Download CIS339

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Piggybacking (Internet access) wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

IEEE 1355 wikipedia , lookup

Internet protocol suite wikipedia , lookup

Fiber to the premises by country wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

AppleTalk wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Computer network wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

IEEE 802.11 wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Wake-on-LAN wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
UNIVERSITY OF LONDON
GOLDSMITHS COLLEGE
B. Sc. Examination 2007 (Internal)
COMPUTING
IS53026A (CIS339)
Enterprise Networking
Duration: 2 hours 15 minutes
Date and time:
This paper is in two parts, Part A and Part B. There are a total of three questions in
each part. You should answer the one compulsory question from Part A and two
questions from Part B.
Full marks will be awarded for complete answers to a total of three questions, one
compulsory question from Part A and two from Part B. Each question carries 25 marks.
The marks for each part of a question are indicated at the end of the part in [ ] brackets.
There are 75 marks available on this paper.
No calculators should be used.
CIS339
2007 [Internal]
1
TURN OVER
PART A
Question 1
(a)
State, in your answer book, which two of the following statements are true and
which two are false and, if false, write out a correct version of the statement:
i.
ii.
iii.
iv.
Layer 2 switches will only separate broadcast domains if VLANs are being
operated.
A Full Mesh network design provides a more scalable solution than a
Hierarchical design for a company that is expanding geographically.
A brouter will firstly attempt to bridge a frame at layer 2, but if the layer 3
protocol is routable, it will route the packet at layer 3.
A big bang approach to network implementation is often the cheapest, unless
it goes badly wrong.
[3]
(b)
List the four main measurable criteria that can be used to evaluate whether a
design meets requirements.
[2]
(c)
Identify four major differences between LAN and WAN design.
(d)
A builder who has just completed a block of 50 flats, is finding that the flats
are difficult to sell. He has decided that he needs a unique selling point to
attract buyers and has decided that very high speed internet of at least 50
Mbit/s could be just what is needed. The telephone company has already
installed a 155 Mbit/s fibre to the telephone exchange. This has been installed
primarily for voice communications and to support broadband. It only has
eight 2 Mbit/s circuits currently enabled and of these two are configured to
support voice and the remainder to support broadband. The local cable TV
operator has also installed a fibre operating at 1.2 Gbit/s into the premises
primarily to carry cable TV from the head end to each flat, but has configured
622 Mbit/s downstream and 52 Mbit/s upstream to support broadband.
[4]
You are a consultant who has been asked to carry out a feasibility study to
evaluate a number of alternative solutions.
The design options you should consider are:
i.
ii.
iii.
CIS339
To run a Gigabit Ethernet LAN using optical fibre media around
the block, linked to router within the block that will communicate
via the cable TV company’s 622/45 Mbit/s data channels to the
company’s IP network.
To run an FDDI ring operating at 100 Mbit/s around the block,
linked to router within the block that will communicate via the
telephone company’s 155 Mbit/s data circuits to the company’s IP
network.
To install a 802.11g Wireless LAN operating at 54 Mbit/s
connected to a router within the block that will communicate via
2007 [Internal]
2
TURN OVER
iv.
(e)
the telephone company’s three 2 Mbit/s data circuits to the
company’s IP network.
To install a VDSL multiplexer within the block offering 55 Mbit/s
downstream and 2.5 Mbit/s upstream to a VDSL modem in each
flat. The VDSL multiplexer is then connected via ATM permanent
virtual circuits on the 622/52 Mbit/s data channels to the Cable TV
company’s IP network.
List the advantages and/or disadvantages of all the above designs.
[4]
Identify any security issues with the designs.
[2]
State which of the above design options best suits the requirements.
[1]
A cinema chain has decided to investigate whether it could digitally distribute
its films in a high definition format from its head office to all its cinemas in
100 locations throughout the country. Each cinema will on average receive 5
films per week (to be screened in the following week), and each film will
typically be coded into a 12.096 GByte file (1 GByte = 109 Bytes). The data
communications protocols being used add a 20% overhead to the data. You
can assume that many of the cinemas will offer similar (but not identical)
programmes.
You are a consultant who has been asked to carry out a feasibility study to
evaluate a number of alternative solutions.
Your first task is to calculate what is the equivalent in Mbits/s of 5 films per
week.
[2]
The design options you should consider are:
i.
ii.
iii.
iv.
CIS339
A Gigabit Ethernet based on dark fibre leased from an insurgent
operator in a star topology and using the broadcast address.
An ATM network using switched virtual circuits operating at 155
Mbit/s between the head office and each of the cinemas.
A VSAT network providing a 1.2 Gbit/s broadcast from the head
office to the cinemas.
An SMDS service operating at 34 Mbit/s using with transmissions
from the head office using the broadcast address.
List the advantages and/or disadvantages of all the above designs.
[4]
Identify any security issues with the designs.
[2]
State which of the above design options best suits the requirements.
[1]
2007 [Internal]
3
TURN OVER
PART B
Question 2
(a)
State, in your answer book, which two of the following statements are true and
which two are false and, if false, write out a correct version of the statement:
i.
ii.
iii.
iv.
10 Gbit/s Ethernets do not support the CSMA/CD access method as they are
always operate half duplex mode.
Token Ring networks, unlike Ethernets, are deterministic in the sense that they
can guarantee that a station will always be able to transmit a frame within a set
time.
The Frame Relay protocol is a connectionless protocol that supports error
detection but there is no error correction.
A product is a problem child if it has a low market share and low growth. [3]
(b)
Carry out a brief SWOT analysis of BT in the UK fixed network operator
market. You are expected to write no more than a couple of sentences about
two points under each of the four headings.
[8]
(c)
A type of Ethernet is described as 100Base-T2. What does each part of this
designation describe?
[2]
(d)
What are the main differences between a hubbed and a switched Ethernet?
How else might the two types of Ethernet be described?
[6]
(e)
Complete the blank cells of the table below in your answer book. It is part of
a subnetwork addressing scheme for an IP network with the network address
147.36.116.0/25, supporting up to 4 subnetworks of up to 126 hosts, up to 7
subnetworks of up to 62 hosts and up to 16 point-to-point WAN circuits. The
boundaries between the network part of the address and the subnetwork part of
the address and between the subnetwork part of the address and the host part
of the address are shown as vertical bars (|).
[6]
Subnetwork
3rd Byte
4th Byte
LAN A
LAN B
LAN C
LAN D
LAN E
LAN F
LAN G
LAN H
LAN I
LAN J
LAN K
Cct 1
…
011101|00
011101|00
011101|01
011101|01
0|XXXXXXX
1|XXXXXXX
CIS339
0111011|0
0111011|0
0111011|0
0111011|1
0111011|1
0111011|1
0111011|1
…
2007 [Internal]
10|XXXXXX
11|XXXXXX
00|XXXXXX
01|XXXXXX
10|XXXXXX
Subnetwork
Address
First Host
Address
Last Host
Address
147.36.116.128/25
147.36.117.0/25
147.36.117.128/25
147.36.116.129
147.36.117.1
147.36.117.129
147.36.118.1
147.36.118.65
147.36.118.129
147.36.118.193
147.36.119.1
147.36.119.65
147.36.119.129
147.36.119.193
…
147.36.116.254
147.36.117.126
147.36.117.254
147.36.118.62
147.36.118.126
147.36.118.190
147.36.118.252
147.36.119.62
147.36.119.126
147.36.119.190
147.36.118.194
…
147.36.118.64/26
147.36.118.128/26
147.36.118.192/26
147.36.119.64/26
147.36.119.128/26
…
…
4
TURN OVER
Question 3
(a)
State, in your answer book, which two of the following statements are true and
which two are false and, if false, write out a correct version of the statement:
i.
ii.
iii.
iv.
iMode provides always on Internet access from a mobile phone using TCP/IP.
SONET in N. America and SDH in the rest of the world are compatible at all
speeds greater than or equal to 155 Mbit/s.
Multi Protocol Label Switching provides some connection-oriented features
that allow IP networks to offer quality of service.
The Home Location Register stores the current Base Station System for each
phone within a Mobile Switching Centre’s area.
[3]
(b)
Describe how adaptive playout delay can be used to smooth out variations in
delay when playing real-time audio or video.
[5]
(c)
Describe why the Token Ring protocol is regarded by many as being superior
to the Ethernet protocol.
[3]
(d)
(e)
Explain why it did not succeed in the market place.
[2]
Describe with the aid of diagrams, how an FDDI ring can recover from a
circuit failure.
[5]
Use Dijkstra’s algorithm to calculate and mark the shortest route between A
and E in the diagram below (showing all the labels produced by executing the
algorithm), where the numbers represent distances between the nodes.
[7]
A
10
4
H
2
B
8
9
12
7
G
C
11
1
13
F
D
A
6
5
14
E
CIS339
2007 [Internal]
5
TURN OVER
Question 4
(a)
State, in your answer book, which two of the following statements are true and
which two are false and, if false, write out a correct version of the statement:
i.
ii.
iii.
iv.
Administrative Distance is a measure of the trustworthiness of information
from routing protocols .
Network Address Translation is used to redirect network layer traffic to a
different IP address.
Session Initiation Protocol is an ISO protocol that is used to establish and
control sessions for audio, video and data conferencing.
The Total Cost of Ownership of Personal Computers can easily be more than
10 times the purchase price of a PC over 3 years.
[3]
(b)
What are the main reasons that caused network operators to replace their
Plesiochronous Digital Hierarchy transmission networks with Synchronous
Digital Hierarchy transmission networks.
[6]
(c)
Describe the threats associated with denial of service attacks, worms and
external hackers. Outline the measures that network managers can take to deal
with them.
[6]
(d)
Describe briefly the main purpose of a disaster recovery plan?
[2]
(e)
What is meant by percentage availability, how is it related to MTBF and
MTTR?
[2]
A LAN has two identical routers with availabilities of 99.9% directly attached,
which are each connected via separately routed circuits each with an
availability of 99.8% to another pair of identical routers with an availability of
99.9% on a different LAN. Write down an expression for the overall
unavailability of the communications service that is provided between the two
LANs and hence calculate the overall availability of the communications
service between the two LANs?
[6]
CIS339
2007 [Internal]
6
END OF EXAMINATION