Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

ISOM3180 Final Assessment

1. Study the following diagram

a. Circle all the broadcast domains and write down the total number of broadcast
domains

There are 8 broadcast domains in total.

b. Circle all the collision domains and write down the total number of collision
domains. You should answer part a and part b separately, i.e. submit one
diagram for part a and one diagram for part b.

1
There are 11 collision domains in total.

2. Study the following diagram

You switch on the PC1 and open a browser and surf htttp://www.isom3180.com.
Describe the encapsulation process within PC1(until PC1 send the data to PC1’s media)
of how PC1 send the data to www.isom3180.com. You have to include all the necessary
address information given in this question. The following information may be useful in
your answer.

Encapsulation process within PC1


Application layer: Network process to application-HTTP
Transport layer: Data are broken into smaller pieces known as segments
Assuming the TCP protocol is used, three-way handshake will be conducted in order to
build connection between PC1 and the receiving host.
Three-way handshake is connection oriented, so it requires connection establishment
before data transfer begins
For a connection to be established, two hosts must synchronize on each other’s initial
sequence number(ISNs)
ISNs are large random numbers chosen by each host.
Connection establishment refers to the process of initializing sequence and
acknowledgement fields and agreeing to the port numbers and window size used.

2
Source Port: 50000
Destination Port: 80
Overall, there are 5 basic services in the Transport layer
1. segmenting upper-layer application data
2. establishing end to end operations
3. sending segments from one end host to another end host
4. ensuring data reliability provided by sequence numbers and acknowledgements
5. ensuring flow control provided by sliding windows(=ask you slow down)

Network layer: Segments are converted into packets. The network header (source and
destination IP address) is identified.
Source IP: 143.0.0.15
Destination IP: 220.0.0.31

Data link layer: Frame header (MAC address of source and destination), network header
(source and destination IP address) and FCS for error detection to the receiver are
present.
MAC address for source: 111.111.111
MAC address for destination: 2222.2222.2222
As PC1 and www.isom3180.com is in different network, PC1 will send the message to
the default gateway, which is R1, therefore, the Destination MAC address will be R1
Fa0/0.

Physical layer: Binary transmission takes place.

The following diagram is for question 3 and 4

3
3. Use one example (communication among PCs) to illustrate the possible collision and
how does CSMA/CD work.

When PC3 and PC4 both want to send a message to PC8, there will be a possible
collision, as they are linked using a HUB. As a HUB does not support full duplex and no
destinated path, it will lead to collision.
For CSMA/CD, if any device wants to send data, it will check whether there are data in
the media, if yes, it will wait until the media is free. However, if PC3 and PC4 both
checked the media and send the message at the same time. Once collision happened,
PC3 and PC4 will stop sending data to avoid further collision. And they will send
jamming signal to other devices in the same collision domain. After collision, the device
which has the smallest random number can send the data first. (First come first serve)

4. Assume all MAC address tables are empty now. Write down all the MAC address tables
after each communication (Communication a to e will take place one after another, i.e.
the MAC address tables will gradually be built). Also indicate which PCs will receive the
message and discard, which PCs will process the message up to the application layer.
MAC addresses of PC1, PC2, …, PC8 are MAC-1, MAC-2, …, MAC-8 respectively.
a. PC6 sends a broadcast message.

Switch 3
MAC Address Port Number
MAC-6 Fa0/2

Switch 2
MAC Address Port Number
MAC-6 Fa0/2

Switch 1
MAC Address Port Number
MAC-6 Fa0/3

b. PC5 sends a message to PC6.

Switch 3
MAC Address Port Number
MAC-6 Fa0/2
MAC-5 Fa0/1

Switch 2
MAC Address Port Number
MAC-6 Fa0/2
MAC-5 Fa0/3

4
Switch 1
MAC Address Port Number
MAC-6 Fa0/3

c. PC6 sends a message to PC1.

No change to the MAC address table as Switch generate MAC address table
based on source MAC address.
Switch 3
MAC Address Port Number
MAC-6 Fa0/2
MAC-5 Fa0/1

Switch 2
MAC Address Port Number
MAC-6 Fa0/2
MAC-5 Fa0/3

Switch 1
MAC Address Port Number
MAC-6 Fa0/3

d. PC1 sends a message to PC5.

Switch 3
MAC Address Port Number
MAC-6 Fa0/2
MAC-5 Fa0/1

Switch 2
MAC Address Port Number
MAC-6 Fa0/2
MAC-5 Fa0/3
MAC-1 Fa0/1

Switch 1
MAC Address Port Number
MAC-6 Fa0/3
MAC-1 Fa0/1

e. PC3 sends a message to PC6.

Switch 3

5
MAC Address Port Number
MAC-6 Fa0/2
MAC-5 Fa0/1
MAC-3 Fa0/1

Switch 2
MAC Address Port Number
MAC-6 Fa0/2
MAC-5 Fa0/3
MAC-1 Fa0/1
MAC-3 Fa0/1

Switch 1
MAC Address Port Number
MAC-6 Fa0/3
MAC-1 Fa0/1
MAC-3 Fa0/4

The following diagram is for questions 5, 6 and 7


All IP addresses are configured statically according to the Table 1 except for the one stated with
DHCP. Routing tables for all routers are given.

6
Table 1
Device Interface IP address Subnet Mask MAC address
R1 Fa0/0 10.0.0.1 255.0.0.0 MAC-1
S0/0 14.0.0.1 255.0.0.0 MAC-2
S0/1 17.0.0.1 255.0.0.0 MAC-3
R2 Fa0/0 11.0.0.1 255.0.0.0 MAC-4
S0/0 14.0.0.2 255.0.0.0 MAC-5
S0/1 15.0.0.1 255.0.0.0 MAC-6
S0/2 18.0.0.1 255.0.0.0 MAC-7
R3 Fa0/0 12.0.0.1 255.0.0.0 MAC-8
S0/0 15.0.0.2 255.0.0.0 MAC-9
S0/1 16.0.0.1 255.0.0.0 MAC-10
R4 Fa0/0 13.0.0.1 255.0.0.0 MAC-11
S0/0 17.0.0.2 255.0.0.0 MAC-12
S0/1 16.0.0.2 255.0.0.0 MAC-13
S0/2 18.0.0.2 255.0.0.0 MAC-14
PC1 NIC 10.0.0.2 255.0.0.0 MAC-15
PC2 NIC 11.0.0.2 255.0.0.0 MAC-16
PC3 NIC DHCP DHCP MAC-17
PC4 NIC DHCP DHCP MAC-18
PC5 NIC 12.0.0.2 255.0.0.0 MAC-19
PC6 NIC 13.0.0.2 255.0.0.0 MAC-20
PC7 NIC 13.0.0.3 255.0.0.0 MAC-21
R1’s routing table R2’s routing table
Network Outgoing Network Outgoing
address interface address interface
10.0.0.0 Fa0/0 10.0.0.0 S0/0

7
11.0.0.0 S0/0 11.0.0.0 Fa0/0
12.0.0.0 S0/0 12.0.0.0 S0/2
13.0.0.0 S0/0 13.0.0.0 S0/1
14.0.0.0 S0/0 14.0.0.0 S0/0
15.0.0.0 S0/0 15.0.0.0 S0/1
16.0.0.0 S0/1 16.0.0.0 S0/1
17.0.0.0 S0/1 17.0.0.0 S0/0
18.0.0.0 S0/1 18.0.0.0 S0/2

R3’s routing table R4’s routing table


Network address Outgoing interface Network address Outgoing interface
10.0.0.0 S0/1 10.0.0.0 S0/0
11.0.0.0 S0/0 11.0.0.0 S0/2
12.0.0.0 Fa0/0 12.0.0.0 S0/1
13.0.0.0 S0/1 13.0.0.0 Fa0/0
14.0.0.0 S0/0 14.0.0.0 S0/0
15.0.0.0 S0/0 15.0.0.0 S0/1
16.0.0.0 S0/1 16.0.0.0 S0/1
17.0.0.0 S0/1 17.0.0.0 S0/0
18.0.0.0 S0/0 18.0.0.0 S0/2

5. PC3 is just connected to the network and request the IP address from R2, which is also
configured as DHCP server. Assume DHCP server will assign 11.0.0.50 to PC3.
Describe all the step on how PC3 can get IP address from R2. You also need to provide
source IP, source MAC, destination IP and destination MAC addresses of all the steps.

When PC3 just connected to the network, it not yet has an IP address, so it will send a
broadcast message.
DHCP discover
IP(Source: 0.0.0.0 , Destination: 255.255.255.255)
MAC(Source: MAC-17, Destination: FFFFFFFFFFFF)

Then, R2 will reply the broadcast message, giving the proposed IP address.
DHCP offer
IP(Source: 11.0.0.1, Destination: 11.0.0.50)
MAC(Source: MAC-4, Destination: MAC-17)

PC3 will then send a broadcast message, telling the DHCP server that it will use
11.0.0.50 as the IP address.
DHCP request
IP(Source: 0.0.0.0, Destination: 255.255.255.255)
MAC(Source: MAC-17, Destination: FFFFFFFFFFFF)

At last, R2 will send a message to PC3 to tell it, go ahead using IP address 11.0.0.50
DHCP ACK
IP(Source: 11.0.0.1, Destination: 11.0.0.50)
MAC(Source: MAC-4,Destination: MAC-17)

8
6. For the following questions (a to c), describe all the messages required for these
communication. You also need to provide source IP, source MAC, destination IP and
destination MAC of all related messages travelled from a device to another device within
the whole process. All questions (a to c) are independent to each other.

a. PC6 sends a message to PC7 and PC7 will send a reply back to PC6. Assume
all ARP tables are empty.

PC6 can find the IP address of PC7 through the DNS server.
As PC6 ARP table is empty, therefore, it will send an ARP request to know the
MAC address of PC7.

IP(Source: 13.0.0.2, Destination: 13.0.0.3)


MAC(Source: MAC-20, Destination: FFFFFFFFFFFF)

The S2 will then flood the message, assuming the MAC address table of S2 is
empty. And it will record MAC-20 and the corresponding port number in its MAC
address table. As router has no flooding function, it will discard the message.

PC7 will receive the message.


PC7 sends the ARP reply to PC6
IP(Source: 13.0.0.3, Destination: 13.0.0.2)
MAC(Source: MAC-21, Destination: MAC-20)

The S2 will record the MAC-21 and its corresponding port number in its MAC
address table.

After the ARP request and reply, PC6 now has the MAC address of PC7 also, it
can send the message to PC7.
IP(Source: 13.0.0.2, Destination: 13.0.0.3)
MAC(Source: MAC-20, Destination: MAC-21)

The S2 will forward the message to PC7.

Then PC7 receives and replies the message


IP(Source: 13.0.0.3, Destination: 13.0.0.2)
MAC(Source: MAC-21, Destination: MAC-20)

The S2 will forward the message to PC6.


PC6 receives the message.

9
b. PC2 sends a message to PC6 and PC6 will send a reply back to PC2. Assume
all ARP tables are completed.

As PC2 gets the IP address of PC6 from the DNS server.


And all the ARP tables are completed, PC2 will know the other devices’ MAC
address.

As PC2 and PC6 are in different network, destination MAC address will be the
default gateway MAC address, which is R2 Fa0/0.
PC2 to R2
IP(Source: 11.0.0.2, Destination: 13.0.0.2)
MAC(Source: MAC-16, Destination: MAC-4)
S1 will flood the message.(Assuming the MAC address table is empty)
S1 will record the MAC address of PC2.
R2 will receive the message.

Based on the routing table, R2 will send the message to R3


R2 sends to R3
IP(Source: 11.0.0.2, Destination: 13.0.0.2)
MAC(Source: MAC-6, Destination: MAC-9)

R3 sends to R4
IP(Source: 11.0.0.2, Destination: 13.0.0.2)
MAC(Source: MAC-10, Destination: MAC-13)

R4 will send to PC6


IP(Source: 11.0.0.2, Destination: 13.0.0.2)
MAC(Source: MAC-11, Destination: MAC-20)

S2 will flood the message, assuming the MAC address table is empty. And it will
remember the source MAC address, MAC-11.
PC6 will receive the message.

PC6 reply the message to PC2


As PC6 and PC2 are in different network, destination MAC address will be the
default gateway MAC address, which is R4, Fa0/0.

IP(Source: 13.0.0.2, Destination: 11.0.0.2)


MAC(Source: : MAC-20, MAC-11)

S2 will forward the message.

Based on the routing table, R4 will send the message to R2.


R4 to R2
IP(Source: 13.0.0.2, Destination: 11.0.0.2)
MAC(Source: : MAC-14, MAC-7)

10
R2 sends to PC2
IP(Source: 13.0.0.2, Destination: 11.0.0.2)
MAC(Source: : MAC-4, MAC-16)
S1 will forward the message to PC2.

PC2 will receive the message

c. PC1 sends a message to PC5 and PC5 will send a reply back to PC1. Assume
ARP tables of all routers are completed but ARP table of PC1 and PC5 are
empty.

As ARP table of PC1 is empty, it needs to send an ARP request to R1 to get the
destination MAC address.
PC 1 can get the IP address of PC5 and R1 from the DNS server.

ARP request
PC1 to R1
IP(Source: 10.0.0.2, Destination: 10.0.0.1)
MAC(Source: MAC-15, Destination: FFFFFFFFFFFF)

ARP reply
R1 to PC1
IP(Source: 10.0.0.1, Destination: 10.0.0.2)
MAC(Source: MAC-1, Destination: MAC-15)

Now PC1 can get the Mac address of R1, Fa0/0.

PC1 send to PC5


As PC1 and PC5 are in different network, destination MAC address will be the
default gateway MAC address, which is R1,Fa0/0.
IP(Source:10.0.0.2, Destination: 12.0.0.2)
MAC(Source: MAC-15, Destination: MAC-1)

According to the R1 routing table, to send to network 12.0.0.0, the outgoing


interface will be S0/0, therefore, R1 will send to R2.

R1 sends to R2
IP(Source: 10.0.0.2, Destination: 12.0.0.2)
MAC(Source: MAC-2, Destination: MAC-5)

R2 sends to R4
IP(Source: 10.0.0.2, Destination: 12.0.0.2)
MAC(Source: MAC-7, Destination: MAC-14)

11
R4 send to R3
IP(Source: 10.0.0.2, Destination: 12.0.0.2)
MAC(Source: MAC-13,MAC-10)

R3 send to PC5
IP(Source: 10.0.0.2, Destination: 12.0.0.2)
MAC(Source: MAC-8, Destination: MAC-19)

PC5 receives the message.


Now PC5 knows the MAC address of R3 Fa0/0 as it has received the message from
R3, the source MAC address will be recorded by PC5.

As PC5 and PC1 are in different network, destination MAC address will be the
default gateway MAC address, which is R3,Fa0/0.
PC5 sends to R3
IP(Source: 12.0.0.2, Destination: 10.0.0.2)
MAC(Source: MAC-19, Destination: MAC-8)

As based on the R3 routing table, to send to network 10.0.0.0, the outgoing interface
is S0/1, therefore, R3 will send to R4.

R3 sends to R4
IP(Source: 12.0.0.2, Destination: 10.0.0.2)
MAC(Source: MAC-10, Destination: MAC-13)

R4 send to R1
IP(Source: 12.0.0.2, Destination: 10.0.0.2)
MAC(Source:MAC-12, Destination: MAC-3)

R1 send to PC1
IP(Source: 12.0.0.2, Destination: 10.0.0.2)
MAC(Source:MAC-1, Destination: MAC-15)

PC 1 will receive the message.

7. What should be the commands issued on R4 to complete the routing table using static
route as shown? The commands should specify next hop IP instead of outgoing
interface.

R4(config)#ip route 10.0.0.0 255.0.0.0 17.0.0.1


R4(config)#ip route 11.0.0.0 255.0.0.0 18.0.0.1
R4(config)#ip route 12.0.0.0 255.0.0.0 16.0.0.1
R4(config)#ip route 14.0.0.0 255.0.0.0 17.0.0.1
R4(config)#ip route 15.0.0.0 255.0.0.0 16.0.0.1

12
8. There are 4 departments in a company (Administration, marketing, IT and operation).
Some departments will have more than one section. There are different numbers of
computers in different sections. Each department has one router. All routers are
connected in a ring topology. Each section of a department is assigned a subnetwork.
You are given a network address 170.0.0.0. Design a subnet scheme by borrowing
maximum number of bits. Follow the table below, draw a network diagram with the use
of PC, router, switch and cable so that all PC can communicate with each other. Mark
down which router is used for the specific department (e.g. Marketing router). Assign IP
address to each interface necessary in your diagram.

Department Section No. of PC


Administration A 4
Marketing A 2
B 4
IT A 1
B 3
Operation A 3
B 1
C 2

Please refer to the following diagram

13
9. Your school acquired a class A address, 56.0.0.0. You need to create a subnetting
scheme to provide the following:

35 subnets with each subnet 300 hosts


29 subnets with each subnet 150 hosts
12 subnets with each subnet 100 hosts
36 subnets with each subnet 30 hosts
12 subnets with each subnet 20 hosts

What is the minimum and maximum number of bits can be borrowed? Please give
justification to your answer.

There are in total 124 subnets in our network and the maximum number of hosts in a subnet is
300.
For 124 subnets, we need to borrow at least 7bits, so we can have 128 subnets.
For usable hosts, we need to have 300 hosts.
Therefore, 2^(n)-2=300
n=9
It means that at least 9H is needed.
2^(9)-2=510>300
The remaining bits (24-9)=15bits
Therefore, maximum bits can be borrowed is 15bits.

14

You might also like