Key To Correction: PART I. Multiple Choice Questions: Encircle Your Chosen Answers
Key To Correction: PART I. Multiple Choice Questions: Encircle Your Chosen Answers
PRELIMINARY EXAMINATION
ELE 17: DATA COMMUNICATIONS
PART I. Multiple Choice Questions: Encircle your a. Every device stops transmitting for a short
chosen answers. time.
b. A jam signal is sent to notify devices of a
1. What information can DHCP provide to clients?
collision.
(Choose three.)
c. A collision signal is sent to notify devices of a
a. Destination Network
collision.
b. IP Address
d. A random back-off algorithm starts.
c. Gateway Address
e. Every device listens then sends packet
d. DNS
immediately.
e. ARP
https://www.geeksforgeeks.org/back-off-
algorithm-csmacd/
SMTP – Simple Mail Transfer Protocol. SMTP is 6. Which protocol is responsible for controlling the
an application layer protocol. The client who size and rate of the HTTP messages exchanged
wants to send the mail opens a TCP connection to between server and client?
the SMTP server and then sends the mail across a. HTTP
the connection. b. ARP
c. TCP
3. What takes place when a collision occurs on an d. DHCP
ethernet network? (Choose three.) e. UDP
KEY TO CORRECTION
7. When troubleshooting Ethernet connectivity 11. Which of the following commands you can use to
issues, how can you verify that an IP address is determine the IP address configuration of an
known to a switch? existing port interface? (Choose two.)
a. Check whether the IP address is in routing a. show run
table. b. show ip route
b. Check whether an access-list is blocking the c. ping ip
IP address. d. show ip int br
c. Check whether the IP address is in the MAC e. telnet ip
table.
d. Check whether the IP address is in the ARP Explanation:
table. show run – displays the current running-
e. Check whether the IP address is in the configuration of your cisco device which includes
running-configuration all interfaces’ IP settings.
Explanation: You can verify if an IP address is show ip int br – displays the summarized
known to a switch by checking the ARP table of information of interfaces and their corresponding
the device. In most cisco devices, you can use the IP settings.
command “show arp” to list down all known
devices’ IP and MAC addresses. 12. Which IEEE mechanism is responsible for the
authentication of devices when they attempt to
8. What TCP/IP protocol provides terminal connect to a local network?
emulation to a remote host? a. 802.11
a. HTTP b. 802.3x
b. VPN c. 802.1x
c. Telnet d. 802.2x
d. SNMP e. 802.16
e. FTP
Explanation: The IEEE 802.1X standard defines
Explanation: Telnet is a part of the TCP/IP how to provide authentication for devices trying
protocol suite and is a virtual terminal protocol to connect with other devices on LANs or
that allows you to make connections to remote wireless LANs.
devices, gather information, and run programs.
Telnet uses port 23 to establish connection. https://www.networkworld.com/article/221649
9/wireless-what-is-802-1x.html
9. Which PDU format is used when bits are received
from the network medium by the NIC of a host? 13. Which three elements are field in a basic Ethernet
a. file data frame? (Choose three.)
b. frame a. Preamble
c. packet b. Frame Check Sequence
d. segment c. Time to Live
e. data d. Version
e. Type
Explanation: Network Medium (Layer 1) – bits.
NIC (Layer 2) – frames. Explanation: Kindly recall our past lecture
about fundamental frame format.
10. On which command line mode you can add an
encrypted enable password and a local login? 14. What protocol is assigned to port numbers 20 and
a. Router> 21?
b. Router(config)# a. DNS
c. Router(config-line)# b. Telnet
KEY TO CORRECTION
Explanation:
16. Refer to the exhibit below. The two connected 18. What are three characteristics of the TCP
ports on the switch are not turning orange or protocol? (Choose three.)
green. What would be the most effective steps to a. It uses a single SYN-ACK message to
troubleshoot this physical layer problem? establish a connection.
(Choose three.) b. The connection is established before data is
transmitted.
c. It ensures that all data is transmitted and
received by the remote device.
Gi 0/1 d. It supports significantly higher transmission
speeds than UDP.
Gi 0/1
e. It requires applications to determine when
data packets must be retransmitted.
a. Ensure that the Ethernet encapsulations match 19. Which two statements about Ethernet standards
on the interconnected router and switch ports. are true? (Choose two)
KEY TO CORRECTION
Question 2: Match the items on the left with appropriate protocol on the right.
Question 3: A user is unable to connect to the Internet. Based on the layered approach to troubleshooting and beginning
with the lowest layer. Follow the guide and arrange the steps.
Part IV. Illustrative: Refer to the following exhibits and provide the needed information.
Exhibit 1
Supposed computer A wanted to send an email through SMTP protocol to computer B, complete the data frame format if
the packet is already travelling from R2 to R4.
PC-A PC-B
KEY TO CORRECTION
Router Interface IP Address Subnet Mask MAC Address
Gi0/1 116.93.0.1 255.255.255.252
R1 00:89:AA:F2:36:0A
Gi0/2 172.16.31.1 255.255.255.0
Gi0/1 116.93.0.2 255.255.255.252
R2 Gi0/2 116.93.1.1 255.255.255.252 00:89:BB:F2:36:0A
Tunnel0 12.12.12.1 255.255.255.0
Gi0/1 116.93.1.2 255.255.255.252
R3 Gi0/2 172.16.32.1 255.255.255.0 00:89:CC:F2:36:0A
Gi0/3 116.93.2.1 255.255.255.252
Gi0/1 116.93.3.1 255.255.255.252
Gi0/2 116.93.2.2 255.255.255.252
R4 00:89:DD:F2:36:0A
Gi0/3 172.16.33.1 255.255.255.0
Tunnel0 12.12.12.2 255.255.255.0
R5 Gi0/1 116.93.3.2 255.255.255.252 00:89:EE:F2:36:0A
EMAIL MESSAGE
Exhibit 2
10.0.1.0/24 113.45.62.0/30
INTERNET
Part V. Draw the flowchart for the CSMA/CD operation and explain in one paragraph. (20pts)
In the early version of Ethernet Technology, devices use half duplex mode of transmission – meaning that devices
cannot send or receive information at the same time. Because when two or more devices send and receive information at
the same time, it will cause collision. To further ensure that devices will not collide with their transmissions, Ethernet
technology uses CSMA/CD or Carrier Sense Multiple Access/Collision Detection. CSMA/CD works by ensuring every
connected devices must listen first with the network medium. A device will “sense” if there’s an ongoing traffic on the
medium – if there is, device will continue to listen and if there’s none, device will continue to transmit. There will be a
point that when two or more connected devices sensed that there is no ongoing traffic, they will transmit at the same time
and collision will occur. Once collision is detected, it will automatically terminate the connections, will send jam signal to
notify all devices about the collision happened and will wait for a specific interval of time before retransmitting the pending
information. At this moment, the back-off algorithm will run to make sure every devices will be given a specific interval of
time to retransmit their information. If there’s no collision happened upon transmission or retransmission, the process will
be completed.
NOTE: Apologies, as I was not able to retrieve my reference website for this topic. I also gave partial points for the
diagram and explanation.
Terminates connections,
LISTEN sends jam signal and
wait.
YES
Is there an Is there a
ongoing TRANSMIT collision?
YES traffic? NO
NO
TRANSMISSION
COMPLETE
KEY TO CORRECTION