Second Semester Examination Higher National Diploma in Information Technology First Year

Similar documents
IT 2004 Data Communication & Networking

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Networking Fundamentals. An Introduction to Networks. tel: +44 (0) fax: +44 (0) web:

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Review: Networking Fall Final

CCNA 1 Final Exam Answers UPDATE 2012 eg.2

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

networks List various types of networks and their

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Lecture A4 Network / Internet. Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

CS1302 / Computer Networks

Introduction to Computer Science (I1100) Networks. Chapter 6

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

Chapter 16 Networking

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

CISCO SYSTEM ADMINISTRATION (41)

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Lecture 2. Computer Networks Models. Network Models 1-1

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Fundamentals of Networking Introduction to Networking Devices

INTRODUCTION TO ICT.

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

What is a Network? A connection of two or more computers so that they can share resources.

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Chapter 4 NETWORK HARDWARE

Introduction to Networking Devices

Chapter 6: Network Communications and Protocols

CCNA Exploration Network Fundamentals. Chapter 10 Planning and Cabling Networks

OSI Model with Protocols. Layer Name PDU Address Protocols Device

TCP/IP Protocol Suite and IP Addressing

Introduction to Networking

MTA_98-366_Vindicator930

Cisco 1: Networking Fundamentals

Networking interview questions

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Communicating over the Network

Computer Networks Question Bank

ELC 537 Communication Networks

Chapter 2: Configuring Network Protocols

Objective: Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

A+ Certification Guide. Chapter 16 (Part B) Networking

SOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0

The Internet software layers

Chapter 14: Introduction to Networking

Computer Networking Fundamentals

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

Copyleft 2005, Binnur Kurt. Objectives

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Silberschatz and Galvin Chapter 15

CHAPTER 2 - NETWORK DEVICES

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

Lab 2.8.2: Challenge Static Route Configuration

CCNA Semester 1 labs. Part 2 of 2 Labs for chapters 8 11

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

Network Protocols - Revision

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A

Appendix B Networks, Routing, and Firewall Basics

Chapter -4 OSI Reference Model

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

1. Which OSI layers offers reliable, connection-oriented data communication services?

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

1: Review Of Semester Provide an overview of encapsulation.

Chapter 2 Network Models 2.1

Introduction to LAN Protocols

Defining Networks with the OSI Model. Module 2

Network Security and Cryptography. 2 September Marking Scheme

Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge

Chapter 2. Switch Concepts and Configuration. Part I

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Chapter 2 Network Models 2.1

CompTIA Network+ N ucertify Labs. Course Outline. CompTIA Network+ N ucertify Labs. 10 Oct

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

Different network topologies

ก ก Information Technology II

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

Lesson 1: Network Communications

COMPONENTS OF DATA COMMUNICATION

Data Communication. Chapter # 1: Introduction. By: William Stalling

Operating Systems CS 571

COSC 6377 Mid-Term #2 Fall 2000

Number: Passing Score: 750 Time Limit: 120 min File Version: Microsoft

CCNA 1 v5.0 R&S ITN Final Exam 2014

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

CH : 15 LOCAL AREA NETWORK OVERVIEW

Lab 5.6.2: Challenge RIP Configuration

Transcription:

Q1). Second Semester Examination -2011 Higher National Diploma in Information Technology First Year IT2004 - Introduction to Data Communication and Networks No of pages: 17 Marking Scheme a) Define Analog and digital signal. [ 2 Marks] Analog - Signal intensity varies continuously over time. Digital - Signal intensity is constant for some period of time and then changes to another constant value. This transition takes place in a very short time. b) Briefly describe the three characteristics of a sine wave. [ 6 Marks] Peak Amplitude - The maximum value / strength of the signal over time Frequency - Frequency is the rate at which the signal repeats. Expressed in Hertz (Hz), or cycles per second Phase - Describes the position of a wave relative to time zero, (phase angle θ is expressed in degrees or radians) 1

c) What is the relationship between period and frequency? F=1/T [ 2 Marks] d) What is the bit rate for the signal in below? 16 nanoseconds Time Bit rate = 8 16 10 9 [ 4 Marks] = 5 108 bits per second e) Draw a frequency domain representation of the signal shown in below? [ 6 Marks] 7 microseconds 5 Time Number of circles = 14 Period of the wave = 7/14 ms =0.5 ms = 5 10-4 s Frequency of the wave = 1 / 5 10-4 = 2 10 3 =2 khz Amplitude (Volts) 5 Frequency (khz) 1 2 3 4 5 Q2) 2

a) Explain the difference between Client-Server and Peer-to-Peer networks. [4 Marks] Peer-to-Peer Easy to install and configure. No dedicated server required. Users control their own resources. Inexpensive to purchase and operate. No specialist software required. No dedicated administrator to run the network required. Difficult to employ security. Too many passwords for shared resources. Backups difficult to manage. No centralization. Limited users. Client-Server Centralized user accounts, security and access controls simplify network administration. More powerful equipment means more efficient access network resources. Single password login, means access to all resources. Supports greater numbers of users, or networks where resources are heavily used More costly to install and maintain. Single point of failure, server goes down, the network goes down. Complex special-purpose software requires appointment of expert staff, increasing costs. Dedicated hardware and software increases costs. 3

b) For each of the three main physical network topologies (i.e. bus, ring, star), list two advantages and two disadvantages of each of them. [6 Marks] Bus Advantages Low cost Easy to connect a computer or peripheral to bus. Requires less cable length than a star topology. No need to purchase any additional devices such as switch and hub. Disadvantages Entire network shuts down if there is a break in the main cable. Terminators are required at both ends of the backbone cable. Difficult to identify the problem if the entire network shuts down. (Difficult to troubleshooting). Ring Advantages It is less expensive than star topology. Nodes can be easily added or removed. Disadvantages It is more difficult to install and maintain. If a node fails, it affects the entire network. Star Advantages It is easy to install and to maintain. Can easily add and remove nodes to and from the network without affecting the network.(scalability) If need to add another workstation with a star topology we can simply connect that system an unused part of the hub. If any node fails, other nodes are not affected. 4

Disadvantages This type of network depends upon the central Hub. If Hub fails the entire network is failed.(but hub troubleshooting is easier than bus topology) Each computer is directly connected to the Hub through a cable, so it becomes more costly. c) Give a brief description of the steps followed by a host in accessing a CSMA/CD & Token Passing network. [10 Marks] CSMA/CD Only when a computer "senses" that the cable is free and that there is no traffic on the cable can it send data. Once the computer has transmitted data on the cable, no other computer can transmit data until the original data has reached its destination and the cable is free again. If two or more computers happen to send data at exactly the same time, there will be a data collision. When that happens, the two computers involved stop transmitting for a random period of time and then attempt to retransmit. Each computer determines its own waiting period; this reduces the chance that the computers will once again transmit simultaneously. Token Passing A special type of packet, called a token, circulates around a cable ring from computer to computer. When any computer on the ring needs to send data across the network, it must wait for a free token. when a host want to transmit data, it should hold the token, which is an empty packet. The token is circling the network in a very high speed. If any workstation wants to send data, it should wait for the token. 5

When the token has reached the workstation, the workstation can take the token from the network, fill it with data, mark the token as being used and place the token back to the network. Q3) a) List the physical components required to set up a cost effective peer-to-peer LAN. [4 Marks] Personal Computers equipped with Network Interface cards and, a network enabled Operating system (e.g. Win 95/98/2000/XP/7, etc.) Cables and Connectors. (e.g. Straight Through cables, RJ45 connectors) Hub. b) What is the major operational difficulty in the above type of LAN? [2 Marks] no centralized management is possible. security is very low. c) What are the additional elements needed to convert this into a server based LAN? [2 Marks] A Computer to function as a server. Network Operating system software.(e.g windows server 2003/2008) d) Suppose the performance of this LAN degrades. What would be the most probable single physical component that may be responsible for this degradation? Suggest a better choice for the component. [4 Marks] As an Ethernet hub has been used in setting up the peer-to-peer LAN, it might cause the performance to degrade when the network traffic increases. Use of an Ethernet switch instead of the hub will be a better choice. e) State the two types of UTP (unshielded twisted pair) cables with example usage. [4 Marks] Crossover Cables (To connect similar devices) PC to PC, PC to Router, Switch to Switch, Hub to Hub, Router to Router 6

Straight Through Cables (To connect difference devices) PC to Switch, Switch to Router, Hub to PC Q4) f) Briefly explain the functions of router. [4 Marks] 1. Transfers data from one network to another (network segmentation) 2. Can select the best route if there are multiple paths to the destination. 3. Monitoring of utilisation of the access link. 4. Mapping from local private IPs to public IPs. a) What is a layer in the OSI reference model? Explain. [4 marks] The concept of layers is used to describe communication from one computer to another. Most networks are organized as a series of layers or levels to reduce their design complexity. Number of layers, the name of each layer, the content of each layer, and the function of each layer differ from network to network. b) What is a protocol? Give two examples. [4 Marks] Protocol is a set of rules or an agreement that determines the format and transmission of data. That makes communication on a network more efficient. File Transfer Protocol (FTP) Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) Etc c) What are the differences between connection oriented and connectionless protocols? [3 Marks] Connection oriented simpler addressing (using a connection identifier instead of a full address) Reliable less overhead 7

Connectionless More overhead in the protocol (extra messages exchanged, more data sent across the network, more time delay for the user and higher latency). more complex address d) State the function of each layer in OSI model. [9 Marks] Q5) a) What is the difference between routing and switching? [4 Marks] Routing is based upon IP addresses. Switching is based upon hardware MAC address. b) Briefly explain physical addresses, logical address and port addresses in TCP/IP [6 Marks] Physical addresses The physical address, also known as the link address, is the address of a node as defined by its LAN or WAN. It is included in the frame used by the data link layer. It is the lowest-level address. The physical addresses have authority over the network (LAN or WAN). The size and format of these addresses vary depending on 8

the network. For example, Ethernet uses a 6-byte (48-bit) physical address that is imprinted on the network interface card (NIC). 07:01:02:01 :2C:4B A 6-byte (12 hexadecimal digits) physical address Logical Addresses(IP addresses) Logical addresses are necessary for universal communications that are independent of underlying physical networks. Physical addresses are not adequate in an internetwork environment where different networks can have different address formats. A universal addressing system is needed in which each host can be identified uniquely, regardless of the underlying physical network. The logical addresses are designed for this purpose. A logical address in the Internet is currently a 32-bit address that can uniquely define a host connected to the Internet. No two publicly addressed and visible hosts on the Internet can have the same IP address. Port Address The IP address and the physical address are necessary for a quantity of data to travel from a source to the destination host. However, arrival at the destination host is not the final objective of data communications on the Internet. A system that sends nothing but data from one computer to another is not complete. Today, computers are devices that can run multiple processes at the same time. The end objective of Internet communication is a process communicating with another process. For example, computer A can communicate with computer C by using TELNET. At the same time, computer A communicates with computer B by using the File Transfer Protocol (FTP). For these processes to receive data simultaneously, we need a method to label the different processes. In other words, they need addresses. In the TCPIIP architecture, the label assigned to a process is called a port address. 9

c) In the TCP/IP protocol suite, what are "well-known" ports, and why are they necessary? [4 Marks] Well-known ports are port numbers which are being used by the servers for common Internet applications. For example: well-known port for HTTP servers (web) is port 80, for SMTP servers (e-mail) is port 25, etc. Well-known ports range from 0-255. d) Give the commands that should be issued from the command prompt for following actions. [6 Marks] a. To check the IP configuration of a PC b. To check the connectivity between server to c. To remove the obtained IP address d. To obtain a new IP address e. To take the IP address of google.com site f. To take name server of 172.19.10.35 a. To check the IP configuration of a PC - ipconfig b. To check the connectivity between server to PC- ping <<IP address of the other machine>> c. To remove the obtained IP address- ipconfig /release d. To obtain a new IP address - ipconfig /renew e. To take the IP address of google.com site- nslookup google.com f. To take name server of 172.19.10.35- nslookup 172.19.10.35 Q6) a) Briefly explain two parts of the IP address. [4 Marks] Host ID Identifies a workstation, server, router or other TCP/IP host within a network. Host ID must unique to the network ID Network ID 10

Identify a physical network. All hosts on the same network require the same network ID, which should be unique to the internet work b) What is IPv4 and IPv6? [2 Marks] Every machine that is on a TCP/IP network (a local network, or the Internet) has a unique Internet Protocol ( IP ) address.ipv4 and IPV6 are IP address versions. IP Version 4 (IPv4) IPv4 uses 32-bit (four-byte) addresses. IPv4 addresses are usually written in dot-decimal notation, which consists of the four octets of the address expressed in decimal and separated by periods. Eg :192.0.2.235 IP Version 6 (IPv6) IPv6 is the newest version of IP. IPv6 is fairly well defined but is not yet widely deployed. IPv6 uses larger addresses (128 bits instead of 32 bits in IPv4) and so can support many more devices on the network. c) If one assigns the IP address 192.168.1.1 to the LAN interface of the device connecting to the service provider, and 192.168.1.100 to the server, what are the entries for the subnet mask, the default gateway and preferred DNS used in the TCP/IP configuration of the computers on the LAN? [6 Marks] Subnet Mask -255.255.255.0 Default Gateway -192.168.1.1 Preferred DNS -192.168.1.100 11

d) Figure A depicts proposed high-level network connectivity diagram of SLIATE with several ATIs. Allocate suitable subnets to each of the ATI local area networks (LANs) and router links. Use the IP blocks 172.16.16.0/24 (for LANs) and 192.168.1.0/28 (for router links). [8 Marks] 12

The ATI Jaffna LAN has the maximum number of hosts (50) for a LAN. Therefore one subnet should have at least 50 computers. Then the subnet size would be 64 hosts. Subnets for the LANs: ATI Jaffna: 172.16.16.0 SLIATE head office: 172.16.16.64 ATI Kandy: 172.16.16.128 ATI Kurunegala: 172.16.16.192 Subnets for the router links: Between A and B: 192.168.1.0/30 Between B and C: 192.168.1.4/30 Between A and C: 192.168.1.8/30 Between B and D: 192.168.1.12/30 Note: Give marks for other reasonable answers 13

Q7) a) Explain how the Domain Name System (DNS) allows a large number of DNS lookups to be processed. [4 marks] The DNS is managed hierarchically. Rather than gathering all name/ip address pairs in a single place, each domain manages its own pairs. If a name is outside the domain, one of the global DNS managers returns the address of a DNS server that can in turn answer the query (or provide a pointer to yet another DNS server). b) What is a Fully Qualified Domain Name (FQDN)? Give an example. [ 4 Marks] A fully qualified domain name (FQDN) is the complete domain name for a specific computer, or host, on the Internet. The FQDN consists of two parts: the hostname and the domain name. For example, an FQDN for a hypothetical mail server might be mymail.ati.edu.. The hostname is mymail, and the host is located within the domain ati.edu. c) List four Top Level Domains (TLDs). [4 Marks] 1. gov 2. net 3. org 4. mil 5. com 6. edu 7. int 8. biz 14

d) Assuming that you are using mail.atiname.sliate.com for your institute, draw the DNS tree hierarchy for your address by locating your mail server in the hierarchy. [4 marks] Root..com.net.org.edu/.biz/... sliate atiname mail e) Assume that you are a network administrator of the computer laboratory. If student complain that although they can ping an IP address of a computer located outside of their network, they are unable to access web sites, what may be the most possible cause for this behavior? How would one go about rectifying it? [4 marks] DNS entry has not been configured on PCs Obtain the address of the DNS server from the ISP and configure it on all the computers 15

Q8) Network security is mostly achieved through the use of cryptography. a) Briefly explain cryptography. [4 Marks] We use the term to refer to the science and art of transforming messages to make them secure and immune to attacks. Example Plaintext: HELLO Ciphertext: KHOOR b) Define followings. [6 Marks] a. Plaintext and Ciphertext b. Cipher c. Key Plaintext and Ciphertext The original message, before being transformed, is called plaintext. After the message is transformed, it is called ciphertext. An encryption algorithm transforms the plaintext into ciphertext; a decryption algorithm transforms the ciphertext back into plaintext. The sender uses an encryption algorithm, and the receiver uses a decryption algorithm. Cipher We refer to encryption and decryption algorithms as ciphers. The term cipher is also used to refer to different categories of algorithms in cryptography. Key A key is a number (or a set of numbers) that the cipher, as an algorithm, operates on. c) What are the two categories of cryptography algorithms? Briefly explain it. [6 Marks] 16

i. Symmetric key- secret key In symmetric key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption).the key is shared. ii. Asymmetric key public key In asymmetric or public-key cryptography, there are two keys: a private key and a public key. The private key is kept by the receiver. The public key is announced to the public. d) What is meant by firewall? [4 marks] A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions END. 17