CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE

advertisement
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
OCTOBER15
ASSESSMENT_CODE MCA3050_OCTOBER15
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
18334
QUESTION_TEXT
Discuss various components of a basic DWDM system.
SCHEME OF
EVALUATION
1.DWDM MUX: Contains one WL converting transponder for each
WL signal is will carry.
2.An intermediate line amplifier it compensates the loss in optical
power while the signal travels along the fiber.
3.An intermediate optical terminal or optical Add-up MUX
4.A DWDM terminal DEmux:
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73695
QUESTION_TEXT
Explain the various fields present in LAP – D frame format.
SCHEME OF
EVALUATION
1. Flag: The flag field is a one-octet field that delimits.
2. Address: The address field is a two-octet field.
3. Control: The address field is a one or two octet field that
identifies the frame type.
4. Information: The information field is a variable size field with a
max of 260 octet comprising upper layer of information.
5. Frame Check Sequence: The FCS field is a two octet field.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73696
QUESTION_TEXT
Name the fields present in OSPF header
1.
2.
3.
SCHEME OF EVALUATION
4.
5.
6.
Version Number.
Packet Length
Router id
Checksum
Authentication Type
Authentication Data
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73697
QUESTION_TEXT
Briefly explain the different Queue Management Algorithms
SCHEME OF
EVALUATION
1. Different Queue Management Algorithms:
FIFO Algorithm: The heart of this algorithm lies in that if overload
occurs, packets are placed onto a single common queue and retrieved
from it according to other order in which they arrived- that is first in
first out. In all packet switching devices, the FIFO algorithm is used by
default. (2 marks)
2. Priority Queuing: These types of algorithms are popular in many
areas of computing – for example multitasking operating systems,
where certain applications must priority over others. These algorithms
are also used for priority queuing, when some classes of traffic must
have priority over others. The priority-queuing is based on dividing all
network traffic into a small number of classes and assigning some
numeric characteristics, known as priority to each class. (2 marks)
3. Weighted Queuing: This algorithm is developed to provide certain
minimum bandwidth to all classes of traffic, or at least to guarantee
observations of some requirements to delays. Class weight is the
percentage of the total bandwidth of the resource that is guaranteed to
this class of traffic. Like priority queuing, weighted queuing requires the
division of the traffic into several classes. For each class, a separate
queue is created. However in weighted queuing each queue is assigned
the percentage of the resource bandwidth guaranteed to this class
under conditions of resource overload rather than a specific priority.
For input flow, role of resource is played by the processor, and for the
output flow, this role is played by the output interface. (3 marks)
4. Hybrid Algorithm of Queuing: Both of the two algorithms (priority
and weighted) has some advantages and drawbacks. A hybrid algorithm
is trying to find a compromise between those two algorithms. The most
popular type of such an algorithm uses one priority queue and serves all
other queues according to the weighted algorithm. Usually priority
queues are used for real-time traffic and other queues are used for
elastic traffic of several classes. Each class of elastic traffic get some
guaranteed minimum of the bandwidth during congestion periods. This
minimum is calculated as percentage of the bandwidth remaining after
serving the priority traffic. However, it is necessary to limit the priority
traffic somehow to prevent it from consuming the entire bandwidth of
the resource. (3 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
125308
QUESTION_TEXT
Explain any 5 TCP services.
SCHEME OF
EVALUATION
TCP is stream oriented protocol. It allows the sending process to
deliver data as a stream of bytes and allows the receiving process
to obtain data as a stream of bytes.
TCP offers full duplex service, in which data can flow in both
directions at the same time. Each TCP then has a sending and
receiving buffer and segments move in both directions.
TCP is a reliable and connection oriented transport protocol. It uses an
acknowledgement mechanism to check the safe and sound arrival
of data.
TCP provides flow control and implements an error control
mechanism.
TCP takes into account congestion in the network. The amount of data
sent by a sender is not only controlled by the receiver, but is also
determined by the level of congestion in the network.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
125317
QUESTION_TEXT
Define Proxy Server. Explain different types of Proxy.
1.
2.
SCHEME OF
EVALUATION
3.
4.
In computer networks, a proxy server is a server (a computer
system or an application) that acts as an intermediary for requests
from clients seeking resources from other servers. A client connects
to the proxy server, requesting some service, such as file,
connection, web page, or other resource available from a different
server. The proxy server evaluates the request as a way to simplify
and control their complexity. (2 marks)
Different types of proxy: Forward Proxy: Forward Proxies are
Proxies where the client server names the largest server to connect
to. Forward “roxies are able to retrieve from a wide range of
resources. (2 marks)
Open Proxy: An Open Proxy is a forwarding proxy server that is
accessible by any Internet user. (1 mark)
Reverse Proxy: A Reverse Proxy (or surrogate) is a proxy server
that appear to clients to be an ordinary server. Requests are
forwarded to one or more origin servers which handle the request.
The response is returned as if it came directly from the proxy server.
Reverse Proxies are installed in the neighborhood of one or more
web servers. All traffic coming from the Internet and with a
destination of one of the neighborhood’s web server goes through
the proxy server. The use of “reverse” originates its counterpart
“forward proxy” since the reverse proxy sits closer to the web server
and servers only a restricted set of websites. Figure below shows
different types of proxies: (5 marks)
(Diagram not required)
Download