We know the secret of your success
1
a) A router port is connected with the following three networks:
192.168.12.0 /24 192.168.13.0 /24 192.168.15.0 /24
What address could be used to describe all the three networks and what are the advantages of doing so? (5 marks)
Answer (Purchase past paper to get access to the full solution)
172.16.12.0/24
172.16.13.0/24
172.16.15.0/24
11000000.10101000.10000010.00000000
11000000.10101000.10000111.00000000
11000000.10101000.10001100.00000000
The address that could be used to describe all three addresses is the summary address which is computed as: 172.16.8.0/21
The advantages of summarization include:
b) A router has discovered two possible routes to a particular network – the first route has been learned using Routing Information Protocol (RIP) and the second route using Enhanced Interior Gateway Routing Protocol (EIGRP). Which of these two routes will be added to the routing table and why? (5 marks)
The router would prefer the router from Enhanced Interior Gateway Routing Protocol (EIGRP) routes with an administrative distance of 90 over routes from Routing Information Protocol, RIP with an administrative distance of 120.
c) Compare and contrast distance vector and link state protocols in terms of how they operate. What are the advantages and disadvantages of each? (10 marks)
Distance vector
Advantages
Disadvantages
Link State
d) Briefly compare how exterior routing protocols (i.e. BGP) differ from internal routing protocols in the way they operate. (5 marks)
In exterior routing protocols;
For interior routing protocols;
2.
a) After a review of your network you discover that a single server is deployed for the purpose of providing the Dynamic Host Configuration Protocol (DHCP) service. Why is this a problem and how could this problem be addressed? (5 marks)
b) Briefly discuss the advantages of utilising router devices when implementing the network design for a corporate LAN. (5 marks)
c) You are designing the network for the campus of alarge organisation. The company owns a large amount of old hubs and old 10MB switches and due to budget limitation you have decided to redeploy a small number of them. Discuss which of those devices would you chose to use and how you would do so in the context of the three tier network design model. (5 marks)
d) In the context of the three tier architecture, discuss the functions and roles of the distribution and core layers. Would it be a good idea for a small company with 80 employees located in a single building to merge these two layers into one? (10 marks)
3.
a) Briefly explain what is meant by connection oriented and connectionless communication. (5 marks)
b) Which layers of the ISO/OSI does the Frame Relay protocol operate on and would it be a better choice than X.25 if we wanted fast data transmission over reliable digital lines? (5 marks)
c) Briefly discuss Asynchronous Transfer Mode (ATM) technology. Would this be an appropriate choice for streaming audio and video information purposes? Justify your answer. (10 marks)
d) Identify the type, and write out the shorthand version of the following IPv6 addresses:
i) 0000:0000:0000:0000:0000:0000:0000:0001 ii) ff01:0000:0000:0000:0000:0000:0000:0002 iii) fe80:0000:0000:0000:0200:5aee:feaa:20a2 iv) 2002:9ba0:000d:0000:0ff4:0000:0000:0007 v) 0000:0000:0000:0000:0000:0000:0000:0000 (5 marks)
4.
a) Explain how layer 2 switches make forwarding decisions and learn about potential destinations. (5 marks)
b) The users of a particular department are spread across a number of offices within a 500 meter area. Assuming UTP 5e cable is used and that you have a number of managed switches at your disposal discuss how those users could be added into a logical LAN. (5 marks)
c) Membership to VLANs can be either static or dynamic. Briefly explain what is meant by each of these terms and then compare and contrast the two methods – what are their advantages and disadvantages? (10 marks)
d) Briefly explain how switches can be used to introduce redundancy to your network design and how can loops be avoided. (5 marks)
5.
a) Answer the following questions regarding the network and ACL shown:
i. Is this ACL standard or extended? (1 mark) ii. What is the intended purpose of the ACL? (1 mark) iii. Which device/port and which direction does it need to be applied to? (2 marks) iv. Would that ACL prevent the ISP from accessing the web?
b) Briefly discuss why we need security policies. (5 marks)
c) What authentication options are available for PPP connections and which one would you recommend? (5 marks)
d) Explain the meaning of “Social Engineering Attack”. (5 marks)
e) Assuming a social engineering attack has been successful on a network and either some high privilege credentials have been compromised or some malware installed, what aspects of network design could limit the possible damage to data security and network functionality. (5 marks)
6.
a) Explain the differences between bottom up and top down approaches to network troubleshooting. What approach would you take in order to solve a problem assuming you have no idea regarding its cause? (5 marks)
b) Briefly explain the difference between the push and pull methods employed by SNMP (Simple Network Management Protocol). (5 marks)
c) Briefly discuss the strategies than can be deployed in order to avoid risk, providing an example for each strategy presented. (5 marks)
d) You are in the process of identifying the risks for a financial company located in a newly constructed building in Miyako (a port at the east coastline of Japan). Produce an impact/probability chart and briefly discuss your assumptions and the main issues/risks identified (and why they matter). (10 marks)
NB: Purchase 360CT Advanced Network Management and Design, 2015 paper answer and solution by adding to cart
Last updated: Jul 11, 2021 07:44 AM
Your one-stop website for academic resources, tutoring, writing, editing, study abroad application, cv writing & proofreading needs.