Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Exam Questions: Internetworking & Security for Software & Networking Students, Exams of Computer Networks

The questions and answers for an exam in the internetworking and security module of a bachelor of science (honours) in software development and computer networking degree at cork institute of technology. The exam covers topics such as frame relay topologies, multicast protocols, digital signatures, and network management. Students are required to answer any four questions within a 3-hour timeframe.

Typology: Exams

2012/2013

Uploaded on 03/24/2013

anagha
anagha 🇮🇳

4.4

(43)

134 documents

1 / 3

Toggle sidebar

Related documents


Partial preview of the text

Download Exam Questions: Internetworking & Security for Software & Networking Students and more Exams Computer Networks in PDF only on Docsity! Cork Institute of Technology Bachelor of Science (Honours) in Software Development and Computer Networking - Stage 3 (KDNET_8_Y3) Autumn 2008 Internetworking and Security (Time: 3 Hours) Answer any FOUR questions All questions carry equal marks Examiners: Dr. J. Buckley Dr. A. Kinsella Ms. Olivia Brickley Q1. a. Illustrate and describe three Frame Relay topologies, outlining the problems and benefits of each. (9 marks) b. Briefly describe frame relay error handling considerations. (3 marks) c. How are multiple frame relay connections configured over one physical connection? (2 marks) What is split horizon? Explain, using a diagram, how it causes problems in frame relay networks. How is this issue resolved? (5 marks) d. Frame relay uses the concept of virtual connections. Describe how addressing is handled, considering both layer 2 and layer 3 considerations. (6 marks) Q2. a. Multicast is based on the concept of a group. Describe, using illustrations where necessary, basic IGMP protocol operation. (5 marks) Briefly discuss the differences between IGMPv1 and IGMPv2 (3 marks) b. The two basic types of multicast distribution trees are source trees and shared trees. Using a simple example, describe and demonstrate their operation. (8 marks) c. RIP is a well known distance vector routing protocol. Identify and describe five limitations associated with RIP. (5 marks) Describe how OSPF it overcomes these limitations. (4 marks) Q3. a. What are the desired properties of a digital signature? (4 marks) 2 Describe the digital signature process using public-key cryptography, identifying how/where these properties are assured h b. Network security is a continuous process built around a security policy. Describe each step in the security wheel. (8 marks) c. What is a VPN and how does it operate? (1 marks) VPNs use IPSec for security. Illustrate and explain the differences between AH and ESP, also outlining their strengths and/or weaknesses. (6 marks) Q4. a. HDLC is an important protocol whose variants are used in many different technologies. Briefly describe its purpose and functionality. (6 marks) What is bit stuffing and why is it used? (3 marks) b. PPP has two authentication methods. Describe in detail the operation of CHAP. (5 marks) How does this differ from PAP? (2 marks) c. What is the hidden terminal problem in WiFi networks? (3 marks) Describe in detail how the 802.11 standard addresses this issue. (6 marks)
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved