General comments on candidates' performance

Similar documents
General comments on candidates' performance

General comments on candidates' performance

General comments on candidates' performance

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS APRIL 2015 EXAMINERS REPORT

General comments on candidates' performance

TCP /IP Fundamentals Mr. Cantu

Wide area networks: packet switching and congestion

Network Devices,Frame Relay and X.25

Basics (cont.) Characteristics of data communication technologies OSI-Model

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

A typical WAN structure includes the following components.

WAN technology which are to be discussed:

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Higher National Unit specification: general information

Lecture Outline. Bag of Tricks

fair-queue aggregate-limit

Computer Science 461 Midterm Exam March 14, :00-10:50am

Level 3 Voice and data communications ( )

UNIT IV TRANSPORT LAYER

Cisco Cisco Certified Network Associate (CCNA)

Introduction to Wireless Networking ECE 401WN Spring 2008

Question 7: What are Asynchronous links?

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Setting Up Quality of Service

Frame Relay. Frame Relay Information 1 of 18

Chapter 24 Congestion Control and Quality of Service 24.1

ELC 537 Communication Networks

Quality of Service (QoS)

Data Communications. From Basics to Broadband. Third Edition. William J. Beyda


06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior

Comparing the bandwidth and priority Commands of a QoS Service Policy

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert

H3C S9500 QoS Technology White Paper

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps

Introduction to Quality of Service

Multicast and Quality of Service. Internet Technologies and Applications

WAN Technologies CCNA 4

Internet Architecture and Protocol

BCS Higher Education Qualifications. Diploma in IT. Computer Networks Syllabus

Real-Time Protocol (RTP)

BCS Level 4 Certificate in Network Principles Syllabus QAN 603/0548/4

Congestion Management Overview

Configuring Weighted Fair Queueing

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers

Data & Computer Communication

Quality of Service II

William Stallings Data and Computer Communications 7 th Edition. Chapter 10 Circuit Switching and Packet Switching

Internetwork Basic. Possible causes of LAN traffic congestion are

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Queuing Mechanisms. Overview. Objectives

Quality of Service Commands policy-map. This command has no default behavior or values.

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Ch. 4 - WAN, Wide Area Networks

Tutorial 9 : TCP and congestion control part I

1: Review Of Semester Provide an overview of encapsulation.

Cisco Optimizing Converged Cisco Networks. Practice Test. Version

SIMULATION FRAMEWORK MODELING

"Charting the Course... Implementing Cisco Quality of Service (QOS) Course Summary

Sharing Bandwidth Fairly During Congestion

Introducing Frame Relay

Lecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee

Lecture (04 & 05) Packet switching & Frame Relay techniques

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

UNIT 2 TRANSPORT LAYER

Voice over Internet Protocol

Computer Networks (Introduction to TCP/IP Protocols)

Level 6 Advanced Diploma in Routing & Switching (112) 151 Credits

T H E TOLLY. No March StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) Transactions per second

Imi :... Data:... Nazwisko:... Stron:...

ET4254 Communications and Networking 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

CS164 Final Exam Winter 2013

ip rsvp reservation-host

Chapter 2 Communicating Over the Network

Introduction to Networks Network Types. BTEC Nat IT Computer Networks

Configuring Class-Based RTP and TCP Header Compression

Chapter 11: Wide-Area Networks and the Internet

CS610- Computer Network Solved Subjective From Midterm Papers

CHAPTER-2 IP CONCEPTS

PPP. Point-to-Point Protocol

Frame Relay IP RTP Priority

Overview of Networks

A MPLS Simulation for Use in Design Networking for Multi Site Businesses

NT1210 Introduction to Networking. Unit 10

Bridging and Switching Basics

Networks Fall This exam consists of 10 problems on the following 13 pages.

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Lecture 13. Quality of Service II CM0256

Circuit Switching and Packet Switching

Chapter 6 Addressing the Network- IPv4

Transporting Voice by Using IP

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

Transcription:

BCS THE CHARTERED INSTITUTE FOR IT BCS Higher Education Qualifications BCS Level 5 Diploma in IT April 2018 Sitting EXAMINERS' REPORT Computer Networks General comments on candidates' performance For the April 2018 exam the wording was made more straightforward for candidates whose first language was not English, and the main focus was to evaluate the candidate s understanding and knowledge of basic computer networks concepts. Examiners have no firm evidence to ascertain this had a positive effect on April s results, but Examiners can see an improvement on the overall marks. Question 2 was the most popular question and in this occasion 65% of the candidates obtained a favourable mark. The least popular question were questions 1 and 3 with a pass rate of 51% and 36% respectively. While they have no firm evidence, the examiners have the impression that some of those teaching courses to prepare candidates for this examination: are taking actions to prepare properly for the topics indicated in the syllabus; are now drawing candidates attention to the existence of the examiners report and encourage them to read them; are reading and taking notice of the examiners reports; are preparing candidates to answer questions relating to specific scenarios. However, it is also the examiners view that candidates should continue practicing improving their examination skills. Several candidates still have language issues, their handwriting is difficult to read, and they are extremely disorganised when writing down the answers. Candidates should read the questions carefully and focus only on what is been asked and not provide information that is not related to the question. As it can be seen in the report below, most of the questions could have been answered with short statements rather than extensive paragraphs. It is also recommended to the candidates to read the recommended reading list as most of the questions are based on it. Almost 18 per cent of the candidates who registered for the module failed to present themselves for the examination. The centre with the largest number of candidates also had the highest proportion (26%) of registered candidates failing to appear.

Question A1 A1. This question is about the TCP/IP protocol architecture. a) Define the concept of protocol architecture, such as TCP/IP/ highlighting the following elements: i. What a protocol architecture is? ii. How protocol architectures should work? iii. Name two examples of protocol architecture s in networking. (4 marks) (2 marks) b) Given the following protocols, indicate in which layer of the TCP/IP protocol architecture each can be found? (5 marks) i. Ethernet ii. SMTP iii. Optical fibre iv. UDP v. IPv6 c) Name the Protocol Data Unit for each of the layers of the TCP/IP protocol architecture. (4 marks) d) Briefly describe the concept and purpose of the encapsulation/de-capsulation process used in the TCP/IP protocol architecture. (4 marks) A protocol architecture is the layered structure of hardware and software that supports the exchange of data between systems and supports distributed applications. At each layer of a protocol architecture, one or more common protocols are implemented in communicating systems. Each protocol provides a set of rules for the exchange of data between systems. Two examples of protocol architecture s in networking are TCP/IP and OSI model. The following network protocols can be found in the indicated TCP/IP layer: Ethernet Network access; SMTP Application; Optical fibre Network access; UDP Transport; IPv6 Internet. The protocol data unit (PDU) for each of the TCP/IP layers are Application data; transport segment; internet packet; network access bits.

In the source device, each layer of the TCP/IP protocol architecture adds control information to the data, so it can be processed properly. This is called encapsulation. When the data arrives to the destination each layer will remove the corresponding control information and process accordingly. This is called de-capsulation. This was one of the least popular questions of section A with an attempted ratio of 59% and with almost 51% of the candidates obtaining a passing mark. The highest mark for this question was 24 whilst the lowest one was 0. In the examiner s opinion, candidates failed to read the question properly. Most of them provided an answer related to the OSI model when in fact they were asked about TCP/IP. Most of the candidates would have performed better in this question if they have made that distinction. Candidates seem to understand the concepts evaluated in this question but some of them were missing important elements that are indicative of a full understanding, most of them provided hints of what each element was but they were not able to provide a complete answer. Protocol architectures such as TCP/IP and the OSI model are extremely important for computer networks therefore candidates should have a full understanding of each of them. Question A2 A2. This question is about the Transmission Control Protocol (TCP). a) Briefly describe the purpose of TCP as well as the layer of the TCP/IP protocol architecture where it is found. (3 marks) b) TCP implements a mechanism called the three-way handshake. Indicate the purpose of such mechanism and, using a diagram, give an example on how it works emphasising the values of the TCP flags used as well as the sequence number. (8 marks) c) Briefly explain how TCP uses the window size and acknowledgments to provide flow control. (8 marks) d) Describe three applications and application protocol that require the use of TCP. TCP is designed to provide reliable communication between pairs of processes across a network. TCP can be found in the transport layer of the TCP/IP protocol architecture.

TCP uses the three-way handshake mechanism to establish a TCP connection. The following image shows an example of it. SYN=1, ACK=0, SEQ=200 SYN=1, ACK=1, ACK NO=201, SEQ=300 SYN=0, ACK=1, ACK NO=301, SEQ=201 The window size determines the number of bytes that can be sent before expecting an acknowledgement. A destination can decrease the windows size to inform the source to reduce the number of bytes it should send. The acknowledgement number is the number of the next expected byte. As the bytes are received and processed, the destination will send acknowledgements to inform the source that it can continue to send additional bytes. Web traffic, e-mail (SMTP), remote connection, file transfer. Each of them requires a reliable communication that acknowledges data, resends lost data and delivers data in sequenced order. This question was the most popular of section A with an attempted ratio of 86% and 65% of the candidates obtaining a passing mark. The highest mark for this question was 23 whilst the lowest one was 0. In the examiner s opinion, candidates confused the concept of TCP with the concept of TCP/IP as they seem to refer to them as the same. The majority didn t know in which layer of the TCP/IP protocol architecture TCP resides. Many candidates didn t know the purpose of the three-way handshake and almost all of them didn t know how flags are used within this process. In part d, many candidates only provided the name of the protocol/application but failed to explain why they needed the services of a protocol such as TCP. Many candidates knew the concept of acknowledgement but failed to relate it to the concept of windowing. As in the question A1, most candidates provided hints of what they understood of TCP but failed to provide enough details that would make them get full marks.

Question A3 A3. This question is about digital data communication techniques. a) The transmission of a stream of bits can be done in two ways: synchronously or asynchronously. Indicate how each work and which one is more suitable for the transmission of large blocks of bits. (8marks) b) Explain the concept of error detection and describe one of the error-detection techniques used in digital data communications. c) Indicate the purpose of the Hamming distance and provide an example on how it is used. (5 marks) d) Describe the difference between full-duplex and half-duplex communications In synchronous transmission, the receiver must know the rate at which bits are being received so that it can sample the line at appropriate intervals to determine the value of each received bit. In asynchronous transmission, each character of data is treated independently. Each character begins with a start bit that alerts the receiver that a character is arriving. For large blocks, synchronous transmission is used. Error detection is performed by calculating an error-detecting code that is a function of the bits being transmitted. The code is appended to the transmitted bits. The receiver calculates the code based on the incoming bits and compares it to the incoming code to check for errors. An example would be parity check or CRC, parity checks adds one bit at the end of the transmitted stream while CRC appends a group of bits that is calculated before transmission. Hamming distance is used for error correction. The Hamming distance d(v1, v2) between two n-bit binary sequences, v1 and v2 is the number of bits in which v1 and v2 disagree. For example, if v1 = 011011 and v2 = 110001 then d(v1, v2) = 3. Half-duplex transmission, only one of two stations on a point-to-point link may transmit at a time. Full-duplex transmission, two stations can simultaneously send and receive data from each other. This question was the second most popular of section A with an attempted ratio of almost 67% and almost 63% of the candidates obtaining a passing mark. The highest mark for this question was 22 whilst the lowest one was 0. In the examiner s opinion, error detection/correction techniques questions have been, in previous sittings, one of the most difficult questions the candidates have had to face and usually are the ones with the lower passing rate. However, for this sitting, candidates seem to have done better. The complexity of the question was reduced, and this allowed

the candidates to demonstrate their knowledge. The examiner s do not have concrete proof that this was the only factor, but this approach will continue for future related questions. Most of the candidates knew certain elements related to error correction but some important details were missing in their answers hence the reason of not obtaining full marks. Question B4 B4. This question is about Wide Area Networks (WANs). a) Indicate in which layers of the OSI model do WANs operate and describe two WAN services offered in each of those layers (2 services per layer). b) The following terms relate to WAN terminology: (1) Demarcation point (2) Data Terminal Equipment (DTE) (3) Customer Premises Equipment (CPE) (4) Data Communications Equipment (DCE) (5) Local loop (6) Central Office (CO) The following are descriptions or definitions of the terms (in a different order) (A) Physical network that connects the CPE to the CO. (B) Primarily provides an interface to connect subscribers to a communication link in the WAN cloud. (C) Local service provider facility or building that connects the CPE to the provider network. (D) A customer device that connects to the local loop through the DCE. (E) Separates customer equipment from service provider equipment. (F) The devices owned or leased by the customer that connects to the carrier. For each term, write down the description or definition that most closely matches it, e.g. (7) (G). (8 marks) c) Explain the main difference between a circuit-switched network and a packetswitched network. Indicate which one would have higher latency and jitter and explain why. d) Given the following WAN access options indicate which type of network they are classified as (circuit-switched or packet-switched). (5 marks) i. ATM ii. ISDN iii. MPLS iv. Frame Relay v. PTSN WANs operate in layers 1 (physical) and 2 (data link) of the OSI model. In layer 2 protocols define how data is encapsulated for transmission toward a remote location, in layer 1 protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider.

The relation between the concepts is: (1) - (E), (2) - (D), (3) - (F), (4) - (B), (5) - (A), (6) - (C) A circuit-switched network is one that established a dedicated circuit between nodes and terminals before the users may communicate. Packet switching splits traffic data into packets that are routed over a shared network. They do not require a circuit to be established. Latency and jitter are greater in packet-switched networks because the links are shared, and packets must be entirely received at one switch before moving to the next. Packet-switched protocols are: ATM, MPLS and frame relay, circuit-switched protocols: PSTN and ISDN. This question was the least popular in section B, attracting just under 60% of candidates. The pass rate was low, at just over 36%. Although a number of good answers were obtained from candidates who answered this question, a large number of candidates made significant errors. A number of candidates failed to understand the format of the answer requested for part b), and instead of pairing the appropriate terms sought to answer the question using a more expansive, essay style approach. Attempts to do this were largely unsuccessful, although credit was given where appropriate. In part d), there seemed to be significant confusion in the minds of candidates regarding which protocols are packet switched and which are circuit switched with a few candidates completely reversing the order. Question B5 B5. This question is about the concept of Quality of Service (QoS). a) Traffic can be characterised by four elements (1) latency, (2) jitter, (3) loss and, (4) bandwidth. Briefly describe each of those elements. (8 marks) b) Given the following traffic characteristics, indicate whether they describe (1) voice, (2) video or (3) data traffic. (9 marks) i. Can be very greedy consuming a large portion of network capacity. ii. Without QoS and a significant amount of extra bandwidth capacity, this traffic typically degrades. iii. Cannot be retransmitted if lost. iv. Must receive a higher UDP priority. v. Requires at least 384 Kbps of bandwidth. vi. Traffic can be predictable and smooth. vii. Does not consume a lot of network resources. viii. Traffic can be smooth or bursty. ix. Traffic can be unpredictable, inconsistent, and bursty.

c) Queuing is congestion management tool used in QoS to buffer and prioritise traffic. Name and describe two queuing algorithms available. (4 marks) d) Name and briefly describe two QoS implementations in a network. (4 marks). The concepts are defined as follows: (1) latency: amount of time a message takes to traverse a system, (2) jitter: variation in latency as measure in the variability over time of the packet latency across a network, (3) packet loss is measured as a percentage of packets lost with respect to packets sent, (4) amount of data that can be transmitted in a fixed amount of time. Matching is as follows: i data or video, ii video, iii voice or video, iv voice or video, v video, vi voice, vii voice, viii data, ix video. (1 mark per correct match). Some queuing algorithms are: First in, first out (FIFO) buffering and forwarding the packets in the order of arrival. Weighted Fair Queuing (WFQ) applies priority to identified traffic and classifies it into conversations or flows. Class-Based weighted fair queuing (CBWFQ) extends WFQ to provide support for user-defined traffic classes. Low Latency Queuing (LLQ) allows delay-sensitive traffic such as voice to be sent before packets in other queues. Possible models are: Best-effort: used when QoS is not required. Integrated services: defines a signalling process for applications to signal o the network that they require special QoS for a period and that bandwidth should be reserved. Differentiated Services: network devices recognise traffic classes and provide different levels of QoS to different traffic classes. This question was the most popular in section B, attracting 68% of candidates who took the exam. The question had a pass mark of just over 50%. The descriptions in part a) were mostly appropriate, although some were too skeletal or vague to attract full marks. The answers to part b), as will be seen from the marking scheme, were allowed a degree of flexibility due to the nature of the material. Many candidates gave good, appropriate responses in part b), although some appeared to be confused on some points. Part c) answers seemed to split into very good and mostly poor, and seemed to reflect a difference in the understanding of different cohorts of candidate. A few

candidates attempted to describe novel algorithms from first principles, but in general these were not successful. Question B6 B6. This question is about IPv4 addressing. a) Consider the following diagram and the IP addresses shown. Identify which devices will receive the packet if the destination IP address and the type of IP address each is (unicast, broadcast or multicast). i. 192.168.100.2 ii. 225.5.77.126 iii. 192.168.100.255 b) A host was given the IP address 198.168.4.121/27. Consider this address and indicate: (8 marks) i. The network address to which the host belongs. ii. The network broadcast address to which the host belongs. iii. The total number of hosts available in the network. iv. Can the following IP address be assigned as the default gateway of the host: 192.168.4.93? Why? c) Describe the concept of public and private IPv4 addresses and give an example for each of them. d) In IPv6, indicate the difference between a link-local address and a unique local address. Give an example of a unique local address. (5 marks) The given IP addresses are classified as follows: i. 192.168.100.2 is a unicast IP address and only B will receive it, ii. 225.5.77.126 is a multicast IP address and computers A and C will receive it, iii. 192.168.100.255 is a broadcast IP address and all devices will receive it (except for the source).

The values are as follows: i) network address: 192.168.4.96, ii) broadcast address: 192.168.4.127, iii) total number of available hosts: 30, iv) can 192.168.4.93 be the default gateway? No, it is outside the network address space. Public IPv4 addresses are globally routed between ISP routers an example could be 151.231.230.180. Private IPv4 addresses are not unique and can be used by an internal network but they will not be routed by an ISP an example could be 10.0.0.1/8. A link-local address is used to communicate with other devices on the same network or broadcast domain. A unique local address is similar to a private address in IPv4 but with the difference that they cannot be routable nor translated to a global IPv4 address. An example of a unique local address is: FC00::1/7. Just under 62% of candidates attempted this question and the pass rate was just under 60%, making it the best answered question in section B. Candidates appeared to fall into two groups in their approaches to this question, and while a number of very good answers were obtained a significant number of candidates made initial errors in their understanding of the problem which impacted on their success. A clear understanding of infrastructure examples such as this is core to the work of network managers worldwide, and candidates are recommended to pay attention to material of this kind. When they are carrying out exercises such as this in live commercial or public environments they will have significant responsibility to both customers and the organisations for which they work.