address is incorrectly configured on a
host?

21
1. Limited connectivity
2. Routing Errors
3. Internet Access Issues
4. Internal network Challleges
5. Troubleshooting Difficulties

17. Match the function to the name of the application.


a. DHCP 1. allows viewing of messages on email clients
b. DNS 2. displays web pages
c. IMAP 3. sends email messages
d. HTTP 4. dynamically assigns IP address to clients
e. SMTP 5. maps URLs to numerical addresses
A -> 2
B -> 5
C-> 1
D ->4
E-> 3
18. What are the three methods used to control data flow at Layer 4?
+Windowing
+Buffering
+Acknowledgments (ACKs)
19. (0.500 Point)
What is data referred to at each OSI layer?

7. Application Layer:
Data
This is the raw information that applications generate and exchange, such as emails, web pages, video
streams, or file transfers. No specific formatting is applied yet.
6. Presentation Layer:
Presentation Data Unit (PDU)
The data is formatted for presentation to the user or application, including encryption, compression, and
character code translation.
5. Session Layer:
Data
The data is managed within sessions, ensuring dialogues between applications are coordinated and
synchronized.
4. Transport Layer:
Segment
The data is divided into smaller segments, ensuring reliable and error-free transmission between
devices.
22
3. Network Layer:
Packet
The segments are encapsulated into packets with logical addressing (IP addresses) for routing across
networks.
2. Data Link Layer:
Frame
The packets are further encapsulated into frames, adding physical addressing (MAC addresses) for
transmission over the physical medium.
1. Physical Layer:
Bits
The frames are converted into raw bits (0s and 1s) for actual transmission over the physical network
medium, such as cables or wireless signals.

23
Part III. Short Essay

1. . (3.000 Points)

Given Network Address: 10.0.0.0/18 , let’s identify:

a) Address class and default subnet mask

Address class : A

Subnet mark : 255.0.0.0


b) Number of bits borrowed and custom subnet mask:
Number of bít borrowed : 18-8 = 10 bits
Custom subnet mask : 255.255.192.0
c) Total number of subnets and total number of host addresses per subnet:
Total number of subnets : 2^(18-8) - 2 = 1022 (subnet )
Total number of subnets : 2^(24-18)-2 = 62 (host address )
2. . (3.000 Points)

Given Network Address: 192.150.1.0 . We need 4 subnets with at least 20 host addresses
per subnet. Let’s identify:

a) Number of bits borrowed (n):


Because we need 5 subnet with at 20 host addresses
=> Number of bits borrowed 2^3 - 2 = 6 ( subnet)

b) Custom subnet mask:


=> 255.255.255.224
c) Total number of host addresses per subnet
Total number of host = 2^5 - 2 = 30 (host)
d) Subnets range
Step = 2^5 = 32

ID Sub-network Host Addresses Sub-broadcast Use


Address Range Address Yes/No
0 192.150.1.0 192.150.1.1-> 192.150.1.30 192.150.1.31

1 192.150.1.32 192.150.1.33 -> 192.150.1.62 192.150.1.63

24
2 192.150.1.64 192.150.1.65 -> 192.150.1.94 192.150.1.95

3 192.150.1.96 192.150.1.97 -> 192.150.1.126 192.150.1.127

4 192.150.1.128 192.150.1.129 -> 192.150.1.158 192.150.1.159

5 192.150.1.160 192.150.1.161 -> 192.150.1.190 192.150.1.191

3. (3.000 Points)
Refer to the exhibit. Design a network addressing scheme that will supply the minimum number of
subnets and allow enough subnets and hosts for 70% growth in all areas. Circle each subnet on the
graphic and fill in the blanks below.

25
Questions Point
Custom subnet mask: 0.25
Minimum number of subnets needed: 0.25
Extra subnets required for 70% growth:+ 0.25
Total number of subnets needed:= 0.25
Number of host addresses in the largest subnet group: 0.25
Number of addresses needed for 70% growth in the largest subnet:+ 0.25
Total number of address needed for the largest subnet:= 0.25
Start with the first subnet and arrange your sub-networks from the largest group to the smallest.
IP address range for New York: 0.25
IP address range for Washington D. C.: 0.25
IP address range for Dallas: 0.25
IP address range for Router A to Router B serial connection: 0.25
IP address range for Router A to Router C serial connection: 0.25

26
4. (3.000 Points)

Refer to the exhibit.

+ The connection between router vs router, the router with less than ID will be configured the Start-IP.
+ The connection between router vs PC, the router will be configured the Start-IP, PC will be
configured Start-IP + 1.
+ Using static routing with Next-Hop to routing for this diagram. Routes are configured following the
arrow in the diagram.
a) Configure IP for PCs (0.5 point)
Write commands to:
b) Configure IP for router R1 (0.5 point)

27
c) Configure IP for router R2 (0.5 point)
d) Configure IP for router R3 (0.5 point)
e) Static routing (1.0 point)

5. (3.000 Points)
A new office building of DTU is being constructed at 03 Quang Trung St. and will be finished this
year. The building is planned to install 1,000 devices (hosts) for staff. Currently, DTU uses the
10.10.0.0/16 address space.
a) How many valid host addresses are available within the DTU network 10.10.0.0/16?
b) How many bits must the network administrator borrow to provide addresses for the
subnet of the new office building without wasting addresses?
c) What is the subnet mask that should be associated with the newly created subnet?
d) Assuming that there are two departments (A and B) that will be working in this building
(500 hosts for each department). Each department needs a separate LAN. What is the
subnet mask that should be associated with the subnet of each department without
wasting addresses?
e) Assuming that 10.10.15.20/XY is one of the valid host addresses of the subnet for
department A (Note that XY is the subnet mask from question d). What is the network
address and broadcast address of this subnet?
f) One of the printers of department A is assigned the address 10.10.16.20/XY. No one
in department A is able to print with this printer. What is the cause of the problem?
LECTURER

ĐẶNG NGỌC CƯỜNG

28

You might also like