INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Terminal Examinations, Spring 2020
Course Title: Computer Communication Course Code: CCN 372
and Networks
Program: BSCS F17 (A and B) Batch: Fall 2017
Total Marks: (60 marks for BS) Date & Time: 16-Aug-2020
(08:00 am to 04:00 pm)
Credit Hours: 03 Teacher Name: Umara Zahid
Q. No. Marks Obtained
1
2
3
Total for Semester Exam
Mid-term Marks
Total Marks out of 100
Student Name: _Kamila Mahmood________________________________
Student Registration Number: 3581- FBAS/BSCS/F17B
Instructions for Students:
Before starting your open book examination, please read all the given below instructions
carefully, and must follow these instructions carefully. You must affirm the honesty pledge given
at the end:
1. Download the question paper titled as “Computer Communication and Networks_Question
Paper.pdf” (pdf file) and answer-sheet titled as “Computer Communication and
Networks_Answer-Booklet.docx” (MS Word document) from the Google Classroom as per
instructions of your teacher. You are required to write down the answers to each question in your
own handwriting on neat white papers with any blue pen.
2. Maximum time to download question paper, attempt and submit / upload your answer sheets
is 8 HOURS. As soon as you finish your paper Upload your answer booklet on priority basis
soon. You can only upload your exam response once. You will be unable to re-upload an
additional or amended version. If you fail to submit it within the due time, your paper will be
considered cancelled.
Page 1 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
3. How to submit(upload) your answer-booklet/paper:
After completing your answers, you need to:
a. Mention/write your Name and Registration Number, Page number and sign on each
page of your handwritten answer-sheet.
b. Take pictures using mobile camera or Scan each page of your written answers /answer
sheets via any scanning software (as guided in the video tutorial).
c. Insert all pictures or scanned images of your answer sheets into the MS word file titled as
“Computer Communication and Networks_Answer-Booklet.docx” provided by the
teacher in the Google Classroom.
d. After inserting all the images, save the “Computer Communication and Networks
_Answer-Booklet.docx” file as a single PDF file (Only PDF format is acceptable as
your answer-booklet), and upload it in the Google Forms (link of which is provided in
the Google Classroom).
e. Please make sure you upload the correct document as you will not be able to change this,
once it has been submitted.
(Please see the video tutorial regarding procedure to upload the examination responses,
shared in the Google classroom).
4. The University views copying from one another's examination paper/ cheating, giving or receiving
unpermitted aid, discussion/consultation, plagiarism, impersonation during an examination, as
serious disciplinary offences that may fall under the category of Use of Unfair Means and will be
dealt as per university rules for UMCC.
5. Before starting your examination, you must agree to and sign the following pledge by having a
click on the Student’s Affirmation check box (it is mandatory to Tick the Checkbox):
“I hereby affirm that i) I shall solve this paper on my own and I shall not seek the help
of any person(s) with any sort of aid (like telephonic/verbal help, attempted
answers related to my examination etc.) while taking my paper ,(ii) or will not
provide assistance of any sort (verbal or written) to other fellow students. If I am
found involved in i) cheating ii) impersonation, iii) or using plagiarized content in my
writing, my case may be dealt as per university rules and procedures for using unfair
means.”
Student’s Affirmation: √
Page 2 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Q1. Solve the Following:
a) An IPv4 packet has arrived with the first few hexadecimal digits as shown.
0x45000028000100001117……
How many hops can this packet travel before being dropped? The data belong to what
upper-layer protocol? (Marks: 4)
b) In an IPv4 packet, the value of HLEN is 5, and the value of the total length field is
Ox0028. How many bytes of data are being carried by this packet? (Marks: 4)
c) An IPv4 fragment has arrived with an offset value of 258, how many bytes of data is sent
before this fragment? (Marks: 4)
d) An IPv4 Datagram of 6050 bytes needs to be fragmented according to an MTU of 576
bytes for X.25 protocol. The identification number of the datagram is 11,586.
Diagrammatically elaborate the fragmentation process. Also show the values for
identification, flag and fragmentation offset field. (Marks: 4)
e) A host is sending 25 datagrams to another host. If the identification number of the first
datagram is 2046, what is the identification number of the last in IPv4? (Calculate)
(Marks: 4)
Page 3 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 4 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 5 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Q2. Solve the following:
Page 6 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
a. What kind of security service is needed for the following scenarios? How it can be
implemented?
1. Any social website log-in system. (Marks: 3)
2. Storing your personal documents on any cloud. (Marks: 3)
3. A situation in which we need both message integrity and authentication?
(Marks: 3)
4. Alice and Bob have a shared account in a Bank. Alice withdraws $15,400 and
then denies it. (Marks: 3)
5. A withdraw of $10 from ATM recorded as $1 in the bank account. (Marks: 3)
b. Using MAC function we can ensure integrity of the message by applying shared secret
key. Propose a method that achieves confidentiality along with this MAC based integrity.
It is your choice what kind of cryptography technique you use (symmetric/ asymmetric).
(Marks: 5)
Page 7 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 8 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 9 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 10 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 11 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 12 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 13 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 14 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 15 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 16 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 17 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Q3. Solve the following:
a) You have designed a website. You want to host it on your laptop. Your laptop has
windows 10 installed. You want to setup an FTP server on your windows using IIS
manager. Explain the steps (in text):
To install the FTP server components on Windows 10 (Marks: 5)
To configure an FTP server site on Windows 10 (Marks: 5)
b) Bob has an email account at Gmail, Bob@gmail.com and Alice has an email account at
yahoo, Alice@yahoo.com. Bob wants to send an email to Alice. Here is a sequence
diagram of SMTP commands and replies.
As we know SMTP uses TCP protocol. Answer the following questions
What are the two close a connection using TCP? Which way is used here? (Marks: 2)
What commands refer to syn, ack and fin flags in the given diagram? (Marks: 2)
Show the above process using TCP windowing approach. Suppose window size is
1000 bytes and sequence number is starting from 100. (Marks: 2)
How does the acknowledgement number help windowing? (Marks: 2)
Page 18 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
How does the meaning of the sequence number change after the three way
handshake? (Marks: 2)
Page 19 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 20 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 21 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 22 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 23 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 24 of 25
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FACULTY OF BASIC & APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE & SOFTWARE ENGINEERING
Page 25 of 25