COMP90007 Internet Technologies Final Exam Semester 1, 2023
Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit
COMP90007 Internet Technologies
Final Exam
Semester 1, 2023
Reading Time: 15 minutes
Total Time: 2 hours 15 minutes (including reading time)
Instructions to Students:
This paper has 6 pages, including two cover pages.
• The exam has 8 questions worth a total of 60 marks, making up 60% of the total assessment for the subject.
• The value beside the Question number displays the marks allocated to each question.
• Please answer all questions using English in the given order. Please type your answers and save as one PDF file. Handwritten assignments using tablet or scanned will not be accepted.
• Submission should only contain the question number and the answer (do not repeat the text of questions in your submission).
• Partial marks will be available. No question requires writing lengthy answers. Please be clear and brief as you may lose points for unclear or redundant descriptions.
• Make sure to save your progress locally and regularly during the exam and at the end. Upload the PDF file before due time. We recommend not leaving the uploading of your file to the last minute.
• If you submit after the due date and time, your submission will be marked as late. Your exam will be available for 30 minutes after the due date and time to allow late submission due to any technical issues during the exam. Once this additional 30 minutes has passed, you will no longer be able to access your exam in the LMS.
Authorised Materials: This exam is open-book. The work you submit must be based on your own knowledge and skills, without assistance from any other person.
While undertaking this exam you are permitted to:
• make use of textbooks, lecture slides (including electronic versions), lecture recordings and material provided as part of tutorials in this subject.
• make use of your own personal notes.
• use calculators or mathematical software to compute numeric answers.
• make use of other materials with proper references.
IMPORTANT!! Collusion, Plagiarism, Copying and use of AI tools are not allowed under any circumstances.
• Collusion includes, but is not limited to, talking to, phoning, emailing, texting or using the internet to communicate with other students. Similarly, you cannot communicate with any other person via any means about the content of this exam during the examination time. If another student contacts you during the examination period, please inform the subject coordinator immediately.
• Your answers to the exam must be in your own words and not directly copied from lecture notes, tutorial materials, the Internet or joint study notes you have prepared with your friends. You may refer to sources, but answers should be written in your own words.
• Any similarity detected between your answers, the answers from other students and/or from the Internet or other sources will be investigated and may result in severe penalties.
Technical support
• During the exam, if you have questions about the exam content, please use the Exam Support Chat.
• Technical support for this exam can be accessed at:
https://students.unimelb.edu.au/your-course/manage-your-course/exams- assessments-and-results/exams/technical-support
Additional information about Canvas Assignment, including troubleshooting tips, can be found: https://students.unimelb.edu.au/your-course/manage-your-course/exams-assessments-and-results/exams/how-do-i-take-my-exam/formats/LMS-assignments
Questions commence on the next page.
Question 1: [8 Marks]
A company operates trains on an 800km stretch of track and wishes to enable digital communication between the train and the stations at each end of the track to communicate with the train drivers and to remotely operate the train, using video streamed from the train in the event of an emergency.
i) Please list the key QoS requirements for this application and explain why. Please answer in brief bullet points.
ii) Please list the physical layer technologies that would be suitable for this application and explain why. Please answer in brief bullet points.
Question 2: [6 Marks]
100 MB (Megabytes) of data is to be transmitted over 100m of twisted pair with a bandwidth of 10MHz (Megahertz) with data encoded using 4 voltage levels. The speed of the signal over the wire is 200,000 km/s.
i) What is the Propagation Delay for the transmission?
ii) What is the Transmission Delay for the transmission?
iii) If the data is encoded using a Hamming (7,4) code for forward error correction, how does this change your answers to i) and ii) above?
Please show all calculations and steps.
Question 3: [6 Marks]
A wireless network has 32 stations. Stations 2, 4, 16 and 24 have packets to transmit.
i) List the sequence of events if the Bit Map Protocol is used in brief dot points.
ii) List the sequence of events if the Binary Countdown Protocol is used in brief dot points.
iii) Compare the two protocols for efficiency and fairness using brief dot points.
Question 4: [12 Marks]
The figure below shows 8 routers in a network. The delay on each line is shown along with the routing table for node A.
The link between F and G becomes congested and is downgraded from 1 to 3 (packets now take longer to be transmitted over this link).
i) Compute the distances to each node from node A taking this link change into account, using Dijkstra’s algorithm. Complete the table below (adding rows as necessary) to give your answer:
ii) Compute the new routing table for A
iii) If Link State Routing is used, give the Link State Packet(s) that will be generated by the downgrade on the FG link.
iv) If Distance Vector Routing is used instead, how many rounds of the algorithm are needed for node A to become aware of the downgraded link? Briefly explain your answer.
Question 5: [8 Marks]
The routing table for a router is shown below:
Packets are addressed to the following destinations. For each packet determine which interface that the router will send the packet on, give a brief explanation for each
answer.
i) 128.32.192.65
ii) 128.32.4.4
iii) 128.32.80.5
iv) 128.32.97.10
Question 6: [6 Marks]
A server is sending data to a client using TCP. The client has a transport buffer window containing 8000 Bytes. The server has sent packets 1, 2 and 3 each containing 1000 Bytes of data which have both arrived at the client. The client application then reads 1000 Bytes of data from the buffer.
1) What are the ACK and WIN values in the ACK packet that the client sends back to the server after it reads 1000 Bytes from the buffer?
2) The server then sends packets 4 and 5, but packet 5 arrives first What are the ACK and WIN values in the ACK packet that the client sends back to the server after the arrival of the packet 5?
3) Packet 4 now arrives. What are the ACK and WIN values in the ACK packet that the client sends back to the server after the arrival of this packet?
Please provide the values of the requested quantities alone. A diagram for these is not required.
Question 7: [6 marks]
A user at their home in France requests a web page from www.unimelb.edu.au. Their web browser must first find the IP address of the web server and then request a web page.
1) The user’s local DNS server does not have any IP addresses in its cache. List the sequence of steps needed for the user’s computer to obtain the IP address of the web server.
2) The web page returned by www.unimelb.edu.au contains many images. Why might the client prefer to use a persistent HTTP connection rather than a non-persistent connection to load this web page?
Question 8: (8 marks)
Alice and Bob wish to generate a shared secret key using Diffie-Helman key exchange using the prime modulus p=19 and generator g=2.
1) Assume that Alice chooses a number which is 2 added to the last digit of your student ID and that Bob chooses a number which is 2 added to the second last digit of your student ID.
For example if your student ID is 1234567 then the last digit is “7” so Alice chooses 7+2 = 9 and the second last digit is “6” so Bob chooses 6+2 = 8.
Show the process that Alice and Bob go through to obtain a shared secret key. Make sure you identify the information that Alice and Bob send to each other in this process.
2) List the differences between the Diffie-Helman key exchange with the method using public key cryptography, shown in the diagram below using brief dot points. What are the assumptions and benefits of each method?
2023-07-13