CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE

advertisement
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
SMUAPR15
ASSESSMENT_CODE MCA3050_SMUAPR15
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
18330
QUESTION_TEXT
What are the difference between Analog and Digital Network?
SCHEME OF
EVALUATION
Differences between Analog and Digital Networks:
[Any FIVE. TWO Marks Each. 2 Marks x 5 = 10 Marks]
1.Feature: Signal.
Analog Characteristics: Continuously variable in both amplitude and
frequency.
Digital Characteristics: Discrete signal represented as either changes
in voltage or changes in light levels.
2.Feature: Traffic Measurement.
Analog Characteristics: Hz (for example, a telephone channel is
4KHz).
Digital Characteristics: Bits per second (for example, a T-1 line
carries 1.544 Mbps and an E-1 line transports 2.048 Mbps).
3.Feature: Bandwidth
Analog Characteristics: Low bandwidth (4KHz), which means low
data transmission rates because of limited channel bandwidth.
Digital Characteristics: High-bandwidth that can support high-speed
data and emerging applications that involve video and multimedia.
4.Feature: Network Capacity.
Analog Characteristics: Low; one conversation per telephone
channel.
Digital Characteristics: High; multiplexers enable multiple
conversations to share a communication channel and hence to
achieve greater transaction efficiencies.
5.Feature: Network Manageability.
Analog Characteristics: Poor; a lot of labor is needed for network
maintenance and control because dumb analog devices do not
provide management information streams that allow the device to be
remotely managed.
Digital Characteristics: Good; smart devices produce alerts, alarms,
traffic statistics and performance measurements and technicians at a
Network Control Center (NCC) or Network Operations Center
(NOC) can remotely monitor and manage the various network
elements.
6.Feature: Power requirements
Analog Characteristics: High because the signal contains a wide
range of frequencies and amplitudes.
Digital Characteristics: Low because only two discrete signals – the
one and the zero – needs to be transmitted.
7.Feature: Security
Analog Characteristics: Poor; when you tap into an analog circuit;
you hear the voice stream in its native form, and it is difficult to
detect an intrusion.
Digital Characteristics: Good; encryption can be used.
8.Feature: Error rates.
Analog Characteristics: High; 10 -5 bits (that is 1 in 100,000 bits) is
guaranteed to have an error.
Digital Characteristics: Low; with twisted-pair, 10 -7 bits (that is 1 in
10 million bits per second) will have an error, with satellite 10 -9 (that
is 1 in 1 billion bits per second) will have an error, 10 -11 (that is 1 in
10 trillion bits per second) will have an error.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73695
QUESTION_TEXT
Explain the various fields present in LAP – D frame format.
SCHEME OF
EVALUATION
1. Flag: The flag field is a one-octet field that delimits.
2. Address: The address field is a two-octet field.
3. Control: The address field is a one or two octet field that
identifies the frame type.
4. Information: The information field is a variable size field with
a max of 260 octet comprising upper layer of information.
5. Frame Check Sequence: The FCS field is a two octet field.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73696
QUESTION_TEXT
Name the fields present in OSPF header
1.
2.
3.
SCHEME OF EVALUATION
4.
5.
6.
Version Number.
Packet Length
Router id
Checksum
Authentication Type
Authentication Data
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73697
QUESTION_TEXT Briefly explain the different Queue Management Algorithms
SCHEME OF
EVALUATION
1. Different Queue Management Algorithms:
FIFO Algorithm: The heart of this algorithm lies in that if overload
occurs, packets are placed onto a single common queue and
retrieved from it according to other order in which they arrived- that
is first in first out. In all packet switching devices, the FIFO algorithm
is used by default. (2 marks)
2. Priority Queuing: These types of algorithms are popular in many
areas of computing – for example multitasking operating systems,
where certain applications must priority over others. These
algorithms are also used for priority queuing, when some classes of
traffic must have priority over others. The priority-queuing is based
on dividing all network traffic into a small number of classes and
assigning some numeric characteristics, known as priority to each
class. (2 marks)
3. Weighted Queuing: This algorithm is developed to provide
certain minimum bandwidth to all classes of traffic, or at least to
guarantee observations of some requirements to delays. Class
weight is the percentage of the total bandwidth of the resource that
is guaranteed to this class of traffic. Like priority queuing, weighted
queuing requires the division of the traffic into several classes. For
each class, a separate queue is created. However in weighted
queuing each queue is assigned the percentage of the resource
bandwidth guaranteed to this class under conditions of resource
overload rather than a specific priority. For input flow, role of
resource is played by the processor, and for the output flow, this
role is played by the output interface. (3 marks)
4. Hybrid Algorithm of Queuing: Both of the two algorithms
(priority and weighted) has some advantages and drawbacks. A
hybrid algorithm is trying to find a compromise between those two
algorithms. The most popular type of such an algorithm uses one
priority queue and serves all other queues according to the
weighted algorithm. Usually priority queues are used for real-time
traffic and other queues are used for elastic traffic of several classes.
Each class of elastic traffic get some guaranteed minimum of the
bandwidth during congestion periods. This minimum is calculated as
percentage of the bandwidth remaining after serving the priority
traffic. However, it is necessary to limit the priority traffic somehow
to prevent it from consuming the entire bandwidth of the resource.
(3 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
125314
QUESTION_TEXT
What are the Different layers in internet model? Explain each one.
There are four layers in internet model. (2 Marks)
SCHEME OF
EVALUATION
1.
Host-to-network/link layer
2.
Internet layer
3.
Transport layer
4.
Application model
Explanation on each layer (Each carry 2 Marks)
Host-to-network/link layer: It is a interface between hosts and
transmission links. It supports all standard and proprietary protocols
Internet layer: The main responsibility of this layer is to permit
hosts to inject packets into any network and have travel
autonomously to the destination.
Transport layer: It is designed to allow peer entities on the source
and destination hosts to carry on a conversation.
Application layer: This contains all higher level protocols such as
DNS, HTTP, FTP, SMTP etc.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
125317
QUESTION_TEXT Define Proxy Server. Explain different types of Proxy.
1.
2.
SCHEME OF
EVALUATION
3.
4.
In computer networks, a proxy server is a server (a computer
system or an application) that acts as an intermediary for requests
from clients seeking resources from other servers. A client
connects to the proxy server, requesting some service, such as
file, connection, web page, or other resource available from a
different server. The proxy server evaluates the request as a way
to simplify and control their complexity. (2 marks)
Different types of proxy: Forward Proxy: Forward Proxies are
Proxies where the client server names the largest server to
connect to. Forward “roxies are able to retrieve from a wide
range of resources. (2 marks)
Open Proxy: An Open Proxy is a forwarding proxy server that
is accessible by any Internet user. (1 mark)
Reverse Proxy: A Reverse Proxy (or surrogate) is a proxy
server that appear to clients to be an ordinary server. Requests
are forwarded to one or more origin servers which handle the
request. The response is returned as if it came directly from the
proxy server. Reverse Proxies are installed in the neighborhood
of one or more web servers. All traffic coming from the Internet
and with a destination of one of the neighborhood’s web server
goes through the proxy server. The use of “reverse” originates its
counterpart “forward proxy” since the reverse proxy sits closer to
the web server and servers only a restricted set of websites.
Figure below shows different types of proxies: (5 marks)
(Diagram not required)
Download