0% found this document useful (0 votes)
55 views

Itt Ass

This document contains instructions for an individual assignment on data communications and networking. It consists of two parts, with Part A containing 15 questions on error detection and Part B containing 8 questions on IP addressing.

Uploaded by

Aizat Fauzi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Itt Ass

This document contains instructions for an individual assignment on data communications and networking. It consists of two parts, with Part A containing 15 questions on error detection and Part B containing 8 questions on IP addressing.

Uploaded by

Aizat Fauzi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CONFIDENTIAL CS/DEC 2022/ITT400

UNIVERSITI TEKNOLOGI MARA


INDIVIDUAL ASSIGNMENT

COURSE INTRODUCTION
: TO DATA COMMUNICATIONS AND
NETWORKING
:ITT400
COURSE CODE
:DEC 2022
DATE
:WEEK 10
DUE DATE

INSTRUCTIONS TO CANDIDATES
1.
This group assignment consists of TWO parts. PART A consists of 15
questions and PART B consists of 8 questions.
2.
The TOTAL MARKS for this question paper is 100.
3.
Answer ALL questions.
4.
Please fill in the blanks for the following.

STUDENT NAME STUDENT NO. GROUP

THIS PAPER CONSISTS OF 5 PRINTED PAGES

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


PART A – ERROR DETECTION (Chapter 6)

40
1. Define the terms the types of errors. (1M)
2. Define the concept of CRC. (1M)
3. Explain how CRC checker works. (1M)
4. List the steps followed in checksum generator (3M)
5. Sort these Checksum steps into order (5M)

The two checksum values are compared by the receiving computer


The receiving computer uses the data it receives to also calculate what it believes should
be the checksum, using the same mathematical algorithm
The sending computer uses the block of data to be sent, and a predefined mathematical
algorithm, to calculate a checksum value
If the checksum values don’t match, the receiving computer requests that the data is
transmitted again
The sending computer sends the data, plus the checksum value

6. The final number in a code of numbers. It is calculated from all the other numbers in the code. Its
purpose is to spot errors on data entry. From the explanation, what is the detectionmethod
referring to? (1M)
7. The receiving computer sends a copy of the data immediately back to the sending computer for
comparison. From the explanation, what is the detection method referring to? (1M)
8. Sort these Parity Check steps into order (5M)

The sending computer adds the correct parity bit to the binary data (either an extra 1 or 0)
The receiving computer checks to make sure the overall parity of the data received is as
agreed (an even or odd number of 1 bits)
The sending and receiving computers agree the protocol to be used (even or odd)
If the parity of the data is incorrect, the receiving computer will request that the data is transmitted
again
The sending computer sends the binary data, including the parity bit

9. A block of data is sent alongside a calculated value. The receiving computer also calculates what it
believes should be the value. The values are then compared to see if an error has occurred during
transmission. From the explanation, what is the detection method referring to? (1M)
10. An extra bit added to a string of binary code to ensure the number of 1-bits are either even or odd,
depending upon the system used. From the explanation, what is the detection method referring to?
(1M)
11. How can the simple parity bit detect a damaged data unit? (3M)
12. What is the difference between even parity and odd parity? (4M)
13. Discuss the two-dimensional parity check and the types of errors it can and cannot detect. (5M)
14. Discuss the concept of redundancy in error detection. (4M)
15. How is the check sum method of error detection take place? (4M)
PART B – IP ADDRESSING (Chapter 7)

60
1) Identify the class for the following IP address:

(10 Marks)
Address Class
148.17.9.1
193.42.1.1
126.8.156.0
220.200.23.1
230.230.45.58
10110001 01100100 00010010 00000100
01110111 00010010 00101101 00000000
11111001 11110000 01010000 01001110
01011111 00000000 00000101 01011010
10011110 01100010 01010000 00000000

2) Write the network id (netid) for the following addresses:

(5 Marks)
117.89.56.45
215.45.45.0
10.250.1.1
150.10.15.0
192.14.2.0

3) Write the device id (hostid) for the following addresses:

(5 Marks)
123.102.45.254
148.17.9.155
100.25.1.1
195.0.21.98
25.250.135.46
4) Using the following IP address and subnet mask, write the network address:
(10 Marks)
IP Address Subnet Mask Network Address
192.149.24.191 255.255.255.0 192.149.24.0
150.203.23.19 255.255.0.0 150.203.0.0
27.125.200.151 255.0.0.0 27.0.0.0
223.69.230.250 255.255.0.0 223.69.230.0
28.212.250.254 255.255.0.0 28.0.0.0
199.20.150.35 255.255.255.0 199.20.150.0
10.10.10.10 255.0.0.0 10.0.0.0
186.13.23.110 255.255.255.0 186.13.0.0
10.10.48.80 255.255.255.0 10.0.0.0
188.10.18.2 255.255.0.0 188.10.0.0

5) Using the following IP address and subnet mask, write the host address:
(10 Marks)
IP Address Subnet Mask Host Address
192.149.24.191 255.255.255.0 256-2=254
117.15.2.51 255.0.0.0 64-2= 62
27.125.200.151 255.0.0.0 256-2=254
223.169.23.20 255.255.0.0 32-2=30
48.21.25.54 255.255.0.0 64-2=62
199.120.150.35 255.255.255.0 64-2=62
10.10.10.10 255.0.0.0 16-2=14
191.55.165.135 255.255.255.0 256-2=254
10.10.48.80 255.255.255.0 128-2=126
188.10.18.2 255.255.0.0 4-2=2

6) Write the correct subnet mask for each of the following addresses:

(10 Marks)
IP Address Subnet Masks
126.123.23.1 255.0.0.0
223.69.230.250 225.255.255.0
192.12.35.105 225.255.255.0
77.251.200.51 255.0.0.0
189.210.50.1 225.225.0.0
88.45.65.35 255.0.0.0
128.212.250.254 225.225.0.0
193.100.77.83 225.255.255.0
125.125.250.1 255.0.0.0
1.1.10.50 255.0.0.0

7) Given the address 23.56.7.91 and the default class A mask, find the first address
(network address).

23.56.7.1
(2 Marks)

8) Given the address 132.6.17.85 and the default class B mask, find the first address
(network address).
(2 Marks)
132.6.1.1

9) Consider the IP address of 182.133.129.55.


(6 Marks)
a) What is the class of this network if classful addressing was used?
Class b
b) How many bit long is the network-ID if classful addressing was used?
16
c) What is the network ID and host-ID of our computer?
network ID = 182.133
host-ID = 129.55
d) What is the default network mask?
255.255.0.0
e) How many network hosts (computers) can be addressed in this network?
64-2=62

You might also like