Premium Resources

We know the secret of your success

360CT Advanced Network Management and Design - Coventry University | 2015

$28.00

360CT Advanced Network Management and Design - Coventry University | Past Paper Solution 2015

1

a) A router port is connected with the following three networks:

192.168.12.0 /24
192.168.13.0 /24
192.168.15.0 /24

What address could be used to describe all the three networks and what are the advantages of doing so? (5 marks)

Answer (Purchase past paper to get access to the full solution)

172.16.12.0/24

172.16.13.0/24

172.16.15.0/24

11000000.10101000.10000010.00000000

11000000.10101000.10000111.00000000

11000000.10101000.10001100.00000000

 The address that could be used to describe all three addresses is the summary address which is computed as: 172.16.8.0/21

The advantages of summarization include:

    1. Reducing the size of routing table entries
    2. Increases routing efficiency by minimizing the time it takes to perform routing table lookups.
    3. Improves stability of the routing process during convergence in dynamic routing protocols.

b) A router has discovered two possible routes to a particular network – the first route has been learned using Routing Information Protocol (RIP) and the second route using Enhanced Interior Gateway Routing Protocol (EIGRP). Which of these two routes will be added to the routing table and why? (5 marks)

Answer (Purchase past paper to get access to the full solution)

The router would prefer the router from Enhanced Interior Gateway Routing Protocol (EIGRP) routes with an administrative distance of 90 over routes from Routing Information Protocol, RIP with an administrative distance of 120.

c) Compare and contrast distance vector and link state protocols in terms of how they operate. What are the advantages and disadvantages of each? (10 marks)

Answer (Purchase past paper to get access to the full solution)

Distance vector

    • Each router only sees its neighbour routes
    • Updates are periodic
    • Updates contain entire routing table information
    • Shortest vector indicates best route.

Advantages

    • Easy to configure and administer
    • Requires less knowledge
    • Low hardware requirements

Disadvantages

    • Easy to configure and administer
    • Requires less knowledge
    • Low hardware requirements

Link State

    • Routers maintain topology database for the entire network
    • Updates are triggered by changes
    • Routing table is calculated using the database.

Advantages

    • Easy to configure and administer
    • Requires less knowledge
    • Low hardware requirements

Disadvantages

    • High memory and processing power requirements
    • Difficult to configure and troubleshoot
    • Requires more knowledge

d) Briefly compare how exterior routing protocols (i.e. BGP) differ from internal routing protocols in the way they operate. (5 marks)

Answer (Purchase past paper to get access to the full solution)

In exterior routing protocols;

    • Each AS treated as a single node in the path
    • AS internal topology unknown
    • Typically the number of AS that data has to travel through
    • Only deal with loops formed by different AS

For interior routing protocols;

    • Each router treated as a path node
    • Share topology information
    • Wide range of metrics including number of hops
    • Detects and resolve all routing loops

2.

a) After a review of your network you discover that a single server is deployed for the purpose of providing the Dynamic Host Configuration Protocol (DHCP) service. Why is this a problem and how could this problem be addressed? (5 marks)


b) Briefly discuss the advantages of utilising router devices when implementing the network design for a corporate LAN. (5 marks)


c) You are designing the network for the campus of alarge organisation. The company owns a large amount of old hubs and old 10MB switches and due to budget limitation you have decided to redeploy a small number of them. Discuss which of those devices would you chose to use and how you would do so in the context of the three tier network design model. (5 marks)


d) In the context of the three tier architecture, discuss the functions and roles of the distribution and core layers. Would it be a good idea for a small company with 80 employees located in a single building to merge these two layers into one? (10 marks)

3.

a) Briefly explain what is meant by connection oriented and connectionless communication. (5 marks)


b) Which layers of the ISO/OSI does the Frame Relay protocol operate on and would it be a better choice than X.25 if we wanted fast data transmission over reliable digital lines? (5 marks)


c) Briefly discuss Asynchronous Transfer Mode (ATM) technology. Would this be an appropriate choice for streaming audio and video information purposes? Justify your answer. (10 marks)

d) Identify the type, and write out the shorthand version of the following IPv6 addresses:


i) 0000:0000:0000:0000:0000:0000:0000:0001
ii) ff01:0000:0000:0000:0000:0000:0000:0002
iii) fe80:0000:0000:0000:0200:5aee:feaa:20a2
iv) 2002:9ba0:000d:0000:0ff4:0000:0000:0007
v) 0000:0000:0000:0000:0000:0000:0000:0000 (5 marks)

4.

a) Explain how layer 2 switches make forwarding decisions and learn about potential destinations. (5 marks)

b) The users of a particular department are spread across a number of offices within a 500 meter area. Assuming UTP 5e cable is used and that you have a number of managed switches at your disposal discuss how those users could be added into a logical LAN. (5 marks)

c) Membership to VLANs can be either static or dynamic. Briefly explain what is meant by each of these terms and then compare and contrast the two methods – what are their advantages and disadvantages? (10 marks)

d) Briefly explain how switches can be used to introduce redundancy to your network design and how can loops be avoided. (5 marks)

5.

a) Answer the following questions regarding the network and ACL shown:

i. Is this ACL standard or extended? (1 mark)
ii. What is the intended purpose of the ACL? (1 mark)
iii. Which device/port and which direction does it need to be applied to? (2 marks)
iv. Would that ACL prevent the ISP from accessing the web?

b) Briefly discuss why we need security policies. (5 marks)


c) What authentication options are available for PPP connections and which one would you recommend? (5 marks)


d) Explain the meaning of “Social Engineering Attack”. (5 marks)


e) Assuming a social engineering attack has been successful on a network and either some high privilege credentials have been compromised or some malware installed, what aspects of network design could limit the possible damage to data security and network functionality. (5 marks)

6.

a) Explain the differences between bottom up and top down approaches to network troubleshooting. What
approach would you take in order to solve a problem assuming you have no idea regarding its cause? (5 marks)


b) Briefly explain the difference between the push and pull methods employed by SNMP (Simple Network
Management Protocol). (5 marks)


c) Briefly discuss the strategies than can be deployed in order to avoid risk, providing an example for each strategy presented. (5 marks)


d) You are in the process of identifying the risks for a financial company located in a newly constructed building in Miyako (a port at the east coastline of Japan). Produce an impact/probability chart and briefly discuss your assumptions and the main issues/risks identified (and why they matter). (10 marks)

NB: Purchase 360CT Advanced Network Management and Design, 2015 paper answer and solution by adding to cart

Last updated: Jul 11, 2021 07:44 AM

Can't find a resource? Get in touch

AcademicianHelp

Your one-stop website for academic resources, tutoring, writing, editing, study abroad application, cv writing & proofreading needs.

Get Quote
TOP