help me in the attached questions
advanced_data_communications_iscg_four.pdf

advanced_data_communications_three.pdf

Unformatted Attachment Preview

Final Examination
Semester 1, 2016
ISCG7401 Advanced Data
Communications
Department of Computing
Date:
Commencement Time:
Time Allowed:
Weighting:
Marks:
Friday 24 June
1 pm
2 hours plus 10 minutes
reading time
50%
100
Instructions:
1.
No writing or highlighting is permitted during reading time.
2.
You may use the other side of the paper for rough work.
3.
CLOSED BOOK.
4.
Calculators and any form of dictionary are NOT PERMITTED.
5.
Use the Blue Answer Sheet for answering questions in Sections A, B and C.
6.
Write answers to all other questions (sections D and E) in the spaces provided below
the questions in the question paper. You may use additional space on the other side
of the paper, but ensure to identify this clearly.
7.
Take care with your handwriting, as illegible writing will not be marked.
8.
Write your student ID number in the space provided on this page.
9.
Hand in this question paper before leaving the exam venue. You need to submit all
pages of the question paper.
Summary of paper:
Section
A
B
C
D
E
A, B, C
D1
D2
Question Type
True / False Questions
Fill-In the Blanks Questions
Multiple Choice Questions
Descriptive Analysis Questions
Case Study Questions
TOTAL MARKS
D3
D4
D5
E1
Marks
10
10
10
46
24
100
E2
Total
Student ID …………………………
ISCG7401-1162
Page 1 of 14
Printed 20/06/2016
SECTION A
TRUE / FALSE
10 MARKS
Instructions:
1. Clearly write T for true or F for false beside the question number on the
ANSWER SHEET.
2. One mark will be given for each correct answer.
3. Half a mark will be deducted for each incorrect answer.
4. No marks will be given or deducted if you do not answer.
A.1
Music and video files shared on Internet sites are common carriers of
Trojans.
A.2
UPS provides more CPU power for computers.
A.3
3G cellular systems use OFDMA and packet switching techniques.
A.4
Information in unencrypted form is called cipher-text.
A.5
SDH is an obsolete technology used for FDDI.
A.6
WEP is a wireless security technique that changes both the IP address and
SSID of an access point.
A.7
It is a good practice to change the MAC address of an access point when
you purchase it.
A.8
1::2C:CC:C4:ABCD is a valid IPv6 address
A.9
Most organisations prefer not to establish service-level agreement (SLA) with
their common carriers and internet service providers.
A.10
W-CDMA and MPLS can both provide QoS for various classes of traffic.
ISCG7401-1162
Page 2 of 14
Printed 20/06/2016
SECTION B
FILL-IN THE BLANKS
10 MARKS
Instructions:
1. On the ANSWER SHEET, write the answer that best completes the given
sentence.
2. One mark will be given for each correct answer.
3. No marks will be deducted for an incorrect answer.
B.1
The capacity (bandwidth) of STM4 link is _____________ .
B.2
A ______________ examines the source and destination network address of
every packet that passes through it and allows into organisation’s network
only those packets that have acceptable source and destination IP address.
B.3
___________ refers to breaking security by asking, for example a hacker
rings unsuspecting users and imitates someone else, such as a network
engineer, asking for a password.
B.4
In 802.1x, the _______________ server sends the session key over the
wired LAN to the access point. Once the access point receives the session
key, it uses the session key to encrypt the broadcast key, which it sends to
the client. The client uses its session key to decrypt the broadcast key.
B.5
The key principle in controlling (or reducing the impact of) disruption,
destruction, and disaster is having _________ hardware/path in the network.
B.6
E4 link capacity is ______________.
B.7
A ______________ is a separate battery-operated power supply unit that
can supply power for some minutes (or hours) in the event of a power loss.
B.8
____________ protocol can be used for line of sight (LOS) and non-line of
sight (NLOS) wireless MAN communications.
B.9
The _________________ is a protocol specifically designed to reserve
resources across a network for an integrated services Internet. This protocol
will help to provide QoS.
B.10
The most important element of a ____________________ plan is back up
and recovery of data in case network fails. This is part of a good network
management plan.
ISCG7401-1162
Page 3 of 14
Printed 20/06/2016
SECTION C
MULTIPLE CHOICE
10 MARKS
Instructions:
1. Choose the best answer from the alternatives given.
2. Only one answer is correct.
3. Write the letter of your choice beside the question number in the ANSWER
SHEET provided.
4. One mark will be given for each correct answer.
5. No marks will be deducted for an incorrect answer.
C.1
In NGN (Next Generation Networks)
a.
All information (voice, video, data) is transferred via packet switching
b.
MPLS and Internet are used
c.
QoS can be provided for various traffic types
d.
all of the above are true
C.2
Preventing unauthorised persons from gaining access to server room is
called:
a. Physical security
b. Logical security
c. Diaster recovery
d. Error prevention
C.3
GSM
a. is the first generation mobile technology
b. uses circuit switching
c. is digital technology
d. both (b) and (c) are correct
C.4
.
IP address of a computer on a network is 128.7.8.131/29
What is the network address for this network?
a. 10000000.00001000.01100000.10000000
b. 10000000.00100111.00001000.10000000
c. 10000000.00000111.00001000.10000100
d. 10000000.00000111.00001000.11110000
C.5
SSID is broadcast in
a.
plain text
b.
encrypted format
c.
ciphered format
d.
both (c) and (d) are correct.
C.6
An IP packet with a destination IP address of 211.68.1.67/27 is sent to a
router with the IP routing table with four entries. Which port is the packet
sent to?
a.
Port 1: 211.68.1.0 /27
b.
Port 2: 211.68.1.16 /27
c.
Port 3: 211.68.1.32 /27
d.
Port 4: 211.68.1.64 /27
ISCG7401-1162
Page 4 of 14
Printed 20/06/2016
C.7
To create a supernet from subnets 100.100.0.0/24, 100.100.1.0/24,
100.100.2.0/24, 100.100.3.0/24, the supernet address is:
a.
100.100.0.0/26
b.
100.100.0.0/22
c.
100.100.3.0/22
d.
100.100.4.0/26
C.8
Choose the best answer. Access points need the following upgrade to
enable 802.1x:
a.
Software upgrade.
b.
Firmware upgrade.
c.
The upgrade cannot occur.
d.
New NIC card required.
C.9
Wireless LAN security can be increased by:
a.
WPA-2.
b.
Directional antennas.
c.
Using WiFi manager.
d.
All of the above.
C.10
Which one of the following statements is not correct?
a.
MPLS is only for computer data traffic (not voice).
b.
Some large organisations use load balancing to balance the load on
their servers in server farms.
c.
In managing a network for network upgrades, it is important to know
the amount of traffic on the network.
d.
A worm (type of computer virus) spreads itself without human
intervention.
ISCG7401-1162
Page 5 of 14
Printed 20/06/2016
SECTION D
DESCRIPTIVE ANALYSIS QUESTIONS
46 MARKS
Answer each question in the space provided. You may use additional space on the other side
of the paper, but ensure to identify this clearly. You may also use the other side of the paper
for any draft work but cross these out before submitting your answers.
D.1
Explain the purpose of DMZ and with the help of diagrams draw two ways
DMZ can be implemented.
(10 marks)
D.2
Explain main advantages of IPv6 protocol as compared to IPV4.
(8 marks)
ISCG7401-1162
Page 6 of 14
Printed 20/06/2016
D.3 a. With the help of a diagram, explain how a STM-16 SDH link can be split
into STM-1 links and specify these link bandwidths
(6 marks)
b. Determine the number of E1 links in a 565Mbps link.
(5 marks)
ISCG7401-1162
Page 7 of 14
Printed 20/06/2016
D.4
Discuss how 4G mobile communications provide more bandwidth than 3G
mobile communications.
(8 Marks)
ISCG7401-1162
Page 8 of 14
Printed 20/06/2016
D.5
In relation to cellular networks explain the following terms:
a.
b.
c.
ISCG7401-1162
Cell Splitting
Cell – then discuss parameters affecting the size and shape of a cell.
Sectorisation
(9 marks)
Page 9 of 14
Printed 20/06/2016
SECTION E
MINI-CASE STUDIE QUESTIONS
24 MARKS
Instructions:
For the following mini-case studies, clearly state any assumptions that you
might make.
E.1
Computer Dynamics has offices in Auckland, Wellington, Christchurch and
Dunedin. These cities are far apart. There are 200 computers at each of
these sites requiring bandwidth of up to 1 Gbps. However, the bandwidth
between the above offices is estimated to be under 2Mbps.
(12 marks)
a. With the help of diagrams, compare three most suitable WAN options for
creating the above WAN. Name the protocols used to send data over
WAN. One of these options should use the Internet and connect these
offices securely.
b. You are to choose a network topology for the above WAN. First mention
four possible topologies, and then choose the best possible topology.
Give reasons for your answer.
c. Discuss why WAN bandwidth is usually planned to be less than LAN
bandwidth.

ISCG7401-1162
Page 10 of 14
Printed 20/06/2016
E.2
The ABC Company has the network address of 180.20.12.0/23. In the
network there are two VLANS in Auckland office each having 100 computers
and three divisional offices connected via three point-to-point WAN links (see
Figure below). Each of these three offices has a 24port Ethernet switch
connected to the router. Using VLSM:
(a) Determine all sub-network addresses and identify spare subnets.
(b) Find all router port IP addresses at office A.
(c) Determine the host IP range for the WAN link from Auckland to the
divisional office B.
(d) For divisional office B: find out the broadcast address for the LAN and then
determine the number of spare IP addresses.
(12 marks)
A
VLAN 1
B
C
Auckland Office
VLAN 2
Branch Offices Routers
ISCG7401-1162
Page 11 of 14
Printed 20/06/2016
ISCG7401-1162
Page 12 of 14
Printed 20/06/2016
ISCG7401-1162
Page 13 of 14
Printed 20/06/2016
Student id ……………………..
ANSWER SHEET
ISCG7401 Advanced Data Communication and Networks
Semester 1, 2016
SECTION A
TRUE / FALSE
Clearly write T for true or F for false.
A.1
A.2
A.3
A.4
_____
_____
_____
_____
A.5
A.6
A.7
A.8
SECTION B
FILL-IN BLANKS
_____
_____
_____
_____
A.9 _____
A.10 _____
B.1
………………………………..
B.6 …………………………………..
B.2
………………………………..
B.7 …………………………………..
B.3
…………………………….. .
B.8 ……………………………………
B.4
………………………………
B.9 ……………………………………
B.5
…………………………….. .
B.10 ……………………………………
SECTION C
MULTIPLE CHOICE
Circle the letter of your choice.
C.1
C.2
C.3
C.4
a
a
a
a
ISCG7401-1162
b
b
b
b
c
c
c
c
d
d
d
d
C.5
C.6
C.7
C.8
a
a
a
a
b
b
b
b
c
c
c
c
Page 14 of 14
d
d
d
d
C.9 a
C.10 a
b
b
c
c
d
d
Printed 20/06/2016
Final Examination
Semester 2, 2015
ISCG7401 Advanced Data
Communications
Department of Computing
Date:
Commencement Time:
Time Allowed:
Weighting:
Marks:
Friday 27 November
9 am
2 hours plus 10 minutes
reading time
50%
100
Instructions:
1.
No writing or highlighting is permitted during reading time.
2.
You may use the other side of the paper for rough work.
3.
CLOSED BOOK.
4.
Calculators and any form of dictionary are NOT PERMITTED.
5.
Use the Blue Answer Sheet for answering questions in Sections A, B and C.
6.
Write answers to all other questions (sections D and E) in the spaces provided below
the questions in the question paper. You may use additional space on the other side
of the paper, but ensure to identify this clearly.
7.
Take care with your handwriting, as illegible writing will not be marked.
8.
Write your student ID number in the space provided on this page.
9.
Hand in this question paper before leaving the exam venue. You need to submit all
pages of the question paper.
Summary of paper:
Section
A
B
C
D
E
A, B, C
D1
D2
Question Type
True / False Questions
Fill-In the Blanks Questions
Multiple Choice Questions
Descriptive Analysis Questions
Case Study Questions
TOTAL MARKS
D3
D4
D5
D6
Marks
10
10
10
50
20
100
D7
E1
E2
Total
Student ID …………………………
ISCG 7401-1154
Page 1 of 17
Last printed 17 November 2015
SECTION A
TRUE / FALSE QUESTIONS
10 MARKS
Instructions:
Clearly write T for True or F for False beside the question number on the BLUE ANSWER
SHEET. One mark will be given for each correct answer. Half a mark will be deducted
for each incorrect answer. No marks will be given or deducted if you do not answer.
A.1
In risk assessment, you normally need to develop a control spreadsheet for your
network.
A.2
In DoS attack, the target is flooded with packets so it cannot respond to legitimate.
users.
A.3
Third generation cell technology uses analog signal communications.
A.4
LTE is a fourth generation mobile technology.
A.5
3G cellular systems use WCDMA and packet switching techniques.
A.6
NAT can increase network security.
A.7
The net.id of a supernet has larger size (more bits) than one of its subnet’s net.id.
A.8
Routers have to do routing decision in the hardware while layer 3 switches make
the routing decision in the application-specific integrated circuit (ASIC).
A.9
IEEE 802.16e can be used for wireless users who are, or are not, in line of sight
with the base station.
A.10
WiMax cannot provide QoS for integrated services.
ISCG 7401-1154
Page 2 of 17
Last printed 17 November 2015
SECTION B
FILL-IN THE BLANKS QUESTIONS
10 MARKS
Instructions:
On the BLUE ANSWER SHEET, write the answer that best completes the given sentence.
One mark will be given for each correct answer. No marks will be deducted for an
incorrect answer.
B.1
____________ can cache some websites.
B.2
In 802.11g, examples of the three non-overlapping channels are ________ ,
__________ and __________.
B.3
_____________ wireless access is a wireless access application in which the
location of the end-user termination does not change (enter the ITU definition term
for such wireless applications).
B.4
STM-4 can be split into __________ STM-1 links (Hint: enter a number).
B.5
The bandwidth of a STM-1 link is _______________.
B.6
Most organisations develop a _____________ before making network purchases.
These specify what equipment, software and services are required and ask
vendors to provide their best prices.
B.7
Using PDH multiplexing, a 34 Mbps (E4) can be split into ________________
2Mbps (E1) links (enter a number).
B.8
________________ is done by hackers when changing the source address of
incoming packets from their real IP address to an organisation’s internal IP
address.
B9
If a network has availability of 99.96%, this network on average is unavailable for
_____________ Hours every 20,000 Hours.
B.10
_____________________ is used to request an acceptable MTBF and MTTR for a
link/equipment from the common carrier and ISPs.
ISCG 7401-1154
Page 3 of 17
Last printed 17 November 2015
SECTION C:
MULTIPLE CHOICE
10 MARKS
Instructions:
Choose the best alternative that completes the sentence given or answers the question.
Only one answer is correct. Write the letter of your choice beside the question number on
the BLUE ANSWER SHEET provided. One mark will be given for each correct answer.
No marks will be deducted for an incorrect answer.
C.1
C2
C.3
C.4
Supernetting is the ability to :
a.
Purchase more IP addresses so you have a bigger network.
b.
Combine DNS addresses according to location.
c.
Combine multiple smaller IP networks into one larger network.
d.
Combine DNS addresses with MAC addresses.
Which of the following items will cost the most to replace in the majority of
organisations and therefore need to be protected?
a.
Web-server’s
b.
Organisation’s data
c.
Raid 5 capable File Servers
d.
Routers and Gigabit network switches.
MPLS is commonly used to?
a.
Make layer 3 protocols work better with layer 2 protocols
b.
Use label switched paths to aid data flow
c.
Manage high bandwidth copper cables
d.
Both a. and b. are correct.
DoS attacks can be reduced by:
a. having traffic analysis for the network
b. using traffic filtering
c. configuring the main router to limit the number of incoming packets
d. all of the above
C.5
Connection of LANs using Internet uses:
a.
VPN technology
b.
ISDN technology
c.
ATM technology
d.
PSTN technology
ISCG 7401-1154
Page 4 of 17
Last printed 17 November 2015
C.6
C.7
C.8
C.9
Choose the best statement
a.
WiMax complements WiFi 802.11 by covering a bigger area.
b.
WiMax is designed from the start to carry large amounts of data such as web
sites (Internet), audio and video files and Internet-based phone calls.
c.
WiMax has a maximum bandwidth of 54Mbps.
d.
Both (a) and (b) are correct.
Which one of the following statements is not correct?
a.
A worm (type of computer virus) spreads itself without human intervention.
b.
Some large organisations use load balancing to balance the load on their
servers in server farms.
c.
In managing a network for network upgrades, it is important to know the
amount of traffic on the network.
d.
Most organisations prefer not to establish a SLA (service-level agreement)
with common carriers
In cellular networks (choose the best answer):
a.
CDMA (2G) uses packet switching
b.
W-CDMA (3G) uses packet switching
c.
AMPS (1G) and GSM (2G) use circuit switching
d.
Both (b) and (c) are correct.
Hackers (security intruders) can be
a.
Casual hackers
b.
Security experts
c.
Professional hackers
d.
All of the above.
C.10 Elements of disaster recovery plan includes:
a. Back-up process for organization’s data
b. List of priorities of “fix-firsts”
c. Names of decision making managers in charge of disaster recovery
d. All of the above.
.
ISCG 7401-1154
Page 5 of 17
Last printed 17 November 2015
SECTION D
DESCRIPTIVE ANALYSIS QUESTIONS
50 MARKS
Answer each question in the space provided. You may use additional space on the other
side of the paper, but ensure to identify this clearly. You may also use the other side of the
paper for any draft work but cross these out before submitting your answers.
D.1
In a context of a wireless network security explain the following terms:
a.
War driving
b.
Social engineering
c.
MAC filtering
d.
RADIUS
e.
Directional antennas.
ISCG 7401-1154
(2 Marks each)
Page 6 of 17
Last printed 17 November 2015
D.2
a. List four advantages of IPv6 protocol as compared to IPv4.
(6 Marks)
b. With the help of a diagram, briefly explain the main function of 6to4 protocol.
(3 Marks)
ISCG 7401-1154
Page 7 of 17
Last printed 17 November 2015
D.3
Discuss the characteristics of the Next Generation Networks (NGN).
(4 Marks)
D.4 The complexity of interoperating IP with ATM is for two major differences between
them; discuss these two differences.
(6 Marks)
ISCG 7401-1154
Page 8 of 17
Last printed 17 November 2015
D.5
a.
Explain how HSPA, Evolved High Speed Packet Access, provide higher
bandwidth in 3G systems.
(3 Marks)
b.
Explain why power control is required in cellular systems.
c.
With the help of a diagram discuss how QoS can be provided in
W-CDMA networks.
(4 Marks)
ISCG 7401-1154
Page 9 of 17
(3 Marks)
Last printed 17 November 2015
ISCG 7401-1154
Page 10 of 17
Last printed 17 November 2015
D.6
Describe Grid (parallel) computing and its advantages.
(5 Marks)
D.7
Explain RSVP protocol and its purpose.
(6 marks)
ISCG 7401-1154
Page 11 of 17
Last printed 17 November 2015
SECTION E:
E.1
Mini-case studies Questions
20 MARKS
A company is upgrading its FDDI backbone to a more modern backbone.
The company has 6 switches and two router on the FDDI backbone.
(a) Draw the network diagrams for the original FDDI, ATM as …
Purchase answer to see full
attachment