Sample Question Paper for 9210-121 Graduate Diploma in Engineering Computer networks Duration: three hours You should have the following for this examination • one answer book • non-programmable calculator • pen, pencil, drawing instruments General instructions • This paper consists of nine questions. • Answer any five questions. • A non-programmable electronic calculator may be used but candidates must show sufficient steps to justify their answers. • Drawings should be clear, in good proportion and in pencil. Do not use red ink. • All questions carry equal marks. The maximum marks for each section within a question are shown. 1 a) b) 2 a) b) c) d) 3 a) b) The Open Systems Interconnection (OSI) model has seven layers. They can be categorised as application centric layers and network centric layers. i) List the seven OSI layers appropriately under the above two categories. Also state whether there are any layers that may not fit exclusively into one category. ii) Which OSI layers are communication-media dependants? Briefly explain giving examples. iii) In what way does TCP/IP relate to the OSI model? Explain using a diagram of the protocol stacks. Consider a communication that takes place between a client and a server in two separate networks. These networks have routers that connect them to public networks, and any remote client or server communication needs to happen through these routers. Show the interactivity between different OSI layers using a diagram. Your illustration should indicate how the different layers of each of the devices involved with the above communication interact. List four advantages of IPv6 over IPv4. Briefly describe the following. i) Link local address. ii) Extension headers. iii) IPv4 embedded IPv6 address. What are private IPv4 addresses? Explain using examples. IP is said to be an unreliable protocol. How does Transmission Control Protocol (TCP) compensate for this unreliability? i) ii) If the transport layer uses User Datagram protocol (UDP), how can reliability in communication be achieved? Compare and contrast the client/server networking model and the peer-to-peer networking model. In your explanation, identify the similarities, differences, advantages and disadvantages of these two networking models. Consider the following networking environment. • An international bank has many branches distributed across the world. It has a Main Office for International Coordination (MOIC). • In each country where they have their presence, a Local Head Office (LHO) is identified to locate a datacenter. • In each country, there may be many Local Branch Offices (LBO) depending on the customer base. • All local network connections from LBOs are terminated at the LHO of each country. • The bank uses centralised applications that can be accessed using a web browser. However, for reliability and availability purposes, each LHO maintains an instance of all centralised applications so that all local branches will be able to gain access using the local connections, and less international traffic is involved. • Each LHO synchronises data with the servers at the MOIC. i) Propose a high level network architecture for this bank. Use a diagram to illustrate your answer, and use necessary labelling and descriptions in the diagram itself. ii) Identify three application protocols necessary for this bank to carry out its business functions effectively and securely. Provide reasons why you think that each protocol you identified is necessary. 2 (4 marks) (4 marks) (4 marks) (8 marks) (4 marks) (2 marks) (2 marks) (2 marks) (4 marks) (3 marks) (3 marks) (6 marks) (8 marks) (6 marks) 4 a) b) c) 5 a) b) c) d) 6 a) b) c) d) 7 a) b) c) d) e) Briefly explain what a socket in TCP is, and how TCP uses sockets in its connections. Explain how a DNS request, by a client is served by a DNS server. Use diagrams to illustrate your answer. A client S has sent TCP segments to a recipient R with parameters as follows. s1 seq=7000, ack=5000, data=2000, win=1000 s2 seq=9000, ack=6000, data=3000, win=1000 s3 seq=12000, ack=6000, data=1000, win=1000 Just before s1 is received by R, it had 1k of data to be sent and 6k of free buffer space to receive data. i) When R received s1, what would have been the parameters sent by R to S? ii) What can be the reasons for S to send s2 and s3 with ack=6000? iii) If the segment s2 was lost, what would have been the parameters sent by R to S? What factors are considered in determining the Round Trip Time (RTT) in TCP? Briefly explain what Smoothed Round Trip Time (SRTT) is and why it is necessary. Using diagrams if necessary, briefly explain the following TCP problems, and the remedies proposed to solve these problems. i) Small packet problem. ii) Silly window problem. UDP is said to be unreliable. However, some applications are better implemented using UDP than TCP. What kinds of applications are better implemented using UDP? Give two examples. i) ii) What steps should be taken to compensate for the unreliability of UDP? Consider the use of Cyclic Redundancy Code (CRC) for error detection. If the data frame is 010011011011 and the generator code is 1011, calculate the polynomial code checksum for detecting errors and produce the final transmitted frame. Show the steps of your calculation. Compare and contrast ‘Collision Detection’ and ‘Collision Avoidance’ concepts used in IEEE LAN standards. IEEE 802 series LAN standards use the Logical Link Control (LLC) layer as a common layer for all of 802.3, 802.4 and 802.5. What advantages does this offer? Assume that you need to design a LAN for a small organisation that has several departments. The staff within these departments must have separate networks. However, all these departments are situated in one rented floor of a building and the owners of the building allow only one wall-mounted network equipment rack in each floor. In this situation, explain how you would use VLANs in your LAN design. Show how you will use VLAN tags in this design. Use diagrams if necessary. Compare and contrast Wi-Fi, Bluetooth and Wimax wireless network architectures. Note that it is not necessary to explain the protocol stack of each of these protocols, and you can consider their features and attributes in your answer. What advantages do wireless networks bring compared to wired networks? List three advantages. List three disadvantages of wireless networks. What is unlicensed or Industrial, Scientific and Medical (ISM) band and what are its purposes? How does ATM achieve higher switching speeds than Frame Relay? Briefly explain. 3 (4 marks) (5 marks) (4 marks) (3 marks) (4 marks) (2 marks) (4 marks) (4 marks) (4 marks) (3 marks) (3 marks) (6 marks) (4 marks) (4 marks) (6 marks) (6 marks) (3 marks) (3 marks) (4 marks) (4 marks) See next page 8 9 With the spread and popularity of the Internet, packet based protocols have become popular for voice communication in place of the traditional circuit switching technology. Similarly, video conferencing applications also have become popular today. Many TCP/IP based voice and video applications have become common among the Internet community. a) What advantages do today’s voice protocols provide compared to traditional circuit switched voice communications? b) List three voice applications that are popular among the Internet community, and briefly describe them. c) Explain the use of the H.323 protocol in VoIP and video conferencing applications. d) Illustrate using examples the need for the Session Initiation Protocol (SIP) for multimedia communication. a) b) c) d) Briefly explain two differences between public key cryptography and private key cryptography. List two applications that use public key cryptography and state why private key cryptography is not suitable for these applications. List one application that uses private key cryptography and state why public key cryptography is not suitable for this application. Public key cryptography can be used to achieve both confidentiality and integrity. i) Show how confidentiality is achieved using public key cryptography. ii) Show how integrity is achieved using public key cryptography. iii) What is an X.509 certificate? 4 (3 marks) (6 marks) (6 marks) (5 marks) (4 marks) (4 marks) (2 marks) (4 marks) (4 marks) (2 marks)
© Copyright 2024