You are on page 1of 5

UANL

_____

FCFM

MASTER OF ENGINEERING IN INFORMATION SECURITY FINAL EXAM TELECOMMUNICATIONS I

KEY: MSTL1-001

Name.- _______________________________________________________Registration______________Date________

Instructions: Read carefully each requirement and gives the correct answer it. Performs procedures personally and be clear in the development, determines your conclusions based on the lessons learned, and it performs the best strategy of assigning IP addresses. Use all the resources you require didactic (colors, pencil, pen, etc.)

Problem 1 Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. This business will be using the class C address 220.10.10.0. Remember to start with your largest groups first. 10 points.

Ing. Mara de Jess Antonia Ochoa Oliva, M.T. mochoa@fcfm.uanl.mx

Problem 2 Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. Show the subnet address and CIDR in the boxes below, color or shade the sub-subnets used in the box. This company will be using the class C address 190.10.10.0. Remember to start with your largest groups first. 20 points.

Color in the squares used with different shades to highlight each subnet.

Ing. Mara de Jess Antonia Ochoa Oliva, M.T. mochoa@fcfm.uanl.mx

Problem 3 Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. Show the subnet address and CIDR in the circle below, color or shade the sub-subnets used. This company will be using the class C address 211.56.70.0. Remember to start with your largest groups first. 20 points.

Color in the necessary circle sections used with different shades to highlight each subnet.

Ing. Mara de Jess Antonia Ochoa Oliva, M.T. mochoa@fcfm.uanl.mx

Problem 4 You are developing a school network with the class C address 193.18.4.0/24. There will be three computer labs with 30 computers each that need to be on different sub-subnets. Forty eight classrooms with one computer each that will comprise a single sub-subnet. The administrative office and guidance office contain a total of seven computers which will need to be grouped together. Plan for four more mini labs with six computers to each sub-subnetwork. Divide the network using variable length subnet masks. Complete the information required below. Remember to work from largest to smallest and make the outline. 40 points.
Subnet Subnet Address Subnet Mask (/x) Subnet Mask (xxx.xxx.xxx.xxx) First Usable Host Last Usable Host Broadcast Address

Ing. Mara de Jess Antonia Ochoa Oliva, M.T. mochoa@fcfm.uanl.mx

Problem 5 Perform the following subnetting scheme: 10 points. Number of needed subnets: 1000 Number of needed usable hosts: 60 Network Address: 165.100.0.0 Address class: Default subnet mask: Custom subnet mask: Total number of subnets: Total number of host addresses. Number of usable addresses: Number of bits borrowed. What is the 15th subnet range? What is the subnet number for the 6th subnet? What is the subnet broadcast address for the 6th subnet? What are the assignable addresses for the 9th subnet?

Bonus: Answer with a T if the function corresponds to the TCP protocol and U, if the function described is for the UDP protocol. (2 points c / u = 20 points)
____ It sends data to the network until the destination warns is ready to receive them. ____ Protocol is Transport Layer preferred by the developer. ____ Use link mechanisms, timers and acknowledgments and dynamic use of windows to perform these functions reliable. ____ Manages the data flow and forwards all data segments received as acknowledgment is received at the destination. ____ No tracks or acknowledges receipt of datagrams at the destination, only received datagrams sent to the application layer as they arrive, and not forward datagrams lost. ____ Reliability is some overhead in the network in terms of larger segments headers and increased network traffic between origin and destination that manages data transport. ____ Applications such as Web Browser, Email, File Transfer offered in: ____ Applications domains System (DNS), streaming video, Voice over IP (IP Vo.) are offered in: ____ Sequence numbers are used for the receiver to understand the original message, the data in the segments are reassembled in the original order. ____ The major protocols used in the transport layer are: DNS, SNMP, DHCP, RIP. Ing. Mara de Jess Antonia Ochoa Oliva, M.T. mochoa@fcfm.uanl.mx 5

You might also like