Download CIS110 Assignment 3 2007-8

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

IEEE 1355 wikipedia , lookup

Internet protocol suite wikipedia , lookup

Network tap wikipedia , lookup

Deep packet inspection wikipedia , lookup

Net bias wikipedia , lookup

Computer network wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Airborne Networking wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
CIS110 Assignment 3 2007-8
Set by Dr. Rodger Kibble, Goldsmiths College, Monday March 17th 2008.To be
submitted electronically by 5pm, Monday April 21st 2008 (instructions to follow).
There are 100 marks available on this assignment. Alll answers should be expressed
in your own words. You should give details of any references you have consulted.
Any material from published sources (including the subject guide) should be clearly
identified as a quotation.
I. Multiple choice questions (15 marks):
NB: marks will be deducted for incorrect choices.
1. In the context of networked computing, a protocol is:
a. A program that transfers data over a network according to standard
conventions.
b. A set of common rules specifying the format of messages and how
they are processed.
c. A report from the World Wide Web Consortium laying down rules for
data communication.
d. A set of rules prohibiting obscene, defamatory or otherwise offensive
content in emails and webpages.
2. The process of breaking up messages into fixed-size segments which can
follow independent paths to the destination is called:
a. Packet scheduling
b. Message switching
c. Packet switching
d. .Store and forward
3. A connectionless protocol is one where:
a. Messages are transmitted to a destination address without first
establishing a connection with the destination.
b. A message is sent to all nodes on a network but only the intended
receiving system will process it.
c. There is no physical connection; messages are sent via a wireless link.
d. There is no persistent connection between source and destination
nodes; a new connection is opened and closed for each transaction.
4. What does a DNS name server do?
a. Provides web services for part of a computer network which is
identified by a particular domain name.
b. Verifies the syntax of a domain name
c. Translates computer names into IP addresses
d. Lists all the computers belonging to a particular named domain.
5. According to the TCP/IP model, which levels do the following functions
belong to out of Application, Transport and Internet:
a. Opening and closing connections
b. Logical addressing scheme which gives a unique address to every
computer connected to the Internet
c. Finding a route from the source to the destination computer
d. Slowing down or speeding up transmissions to avoid overloading the
destination computer or under-utilising the network connection
e. Displaying messages to the end user.
6. What would be the consequences if corrupt or poorly designed routing tables
caused a loop in a section of the Internet?
a. Packets will travel around the loop indefinitely, until the network is
reconfigured.
b. Packets keep a trace of the route so far in an extension of the header,
and will be discarded if they revisit the same router.
c. Routers keep a record of all packets that arrive within a specified
interval and will discard duplicates.
d. Packets will travel around the loop until the Time to Live counter in
the IP header reaches zero, then they will be discarded.
7. What is meant by a client in the context of networked computing?
a. Someone who pays a subscription to an ISP for an Internet connection.
b. An application that initiates a connection with another application on a
remote host.
c. Any program that uses application layer protocols.
d. An application that requests services from another program on the
network.
8. What is meant by a server in the context of networked computing?
a. A computer that provides services to other systems on the network,
such as access to files, databases or web pages.
b. An application program that offers services to other systems on the
network, such as access to files, databases or web pages.
c. A program that waits for other programs to initiate network
connections.
d. A company that provides Internet connections for a monthly fee.
9. What happens if a TCP segment does not arrive at the destination system
within a pre-set time limit?
a. The receiving system will send a request for the segment to be re-sent.
b. The application will time out and have to be re-started.
c. Transport level software at the sending system will automatically send
another copy of the segment.
d. The application program at the sending system will re-create the data
and a new segment will be constructed and transmitted.
10. What is meant by a worm in the context of nextworked computing?
a. A malicious program that can transmit itself through a network.
b. An acronym for Write-Once Random Memory
c. A malicious program that hides itself by overwriting portions of a
legitimate program.
d. A malicious program disguised as something desirable, for instance a
game or utility program.
II. IP Addressing (25 marks)
(a) Explain how the following addresses identify a particular network, host computer
and application, assuming the class-based addressing scheme.
(i)
(ii)
205.188.159.153:110
128.232.0.20:80
(b) Given the following pairs of IP addresses and subnet masks, identify the network,
subnet and host addresses in each case, assuming the classfull addressing scheme.
Justify your answers.
i.
ii.
Mask: 255.255.192.0
IP Address: 145.123.125.10
Mask: 255.255.0.0
IP Address: 13.23.45.7
III. Web authoring (25 marks)
(a) Consider the following examples of a web page and an external style sheet. For
each line of the poem, list the font family, style, weight, size and colour that will be
used when the page is displayed in a standard browser. Justify your answer.
<html>
<head>
<title>Tyger</title>
<link rel = "stylesheet" type = "text/css" href = "tyger.css" />
<style type = "text/css">
div {font-family:arial;color:red;margin:20px 50px;}
div.emph {font-style:italic;}
div.bold {font-weight:bold;font-size:20px;}
div.gothic {font-family:"Copperplate Gothic Bold";margin:50px 100px;}
div.blue {color:blue;}
</style>
</head>
<body>
<div class = "emph">Tyger, tyger burning bright</div>
<div class = "bold" style = "margin:10px 20px 0px;">In the forests of
the night</div>
<div class = "emph bold">What immortal hand or eye</div>
<div class = "gothic blue" style = "font-size:24px;">Dare frame thy
fearful symmetry?</div>
</body>
</html>
Web page
div {font-size:16px;font-family:Courier;}
div.blue {border-style:solid;background-color:midnightblue;}
Style sheet
(b) Explain the relationship between XML, HTML and XHTML. Why does the
World-Wide Web Consortium recommend the use of XHTML standards in place of
HTML?
(c) What is meant by strict, transitional and frameset variants of HTML and XHTML?
How can you indicate which of these you are using in a web document, and how can
you verify that your document conforms to the relevant standard?
IV. Security, legal and social issues (35 marks)
(a) Explain the following terms in the context of computer security. Locate an
example of each in the recommended reading for the course or on appropriate web
sites and give a brief description.
(i)
(ii)
(iii)
denial of service
buffer overflow
Trojan horse
(b) Suppose you are starting up a small mail-order company which uses a website to
collect personal details of your customers, such as name, address, credit card details
etc, which are then stored on a database. Describe in your own words what you
would have to do to make sure you are complying with the UK Data Protection Act
1998. You should support your answers with reference to the eight principles of data
protection (or "good information handling") which are incorporated in the 1998 Act
(c) Do you think it is justifiable for employers to monitor all their employees’ emails
and website accesses from machines on company premises? Consider arguments for
and against the proposition.
Your answers to (b) and (c) should be at most 500-800 words in length.