Escolar Documentos
Profissional Documentos
Cultura Documentos
1.15 The ports ranging from 49,152 to 65,535 can be used as temporary or
private port numbers. They are called the ________ ports.
a) well-known
b) registered
c) dynamic
d) none of the above [2 marks]
Total [30 marks]
2.2 The IP Protocol and most LAN and WAN protocols are classified as
unreliable. Briefly explain what this unreliable description refers to.
Answer:
In computer networking, a reliable protocol is one that provides
reliability properties with respect to the delivery of data to the intended
recipient(s), as opposed to an unreliable protocol, which does not
provide notifications to the sender as to the delivery of transmitted
data. [3 marks]
2.3 The so-called hidden station problem can arise in an 802.11x Basic
Service Set. Briefly explain how this difficulty is overcome.
Answer:
Hidden nodes in a wireless network refer to nodes that are out of range
of other nodes or a collection of nodes. In a wireless network, it is likely
that the node at the far edge of the access point's range, which is
known as A, can see the access point, but it is unlikely that the same
node can see a node on the opposite end of the access point's range,
B. These nodes are known as hidden nodes. A problem occurs when
nodes A and B start to send packets simultaneously to the access
point. Since node A and B cannot sense the carrier, Carrier Sense
Multiple Access with collision avoidance (CSMA/CA) does not work,
and collisions occur, scrambling the data. To overcome this problem,
handshaking is implemented in conjunction with the CSMA/CA
scheme. RTS/CTS can be implemented it still might not overcome
the problem.
Other suggested methods for overcoming the problem include
(Wikipedia)
Increase Transmitting Power From the Nodes
Use omnidirectional antennas [5 marks]
2.4 Briefly explain the difference between a port address, a logical address
and a physical address.
Answer:
2.5 Explain the difference between the two packet data transfer techniques
referred to as connectionless and connection-orientated.
Answer:
In connection-orientated transfer, resources need to be reserved
along a path before packets can traverse the path. In connectionless
transfer, packets pass from point to point in a store and forward
movement using buffers at each intermediate router before passing to
the next router. Since packets can be routed independently in the
connectionless mode they may arrive out of sequence, whereas for
connection-oriented transfer packets should remain in the sequence
that they have been sent. [6 marks]
Total [30 marks]
3.4 BGP is regarded as a Path Vector Protocol, how does it differ from Link
State and Distance Vector Protocols?
Answer:
The primary function of a BGP system is to exchange network
reachability information with other BGP systems. BGP is rule based
rather than metric based as distinct from the case of the other two
protocols. Link state protocols pass around topology and network
status information using a flooding protocol. [5 marks]
3.5 List three reasons why most network specialists prefer Link State
Routing instead of Distance Vector Routing. [6 marks]
4.2 Briefly describe TWO possible methods for enabling a smooth transition from IPv4
to IPv6. Briefly comment on their suitability.
Answer:
Several approaches have been proposed, viz:
a) Dual-stack methods
b) Tunnelling
c) Header translation
1) Dual stack means running IPv4 and IPv6 simultaneously until everyone is
ready for IPv6. (To figure out which version of IP to use when sending a
packet to the destination, the source must send a query to the DNS server. [6
If the DNS server returns an IPv4 address then the source sends an IPv4 ma
packet, else it sends an IPv6 packet.) rks]
[12
ma
rks]
4.4 a) Briefly describe what is NAT (Network Address Translation) and how it [3 + 3
operates. =6
b) How does it assist with the problem of IPv4 address exhaustion? ma
rks]
Total [30
ma
rks]
Question 5 Multimedia
5.1 What is meant by the term jitter? How does jitter impact real time
audio/video? [10 marks]
5.2 Discuss in some detail how SIP (Session Initiated Protocol) is used in
the transmission of multimedia. Include in your discussion the various
types of SIP message, addressing and a simple session description. [12 marks]
5.3 The JPEG process consists of three phases as shown in the figure
below. Briefly outline the process involved in transforming an image
into a compressed image using these three phases as a guide to your
descriptions:
[8 marks]
[8 marks]
6.2 Briefly explain the principal differences between UDP and TCP and the
reasons for choosing between them for a given internet application. [8 marks]
6.4 In order to answer the question "Where in the protocol stack does
security belong?", choose any 3 OSI layers and describe a network
security measure that can be implemented in each of these selected
layers. [6 marks]
6.5 Briefly compare the relative merits of Secret Key and Public Key
cryptography as used to provide network security. [4marks]