关键词 > COMP2410/COMP6340

COMP2410/COMP6340_Semester 1 Networked Information Systems Semester 1 - End of Semester, 2017

发布时间:2023-06-08

Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit

EXAMINATION

Semester 1 - End of Semester, 2017

COMP2410/COMP6340_Semester 1 Networked Information Systems

PART A. Both COMP2410 and COMP6340 students

Question 1.

Describe the Internet Layers model as a table with the following three columns: 1) the layer’s name, 2) its purpose, and 3) a common standard/protocol relevant to this layer. Remember to have a row for each layer.

0-20 points, format your full answer as a max 0.5-page table

Question 2.

In the context of Virtual Local Area Network (VLAN) messaging, walk us through the four cases of 1) Same Subnet Same Switch, 2) Same Subnet Different Switch, 3) Different     Subnet Same Switch, and 4) Different Subnet Different Switch. Please include a figure of your example network and specify the sender(s) and receiver(s) of the message.             Remember to provide for each case a flow chart that explain in a concrete way what is    happening to the message as it travels through your example network in each case.

0-20 points, format your full answer as a max 0.25-page figure and four flow charts (max 0.25 pp. each)

Question 3.

Consider the Textbook Management Focus 9-4 below. What other alternatives do you    think Cisco considered for their wide area networks (WANs)? Why do you think they did what they did? Please define and relate the ten underlined concepts in your answer, but remember that these are not the only aspects to cover in your answer.

For years, Cisco Systems Inc. had supported its Europe/Middle East/Africa (EMEA) offices with a series of star networks connected to stars (called a hub-and-spoke     design). The WAN core was three offices (London, Amsterdam, and Brussels)         connected to each other in a full mesh using OC-3 circuits. Each of these three       offices was the center of a star network that connected to three other secondary     star networks and 10 major sites (9 stars and 30 major sites in total). The nine        secondary stars connected a total of 85 other offices. The network was at capacity, and any time one of the three core offices (or one of the hubs of the secondary       stars) needed to be taken down for maintenance, it shut down a major part of the    network. Worse still, it looked like the London office would need to move to a new   building, which meant significant rewiring of the network. Cisco chose to implement a full mesh [Multiprotocol Label Switching] MPLS network to provide greater            capacity and better flexibility. Each office is connected into the MPLS carrier’s         cloud with two separate MPLS circuits that are laid in physically separate routes to  provide better reliability in case a circuit is accidentally cut. Each of the two circuits is sized for the needs of the specific office, ranging from 64 Kbps up to 45Mbps.      Since the three core offices no longer route traffic for the entire network, they don’t  need as much network capacity as they did with the hub and spoke design. The      new network has significantly increased capacity, reliability, and flexibility, while       keeping costs about the same.

0-20 points, format your full answer as a max 500-word essay

PART B. Both COMP2410 and COMP6340 students

Question 4. Choose 1 out of the 2 options below.

Option 1. Compare and contrast a thick-client architecture and thin-client architecture in the context of client-server architectures and functions of the application layer.                Remember to name and explain the functions as well as relate them with both the thick- client and thin-client architecture.

0-20 points, format your full answer as a max 250-word essay

Option 2. First, describe the traditional method and building-block method for network design and then explain how you could apply the latter method to the following case:

Shangri-La’s Rasa Sayang Resort and Spa is a five-star luxury resort hotel located on the scenic Batu Feringgi Beach in Penang, Malaysia. The resort has two main    buildings, the 189-room Garden Wing and the 115-room Rasa Wing, with an           additional 11 private spa villas. Over the years, the resort had installed three           separate networks: one for the resort’s operations, one for its Point-of-Sales (POS) system, and one for Internet access for guests (which was wired, not wireless). The networks were separate to ensure security, so that users of one net- work could not gain access to another. As part of a multi-million-dollar renovation, the resort           decided to upgrade its network to gigabit speeds and to offer wireless Internet         access to its guests. Rather than build three separate networks again, it decided to build one network using VLANs. The resort installed 12 wireless access points and 24 VLAN switches, plus two larger core VLAN switches. The VLAN architecture      provides seamless management of the wired and wireless components as one        integrated network and ensures robust performance and security.

0-20 points, format your full answer as a max 250-word essay

PART C. COMP2410 students only

Question 5. Choose 1 out of the 2 options below.

Option 1. Let us consider an example, where a client in the Building A sends an email to another client in the Building B through a router in Building A and another router in            Building B. Explain how the protocol data units flow through the layers of the Internet        model. You can assume that the addresses are known and correct. After this, explain       how Virtual Local Area Networks (VLANs) could be useful in this example and what          VLAN transparency means in this context.

0-20 points, format your full answer as a max 250-word essay

Option 2. Compare and contrast symmetric encryption and asymmetric encryption in the context of an accountant wishing to email his/her customers’ tax documents as an attachment (ZIP file of text documents and spreadsheets) securely to his/her line        manager and the manager then decrypting the attached document.

0-20 points, format your full answer as a max 250-word essay

PART D. COMP6340 students only

Question 5. Choose 1 out of the 2 options below.

Option 1. Let us consider an example, where a client in the Building A sends an email to another client in the Building B through a router in Building A and another router in            Building B. Explain how the protocol data units flow through the layers of the Internet        model. You can first assume that the addresses are known and correct. After this, relax    these assumptions and explain how subnetting, broadcasting, and introducing Virtual       Local Area Network (VLAN) switches applies to this example, using a figure to support     your narrative text. Finally, explain the concept of VLAN transparency in this context.

0-20 points, format your full answer as a max 500-word essay, supported by one figure

Option 2. Compare and contrast symmetric encryption and asymmetric encryption in    the context of an accountant wishing to email his/her customers’ tax documents as an    attachment (ZIP file of text documents and spreadsheets) securely to his/her line            manager and the manager then decrypting the attached document. Please include in     your answer a figure that explains the symmetric encryption-decryption process and       another figure that explains the asymmetric encryption-decryption process in the context of the accountant and manager’s communication.

0-20 points, format your full answer as a max 250-word essay and two figures