COM548 Advanced Networking Protocols
Module 1 Discussion 
Research the most powerful mainframes. Pick one mainframe computer, list its specs, and state what it is used for.
 
COM548 Advanced Networking Protocols
Module 2 Discussion 
Find one application-layer protocol and explain how it works. Do not repeat your classmate’s chosen protocol.
 
COM548 Advanced Networking Protocols
Module 3 Discussion 
Do some research on transport protocols (TCP Reno, TCP Vegas, FAST TCP, TCP New Reno, and TCP Hybla). Choose one protocol to explain their working mechanism. You can choose a subsection of a protocol to discuss if the protocol is already chosen.
 
COM548 Advanced Networking Protocols
Module 4 Discussion 
Do some research and provide a feature of a network service that you believe is important in improving network performance.
 
COM548 Advanced Networking Protocols
Module 5 Discussion 
Do some research and provide an IEEE link-layer protocol within IEEE 802.3 working group, for example, 802.3a. State its purposes and features.
 
COM548 Advanced Networking Protocols
Module 6 Discussion 
This discussion requires you to demonstrate your excellence in research skill. You need to find a wireless protocol and discuss its link (MAC) layer working mechanism. Discuss how you applied the core value of excellence as you completed your research. Make sure to answer your classmates’ questions thoroughly.
 
COM548 Advanced Networking Protocols
Module 7 Discussion 
Pick a video or an audio encoding technique. Discuss its specification and its advantages/disadvantages.
 
COM548 Advanced Networking Protocols
Module 8 Discussion 
Research a recent a network attack, explain the attack, and provide a solution for it.
 
 
 
COM548 Advanced Networking Protocols
Module 1 Assignment   
This assignment will help you learn more about security management.
Chapter 1 (pg. 70):
•    P2
•    P6
•    P15
•    P24
 
COM548 Advanced Networking Protocols
Module 2 Assignment   
This assignment will help you learn more about security management.
Chapter 2 (pg. 173):
P1
P4
P10
P18
 
COM548 Advanced Networking Protocols
Module 3 Assignment   
This assignment will help you learn more about security management.
Chapter 3 (pg. 289):
P1
P3
P4
P14
 
COM548 Advanced Networking Protocols
Module 4 Assignment   
This assignment will help you learn more about security management.
Chapter 4 (pg. 364): P1 & P5
Chapter 5 (pg. 429): P3 & P17
 
COM548 Advanced Networking Protocols
Module 5 Assignment   
This assignment will help you learn more about security management.
Chapter 6 (pg. 508):
P1
P2
P3
P14
 
COM548 Advanced Networking Protocols
Module 6 Assignment   
This assignment will help you learn more about security management.
Chapter 7 (pg. 585):
P1
P2
P5
P10
P15
 
COM548 Advanced Networking Protocols
Module 7 Assignment   
This assignment will help you learn more about security management.
Chapter 9 (pg. 728):
P1
P5
P6
P11
 
COM548 Advanced Networking Protocols
Module 8 Assignment   
Assignment 8
This assignment will help you learn more about security management.
Chapter 8 (pg. 666):
P1
P2
P4
P19
 
 
 
 
 
COM548 Advanced Networking Protocols
Module 1 Lab  1
Complete the lab Wireshark Intro and submit all of the deliverables associated with this lab.
Access the lab via the Companion Website. Directions for online access are within your textbook.
Submit Lab 1 to the Assignment folder no later than Sunday 11:59 PM EST/EDT.
 
 
COM548 Advanced Networking Protocols
Module 2 Lab  2
Complete the lab Wireshark HTTP and submit all of the deliverables associated with this lab.
Access the lab via the Companion Website. Directions for online access are within your textbook.
Submit Lab 2 to the Assignment folder no later than Sunday 11:59 PM EST/EDT.
 
COM548 Advanced Networking Protocols
Module 3 Lab  3
Complete the lab Wireshark TCP and submit all of the deliverables associated with this lab.
Access the lab via the Companion Website. Directions for online access are within your textbook.
Submit Lab 3 to the Assignment folder no later than Sunday 11:59 PM EST/EDT.
 
COM548 Advanced Networking Protocols
Module 4 Lab  4
Complete the lab Wireshark IP and submit all of the deliverables associated with this lab.
Access the lab via the Companion Website. Directions for online access are within your textbook.
Submit Lab 4 to the Assignment folder no later than Sunday 11:59 PM EST/EDT.
 
 
 
COM548 Advanced Networking Protocols
Module 6 Lab 5
Complete the lab Wireshark 802.11 and submit all of the deliverables associated with this lab.
Access the lab via the Companion Website. Directions for online access are within your textbook.
Submit Lab 5 to the Assignment folder no later than Sunday 11:59 PM EST/EDT.
 
COM548 Advanced Networking Protocols
Module 8 Lab 6
Complete the lab Wireshark SSL and submit all of the deliverables associated with this lab.
Access the lab via the Companion Website. Directions for online access are within your textbook.
Submit Lab 6 to the Assignment folder no later than Sunday 11:59 PM EST/EDT.
 
 
COM548 Advanced Networking Protocols
EXAM 1
Question 1 Host and end-system have the same meaning.
Question 1 options:
True
False
Question 2 Which of the following is not a common task found in TCP/IP?
Question 2 options:
Encryption
Connection setup
Segmentation and reassembly
Flow control
Question 3 Which internet service is not popular in an urban area?
Question 3 options:
Fiber-to-the-home
Cable Modem
Satellite
Dial-up
Question 4 Which of the following layer does not belong to TCP/IP?
Question 4 options:
Transport
Application
Network
Presentation
Question 5 A circuit-switched network cannot guarantee a certain amount of end-to-end bandwidth.
Question 5 options:
True
False
Question 6 Network Core includes the following:
Question 6 options:
servers.
all of the above.
routers.
switches.
Question 7 A __________ specifies how networked data is formatted into discrete units, such as packets or frames.
Question 7 options:
topology
communications medium
router
protocol
Question 8 Which type of delay takes the error-checking into account?
Question 8 options:
Queueing delay
Processing delay
Transmission delay
Propagation delay
Question 9 Can store-and-forward be used in a circuit-switched network?
Question 9 options:
Yes
No
Question 10 If an application is sending out 500 kb of data per second and the host transmission rate is 500kbps, would the host be able to handle all the data from the application?
Question 10 options:
Yes
No
 
 
COM548 Advanced Networking Protocols
EXAM 2
Question 1 Suppose Host A is sending Host B a large file over a TCP connection. The number of unacknowledged bytes that Host A sends cannot exceed the size of the receiver buffer.
Question 1 options:
                True
                False
Question 2 Suppose Host A is sending Host B a large file to Host B over a TCP connection. If the sequence number for a segment of this connection is m, then the sequence number for the subsequent segment will necessarily be m+1.
Question 2 options:
                True
                False
Question 3 Consider congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to one half of its previous value.
Question 3 options:
                True
                False
Question 4 Host A is sending Host B a large file over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknowledgements to Host A because Host B cannot piggyback the acknowledgements on data.
Question 4 options:
                True
                False
Question 5 Voice and video traffic is often sent over TCP.
Question 5 options:
                True
                False
Question 6 CMP is primarily used for:
Question 6 options:
addressing.
error and diagnostic functions.
none of the above.
forwarding.
Question 7 The function(s) of network layer in a virtual-circuit network is/are:
Question 7 options:
all of the above.
routing.
forwarding.
call setup.
Question 8 Routers in both datagram networks and virtual-circuit networks both use forwarding tables.
Question 8 options:
                True
                False
Question 9 The network layer concerns with __________.
Question 9 options:
none of the above.
frames
bits
packets
Question 10 It has been said that when IPv6 tunnels through IPv4 routers, IPv6 treats the IPv4 tunnels as link-layer protocols.
Question 10 options:
                True
                False
Question 11 A circuit-switched network cannot guarantee a certain amount of end-to-end bandwidth.
Question 11 options:
                True
                False
Question 12 Which of the following protocol is used for Electronic Mail?
Question 12 options
TELNET
HTTP
SMTP
NNTP
Question 13 Network architecture refers to the organization of the communication process into layers.
Question 13 options:
                True
                False
Question 14 Host and end-system have the same meaning.
Question 14 options:
                True
                False
Question 15 Which of the following is not a transmission rate of Ethernet LAN?
Question 15 options:
10 Mbps
100 Gbps
1 Gbps
100 Mbps
Question 16 Can store-and-forward be used in a circuit-switched network?
Question 16 options:
No
Yes
Question 17 Which of the following is true?
Question 17 options:
SMTP and HTTP do not use handshake
SMTP uses handshake, HTTP does not
SMTP and HTTP use handshake
SMTP does not use handshake, HTTP does
Question 18 A __________ specifies how networked data is formatted into discrete units, such as packets or frames.
Question 18 options:
router
topology
protocol
communications medium
Question 19 Which of the following is true about TCP?
Question 19 options:
A guarantee that a certain value for throughput will be maintained
Data transfer is intact
A guarantee that data will be delivered within a specified amount of time
Providing Confidentiality
Question 20 How many parallel connections does FTP maintain simultaneously?
Question 20 options:
2
4
3
5
 
COM548 Advanced Networking Protocols
EXAM 3
Question 1 __________ is a technique where a new task will be started before the old task is finished.
Question 1 options:
Suppressing
Waiting
Pipelining
Queueing
Question 2 When two or more bits in a data unit have been changed during the transmission, the error is called __________.
Question 2 options:
random error
burst error
inverted error
none of the above
Question 3 Which of the following is not a characteristic of token passing in a broadcast channel of rate R bits per second?
Question 3 options:
When only one node has data to send, that node has a throughput of R bps.
When M nodes have data to send, each of these nodes has a throughput of R/M bps.
The protocol is decentralized.
None of the above.
Question 4 The advantage of the polling protocol is in __________ prevention by controlling the media and letting only one station send it frames at a time.
Question 4 options:
collision
error
competition
throttling
Question 5 Suppose that N switches supporting VLAN groups are to be connected via a trunking protocol. How many ports are needed to connect the switches?
Question 5 options:
2N-1
2N-2
2N
2N+1
Question 6 Signal blurred during transmission is caused by __________.
Question 6 options:
multipath
path loss
crosstalk
interference
Question 7 RTS threshold is used when a data frame is greater than a predefined threshold.
Question 7 options:
True
False
Question 8 Can any laptop be used as an Access Point in default configuration?
Question 8 options:
No
Yes
Question 9 Is it possible for the two mobile nodes to use the same care-of-address in mobile IP?
Question 9 options:
True
False
Question 10 IEEE has defined the specifications for a wireless LAN, called ____________, which covers the physical and data link layers.
Question 10 options:
IEEE 802.5
IEEE 802.2
IEEE 802.3
IEEE 802.11
 
 
COM548 Advanced Networking Protocols
EXAM 4
Question 1 Consider WEP for 802.11. Suppose that the data is 10101100 and the keystream is 11110000. What is the resulting ciphertext?
Question 1 options:
 01010010
 01011100
 01011010
 01010100
Question 2 An application gateway works in conjunction with a router filter because:
Question 2 options:
 it will provide more services.
 traffic is forced to go to the application gateway first before the filter.
 the filter forces the users to first connect to the application gateway.
 all of the above.
Question 3 The Authentication Header (AH) protocol provides source authentication and data integrity but does not provide confidentiality.
Question 3 options:
 True
False
Question 4 Suppose an SSL session employs a block cipher with CBC. The server sends to the client the IV in the clear.
Question 4 options:
 True
 False
Question 5 In what way does the public-key encrypted message hash provide a better digital signature than the public-key encrypted message?
Question 5 options:
 More secure (hashing and encrypting)
 Faster
 More convenience
 All of the above
Question 6 A firewall sits between the organization’s network and the public network.
Question 6 options:
 True
 False
Question 7 A Certification Authority verifies that an entity is who it says it is, and creates a certificate that binds the public key of the entity to the identity.
Question 7 options:
 True
 False
Question 8 A message authentication code (MAC) does not require an encryption algorithm.
Question 8 options:
 True
 False
Question 9 The security of RSA relies on the fact that there are no know algorithms for quickly factoring a number.
Question 9 options:
 True
 False
Question 10 To encipher means to decrypt, decode, or convert, ciphertext into the equivalent plaintext.
Question 10 options:
 True
 False