We know the secret of your success
1
a) A router port is connected with the following three networks:
192.10.164.0 /24 192.10.165.0 /24 192.10.170.0 /24
What address could be used to describe all the three networks and what are the advantages of doing so? (5 marks)
Answer (Purchase past paper to get access to the full solution)
The networks are
162.10.164.0/24
162.10.165.0/24
162.10.170.0/24
10100010.00001010.10100100.00000000
10100010.00001010.10100101.00000000
10100010.00001010.10101010.00000000
The address that could be used to describe all three addresses is the summary address which is computed as: 162.10.160.0/20
b) Compare and contrast distance vector and link state protocols in terms of how they operate. What are the advantages and disadvantages of each? (10 marks)
c) Given the administrative distance of RIP is 120 and that of OSPF is 110 answer the following:
i. What is meant by the term administrative distance and why does this differ from protocol to protocol?
ii. A router learns of two potential routes to destination X, one by RIP and one by OSPF. Which of these would be added to its routing table?
iii. Assuming a static route to X was configured before route selection in (ii) took place, would this affect the selection process?
2. a) Briefly discuss some of the factors you would consider while deciding on the logical/physical location of a file server intended to provide high quality training videos and shared application resources to the engineering department of a large organisation. (5 marks)
b) You are designing the network for the campus of a large organisation. The company owns a large amount of old hubs and old 10MB switches and due to budget limitation you have decided to redeploy a small number of them. Discuss which of those devices would you chose to use and how you would do so in the context of the three tier network design model.
How many broadcast and how many collision domains are there? If you had the budget to upgrade a single networking device, which device would you go for and why? (5 marks)
c) In the context of the three tier architecture, discuss the functions and roles of the distribution and core layers. Would it be a good idea for a small company with 120 employees located in a single building to merge these two layers into one? (10 marks)
d) The backbone of your network needs to route both IPv4 and IPv6 data. What approaches could be employed to achieve such a task?
(5 marks)
3. a) Explain how the two TCP/IP transport layer protocols (TCP and UDP) are employed in the context of VoIP telephony. (5 marks)
b) Briefly discuss ATM technology. Would this be an appropriate choice for streaming audio and video information? Justify your answer. (10 marks)
c) Briefly explain the difference between circuit and packet switched technologies providing an example of each. (5 marks)
d) Identify the type, and write out the shorthand version of the following IPv6 addresses
i. 0000:0000:0000:0000:0000:0000:0000:0000
ii. 0000:0000:0000:0000:0000:0000:0000:0001
iii. fe80:0000:0000:0000:0400:ffff:1010:2017
iv. ff01:0000:0000:0000:0000:0000:0001:A000
v. 2002:1b00:000d:0000:0ff0:0000:0000:0360 (5 marks)
4.
a) Explain how layer 2 switches make forwarding decisions and learn about potential destinations. (5 marks)
b) The users of a particular department are spread across a number of offices within a 500 meter area. Assuming UTP 5e cable is used and that you have a number of managed switches at your disposal discuss how those users could be added into a logical LAN. (5 marks)
c) Briefly explain how switches can be used to introduce redundancy to your network design and how can loops be avoided. (5 marks)
d) Discuss the benefits of employing devices that support VLAN trunking. Would this feature be a useful addition for a symmetric switch that has no support for etherchannel? (10 marks)
5.
a) Answer the following questions regarding the network and ACL shown:
i. Is this ACL standard or extended? (1 mark) ii. What is the intended purpose of the ACL? (1 mark) iii. Which device/port and which direction does it need to be applied to? (2 marks) iv. Would that ACL prevent the ISP from accessing the web? (1 mark)
b) What authentication options are available for PPP connections and which one would you recommend? (5 marks)
c) Briefly compare “open network” versus “closed network” approaches in the context of securing a network. What are their advantages and disadvantages? (5 marks)
d) VLAN membership can be static or dynamic. Discuss the implications (and possible problems) of each of these options in terms of security. (10 marks)
6.
a) Nowadays it is common to use a single network for both data and VoIP telephony. How can this turn into a disadvantage in the event of a disaster? Provide an example if necessary. (5 marks)
b) Briefly discuss the strategies that can be deployed in order to avoid risk, providing an example for each strategy presented. (5 marks)
c) Briefly explain the difference between the push and pull methods employed by SNMP (Simple Network Management Protocol). (5 marks)
d) You are in the process of identifying the risks for a financial company located in a newly constructed building in Miyako (a port at the east coastline of Japan). Produce an impact/probably chart and briefly discuss you assumptions and the main issues/risks identified (and why they matter). (10 marks)
NB: Purchase 360CT Advanced Network Management and Design, 2017 paper answer and solution by adding to cart
Last updated: Jul 09, 2021 07:20 PM
Your one-stop website for academic resources, tutoring, writing, editing, study abroad application, cv writing & proofreading needs.