SlideShare a Scribd company logo
1 of 19
Download to read offline
t
1i
?:.
,'
..1
't-
,!
l'tSemester of the Examination
Network Models & tP
Module Code PGDCN 1102
This question paper contains six (6) questions. Answer any four (4) q
All questions carry equal mark.
(or1
(1) Explain the role of a reference model and why it resembles a layered approach
(5 Marks)
(2) Explain the structure of the oSl model in terms of function and pDU,s in each layer
(74 Marks)
(3) Draw the structure of a data frame and explain its function (6 Morks)
(oz1
(1) ldentify one main feature and one device in each of the 3 layers in the Cisco
hierarchical model and explain why the distribution layer is considered the SMART
layer compared to the access and core layers (S Marl<s)
(2) Discuss three main benefits of using a hierarchical network model approach in
network design (G marks)
(3) ln a hierarchical model what is the difference between the logical layout and the
physical layout? (5 Marks)
(4) Discuss the traffic flows that have to be considered in hierarchical network design
and explain the importance of such an analysis. fi Marks)
(5) what is meant by "tJser communities' andlyses" in network design? (2 Morks)
(ol1
(1) Find the subnet address, broadcast address, CtDR (/) notation,
the following (S Marks)
a. lP address - 193.i.65.33.41 Mask - 255.255.255.224
b. lP address - 10.236.73.21 Mask * 255.255.0.0
and address range of
Page 1 of 3
(a4)
(2) Assume that you have been given a class C block to create subnets. Depending on
the number of bits used for the subnet, fill in the following table (74 Marks)
No. of bit used
for the subnet
Subnet
mask
CIDR No. of subnets No. of hosts per subnet
(3) Which of the following can be a beginning address of a subnet block that contains L6
possible lP addresses (3 Marks)
a.205.L6.37.32
b. 190.L6.42.44
c. 17.17.33.80
d. 1-23.45.24.t60
Briefly Explain the difference between concepts of subnet and supernet with the
help of suitable diagrams (6 Mqrks)
A supernet has a first address of 205.L6.32.0 and a supernet mask of 255.255.248.0.
How many blocks are in this supernet considering a default mask of 124 and what is
the range of possible addresses? (4 Marks)
An lSp is granted a block of addresses starting with 203.115.0.0/16. The ISP needs to
distribute these addresses to three groups of customers as follows (Note: No need to
provide provisions for future growth) :
a. The first group has 64 customers; each needs 252 addresses'
b. The second group has 128 customers; each needs 124 addresses.
c. The third group has 128 customers; each needs 60 addresses.
(1)
(2)
(3)
Design the subnet blocks as Per the
last subnet for each group, subnet
each group (75 Morks)
given requirement. Clearly indicate the first and
mask, and the number of addresses allocate for
(as)
A transportation company is given the lP block 1.50.0.12.0/24 and has the following
requirements:
a. Marketing department with 50 computers
b. Finance departments with 14 computers
c. Adrninistration department has 30 computers
d. 2 logistics departments are extended from two point to point links
e. Each logistic department has B computers
(1) Design the subnets from the given block using variable length subnet masking
techniques (VLSM) for the departments and the point-to-point links indicating clearly
the subnet address, mask, and the address range for each subnet (27 Marks)
(2) Draw a conceptual design indicating the subnets connected via three routers and
switch distribution layer of the design in carried out above(4 Marks)
(oe1
Write comprehensive discussions on any3 of the following topics. lnclude clear
definition of concepts, applications, advantages and disadvantages for each
' discussion (25 Morks)
(1) ls a 32 bit address space sufficient for lnternet Protocol (tp) in future?
(2) Network Address Translation (NAT)
(3) Route summarization
(4) DMZ in an enterprise network
(5) lPva Header
(6) Distance vector Vs Link state routing
f*."-*
Page 3 of 3
. :t
#sfitrftd.rNational School of Business Management
Postgraduate Diploma in Computer Network_Batch 03
1.t Semester Examination
Computer Network Design
PGDCN 1101
Answer Q4 and other Two (02) euestions.
Time:03Hrs
03 January 2015
Q1
(a) List down three main types of Computer Network design
(b) what are the 6 main phases of network design ,, pur ih" top-down network design approach?(c) "Focus on Layer 7 dnd obovefirst',
(i) Explain the above statement on computer network designing approaches in your own words.
(ii) Compare the above statement with the methodology presented in Top Down Design
approach.
(d) Many network design tools and methodologies that have been used resemble the ,,connect-the-
dots" game. Explain the drawback of this methodology.
{e) write down short notes on one (01) of following topics with regard to Network Design
i) 80 /20 rule ' ii) Management View iii) Technical View
Q2 Networks are usually classified using three properties namely Topology, protocol & Architecture.(a) List down Four (04) main benefits of computer Networking .
r -'-ot ' q nr urrr
(3)(b) Name 4 variations of computer network toporogies with a schematic diagrams. (5)
,.,
[jilj;,]r:T:j,:rrtocat,,?
Describe with yourown words and provide three examptes for (s)
,',
nrrf"H::Lr
,0, characreristics for each of peer-to peer and ctient server network (s)
(e) write a short note on one (01) of the followings. Your note should address basic features, (7)advantages / disadvantages and Real life applications.
i) client server Technology ii) Thin-client Architecture iii) Thick Client Architecture
q3
(a) what are the three rayers of cisco's hierarchical network design?
(b) IPA(drE6s irz-rso o
(3)
(s)
(s)
(s)
(7)
(c)
(d)
Design a network addressing scheme that will supply the minimum number of subnets, and
allow enough extra subnets and hosts for 100%groMh in both areas. Answer the questions
producing your workings.
i) Minimum number of subnets required
ii) Total Number of subnets required with 100% groMh
iii) Number of Host Addresses in largest subnet
iv) Total number of Host Addresses required in largest subnet with 100% growth
v) List down lP address ranges for the newly designed subnets.
Name four (4) tools that can be used to characterize a Network?
why do static and default routing still play a role in many modern network designs?
(3)
(12)
(s)
(s)
lPA.ldrE6s 172.16.0.0
t*ffir,'ffttooLt
.-,*.u *1rT*^on*uo't
$
1
1a
i
t;
ii
11
(Q4) Carefully read the following paragraph and answer the questions with your own assumptions.
Sahana Hospital is located in Colombo, with approximately 500 staff members supporting up to 1000 patients.
The hospital is interested in updating its network (which currently uses equipment from various vendors). The
Hospital has 15 buildings in total on the campus, plus 5 small remote clinics. There are two main hospital
buildings and an auxiliary building. The two main. buildings have seven floors each, with four wiring closets per
floor. The auxiliary building-the Children's Place-is connected to the two main buildings; the switches from
these three buildings are connected with fiber connections in a ring. The Children's Place has three floors, with
Msin 8u*rtlng #1
three wiring closets per floor. The other
12 campus buildings are smaller office
and suppofc facilities, with j.0 to 40
people per building, located on one or
two floors.
The hospital is aggressively expanding its
clinic around the County. Hospital's plan
to enlarge the main campus network is
also under way. The hospital is doing
fairly well financially. lt wants to
selectively deploy cutting-edge
technology for better patient care and
high productivity, Management is tired
of network downtime and slowness
affecting patient care. Network
manageability is important because
Sahana has a tradition of working with
limited support staffs with high
productivity.
The current network uses inexpensive
Srnallar Brrildingg
switches from several vendors, purchased over time. They comply with various standards, depending on when
they were purchased. The switches are not SNMP-manageable,,although a small amount of information is
available frorn each switch via the web or command-line interfacb. Within each of the three main buildings is a
main switch. One floor switch from each floor connects to the main switch. The small outlying buildings have one
or two 24-port switches. One of these connects back to one of the main building switches via fiber. lf there is a
second switch, it connects via the first switch.
Currently, the staff VLAN spans the entire campus. No Layer 3 switching is present. The address space is
172.16.0.0 /16. Addresses are coded sequentially into PCs as they are deployed. Staff members havetried to
deploy DHCP but is not completed yet.
The applications that the organization is currently running include standard office applications, plus some
specialized medical tools running over lP. Radiology, Oncology, and other departments do medical imaging. As
these departments acquire new tools, they are adding real-time motion to the highly detailed medical images,
requiring large amounts of bandwidth. All the new servers are capable of using Gigabit or Gigabit EtherChannel
connectivity
Many servers are currently located in various closets. Many lack uninterrupted power supplies or proper
environrnental controls. A staff member has to roll a tape backup cart to each server closet to back up each
server. There are about 40 centrally located servers in one raised floor "server room," and 30 other servers
distributed around the campus near their users. The server room takes up part of the first floor of Main Building
1, along with the cafeteria and other non-networked areas.
.'T'ffi-'m
H6mda
filniatr
Mat$ Slrildingre
clrildren's PHc€
Sr'|e[ar guilsirrss
Srna{er Sutldicgis
-::
3
n
s
a
e
a
The WAN uses 56-kbps links to three of the remote clinics and dialup connectivity to the other two. The one
router uses static routing that was configured by a previous network designer. The staff members have
frequently complained about slow response times. There appears to be severe congestion of the LAN, especially
at peak hours"
a. List down at least five business goals of Sahana Hospital trying to achieve upgrading their network.
(5)
ldentify at least 5 major user groups of the Hospital Network and create a table with columns User group,
Major Network application they use, Location.
, (s)
The proposed network should achieve technical goals in the categories of Scalability, Availability, Network
performance, Security, Manageability, Usability, Adaptability and Affordability.
(1s)
i) Out of these technical goals list down three most important technical goals as per the case study.
ii) Suggests technical solutions to Sahana Hospital to address each ofthe above selected technical goals.
your answer should include current status of the goal, Technical lmplementations you propose and effect
on the business goals from the proposed technical implementations'
iii) "The hospital is doing fairly well financially'' discuss as a network designer what technical goal you can
trade off with and how it help to achieve better results for other important technical goals,
* *,1.**END:1. ****
IS
o
e
S
s,
el
:r L
fS i'
lg ." Page 3 of 3
rr J^'
,rfsBrlfi
National Schoo! of Business Management
Post Graduate Diploma in Computer Networks-Batch 3
l't Semester Exa mination
Routing and Switching
(PGDCN 1103)
Time:3 hrs 21 December 2OL4
I n st r u cti o ns to co n d i d otes :
o Question Q7 is compulsory.
o Answer 3 questions from Q2 to Q5.
t Electronic Colculotors are ollowed.
Following Q1 is compulsorv.
Ql.Clearly indicate the configurations of the following network together with
t.
il.
ilt.
The redistributions of routes between each routing protocols.
OSPF Virtual Link from Area Zto Area 0
Configurations of all the routers to be included, and finally you should be able to ping
from Router0 to Router6. Assume you are using Cisco equipment.
(40 marks)
_@lF----
I N*,wE:l'iAu.s{,lttot}L
I q:l-,
I ntlsi I'l tisl; lt'i,c l"'{ AG [rir''x ttl!T
.T
Answer three (3) Questions from the followinq questions e2 to e5.
Q2.
l. Briefly explain Routing rnformation Base (RrB) and Forward
interaction with the aid of a diagram.
ll. Briefly explain the following tbchniques to avoid routing loops
lnformation Base (FlB)
(10 marks)
o Split Horizon
o Poison reverse
o Holddown
o Triggered Updates
o Aging of routes from the routing table
Q3.With regards to the Spanning Tree protocol (STp)
l. Briefly explain the followings:
(10 marks)
(10 marks)
a) port Fast
b) Rootguard
c) Loop guard
d) BPDU guard
ll. Describe the rules of the spanning Tree Protocol in a single LAN segment with a single
VLAN -,. (10 marks)
Q4. With regards to the VLAN Trunk protocol(Wp)
l. what are the VLAN Trunk Protocol (VTP) modes of operations? Briefly explain them.
(10 marks)
ll. What is wP Pruning? Why it is necessary for a LAN segment with several VLANs
(10 marks)
Q5.what are the criteria used by routing protocols to select a best route for a given destination?
Briefly explain 3 of them. (20 marks)
,** ** *EN D*****
-3--
fuseai'}'
National School of Business Managernent
Post Graduate Diplorna in Computer Networks_Batch 03
2nd Semester Examination
Network planning lmplementing and Administration
(PGDCN 1103)
r)
Answer All Questions.
Time:3 hrs
22 November 2015
Question 1
a' what are the best practices on designing a corporate computer network & critically evaluateon network security by taking the layered rnodel
b'
$lXH f:T:il::J'0"'gr
it't"
'na
explain rive benerits or imprementing structflI':||lr;
(2 Marks)a' when implement a wireless network what are the best practices that you can appry. stateand explain advantages of a centralized management sybtem to manage and controrwireless access points.
(L0 Marks)
Question 2
Question 3
a' when implementing computer networks, you often have to work with solution vendors(note: sorution vendors, not equipment vendors). Name three pitfails that you may facewhen working with sorution vendors. Exprain how they .rn-n" avoided. (10 Marks)b' ln significantly large projects, you may have to procure the services of a consurtant to
::xu,n::;:trv
anarvze the sorution. state and exprain three advantases of hiring a
(Total- 20 Marks)
(10 Marks)
(Total- 20 Marks)
'a
r.i :
g .:!
:a:. '
.t!
t
i:
. :::
't:
i:: :
7t:,
''
':'
j:. :
?4. .,.
a' A service Level Agreement (sLA)-is a contractual agreement between a customer and avendor for maintenance of a specific entity in .n org.iirution. state and explain five benefitsan organization achieves by having an SLA with a u"ndor.
b' A modern tendency is for organizations to obtain managed services, *n.rtor';jXtJ",organization undertakes the complete ownership and maintenance of equipment instaged bythem' List and describe five benefits of the managed services model. (10 Marks)
euestion 4 (Total_ 20 Marks)
a'
:fi:i:rT"
term Business continuitv Planning. How does it differ from Disaster Recovery
b' How does cloud computing help an organization to achieve business .on,,n.jl,#'llo',r,.three drawbacks of using a cloud computing service for an organization. (5 Marks)c' Analyze Data center best practices for an oiganization ..n .ppty and follow. (g Marks)
euestion S (Total_ 20 Marks)
a'
fl::t:i:"
benefits of cloud computing giving exampres in each croud computing service
b' A large organization mav use a Network operations centre (Noc) to monitor :lXH[:"routine activities in a network' Under what circumstances would an organization decide toimplement a Noc? Evaluate three benefits of having a Noc in an organizr;;.' (10 Marks)
(Total_ 20 Marks)
t*x*jNEnd
of the paper*****
/,.l'iij,':;,',,'.."}iiii}i,
Answer A11 Questions
National School of Business Management
Postgraduate Diploma in Computer Networks-Batch
Semester 1
Voice and TelePhonY Technologies
(PGDCN12o5)
Time: 03Hrs
tB January 2015
1. (A) ExPlain in
PBX.
brief 4 (fo1r) criteria which must be evaluated before niigrating from iegacy PBX to an IP
Q Marks)
(6 Marks)
(5 Marks)
(B) A CISCO irnplementation of a VoIP network had certain parameters set in IOS as shown beiow.
(a) 6G.T2gvoicepacket ot20bytes isgeneratedeveryl0rns. Buteachfra,meconsistsof two(2) such
packets of a total of 80 bytes (after adding payload)
There is an initiai "lookahead" delay of Sm's for each packet'
There is a possible queuing clelay of 4m; in the 128kbps trunk'
Network cielay of 1ms it a private trtink line is used, and 8rns if public frame relay network is used
for WAN connectivitY.
(e) 50nr,s at the de-jitter buffer'
Answer parts (i)-(iv) taking this data into account'
(i) Caiculate the serialization delay. Q Marks)
(ii) Calculate tlte "fixed" delay encouutered by a VoIP call' (3'5 Ma'rks)
(iii)Calcuiatethe..variable,,delayencounteredbyaVolPcall.(3.5Marks)
(iv) It is notecl that the ,,header size" of each frame is twice that of the "payload", which has resulted
in higher serialization delay. What is the remedy that you can take for this issue? Are there any
negative side-effects in the mechanism that you propose? (5 Marks)
(c) A volp cail which terminated at a PSTN client (B-party is PSTN side) was noticed to have ettrernelu
,oor quatity. The trace file extractecl from the call, wherr analyzed revealed that it was ronted through
u CSfrA rretwork. Expiain in brief possible reason(s) for the poor quaiity' (5 IUIarks)
2 (A) (i) trxplain in brief 4 (four) disadvantages with regard to deploying an IP based phone system over a
. traditional pBX system for a business organization with-an existing PBX solution. (5 Marks)
(ii) Explain in brief the use of:
(a) trXO (foreign exchange card)
(b) PoE modules for layer-3 srvitches (wiih a suitable diagram)
(iii) What are the ma.ior diffetences between H'323 and SIP?
(B) A G729 cod.ec produces encoderl bits at the rate of 8l{bps. The payload is 20 bytes and when c'RTP
is used the compressed lp/uDp/Rrp header sizeis2 bytes. Multilink Point-to-Point Protocol (MP)
aclcls a 6 byte heacler in front of IP header. Calculate the ba'ndwidth per cail' (9 Marks)
3. (a) Draw a ciiagram showing the equipment used for Digital Subscriber Loop (D,9I) connectivitv for a VoIP
gateway. Label the equipments clearly and explain their functionality in brief. (5 Marks)
(b) Show with the tise of diagram, if necessary how D,Str obtains higher data rate transmission using higher
orcler rnoclulation schemes as opposed to legacy 56k dial up rnodems. (5 Marks)
(c) Explain the effect of,
i. Distance
ii. CopPer wire thickness
(b)
(.)
(d)
on ADSL performance (data rate)'
(cl) Explain in brief the clifference between I{DSL arfi ADSL (use diagrams if necessary).
F1,4.I t { } i.,1 rr. {, -!{'i irJcL
,t ';,
! ;'
(5 Marks)
(5 Marks)
(e) For a particular ADSL modem at custoraer preniises, the following status information was letrieved.
ADSL Firmware Version: 4.01 .00.00 - 1.01.00.00 - 1.01.00.00.A.rurex A - 01.06.06 - O.49
Modulation Multi-mode
Annex Mode ANNEX-A
Max Tx Power -38 dBm/Hz
Item Doi^rnstream UPstream Unit
SNR Margln 30
Line Attenuation 20
6dB
27 dB
Data Rate 1536 256 kbPs
Calculate the minirnum received signal.level (Rrrntn) for 1536l,bps connectivity {5 Marks)
4. Best-in-class design states that "no more than 75% of your bandwidth should be used for voice traffic, so as
to not to starve data traffrc". A compressed voice caLl takes 3l.2kfus of bandwidth.
(a) For an El line of bandwidth 2.048Mbps what is the maximum number of simultaneous calls that ca1
be carried, if there is to be no blocking? (l Marks)
(b) If a grade of service (Go.9) of 1% is required, how muclt traffic (in Erlangs) cau be carried over with
this link?
Note: (Jse the graph shown i,n the Append.ir. Marle the releuant trffic in the chart. (6 Marks)
(c) How much traffic carl an EI-PRI link can carry with l% GoS? (6 tularhs)
(d) If you are given the option of selecting between a leg-ac1 PBX with EI'PRI connectivity and the above
Ip pBX with El trunk connectivity, for 1% GoS, which one should you choose ? Give reasons.
Note that EI-PRI is more expensiue than 0,n El di,gital trunk. ( I Marks)
(e) Explain i1 brief a1 advantage and disadvantage in taking the "average traffic interrsity" for traffic
calcllations rather than "busy hour traffic intensity". ( 5 Marks)
end oJ paper.
Appendix
l;1s 2n 60 q0
Numberotchennols 2 $ . 5 I 7Bs10t, 16& 30 1650 m!
0.,
I , ' :' -,
{ :' ,,' !'lTiirl ili-i--il lilll
Li Ii;,i ;l:!iiilJ iii/riij:
i
//i/i/ i,i i,ri
i,l",r'iiiiliiiiiilij,
s i , ! iiliiii!;liijj;
E i ':' i lliili1 l;;ri iiri
b i ,' ; t iiitit i|li jii,
p
./,
t,
E
.o
/ /t,/tl ir
iijjlrll
illi
lrIi;l:
i i rlb 0.01 t
6t;(ul,.o l!
o t1'
Lb,
li
iijj
!i
jijliiiirii
iiiliilillii! I ;!i I i : ! lll
il;liiirllilI i I ri I i ! I j, j
I i,ri i i , illi
rillj r; i itii
ii
| . ii l;ili iriri i iii
i i I!iiili iir,i iiiiiii
-,,,i l' . ! ! ,i.i.i l-i,i Iti i,[i,0.1 1.0 10.0 100.0
Ttaffic inlensity IErlI
Erlang-B Formula, Tbaffic curves with respect to nurnber of channels and blocking probability
end of append,ir,
2
A
EI
:
o
F
t.
t.49 + '.;
},SEE{'
Time:03Hrs
Date: 2nd Aug 2015
National School of Business Management
Post Graduate Diploma in Computer Networks- Batch 03
znd semester Examination
Service Provider Networks
PGDCN 1207
kr)
AS
Answer onlY Four (04) Questions
Electronic Catculators are allowed
br)
bs)
)ve
:al)
frs)
itlr
i,s)
Ac
tt, )
Ql..
Q2.
Q3.
b.
a. Enterprise networks are generally modeled in three layers. List and explain functionality
of each layer. (10 marks)
ln the focus of service provider models, discuss briefly the meaning of provider edge.
(5 marks)
Explain scalability issues in the Modern lnternet. Discuss the key issues and solutions
proposed to avert them with future modifications targeting these issues.
(10 morks)
What is meant by SLA? Explain how availabiliti is bound to the SLA. (5 marks)
List down at least three parameters, which can be used to measure QoS and briefly
explain each of them. fiO marks)
c. Assume that you are the Systems manager of a mid scale lT company in Sri Lanka and
want to obtain a leased line for your co-operate needs. Discuss the items that you would
consider including in to the SLA, with reasoning in order to achieve your organization
goals. (10 marks)
Compare the ITU Telecommunications Management Network (TMN) and IETF POLICY
a.
b.
framework.
what is meant by Routing Policy specification Language (RPSL)?
(5 marks)
(5 marks)b.
c. Explain Advertising/Export Policies and Acceptance/lmport Policies. Explain how the
preference among routing information sources is achieved. (70 morks)
d. Highlight the importance of security policies while discussing the purpose and objectives
of them. (5 marks)
:i{"1ti}ix.
,.., ./'. !: r'.f l: lnl'I'
gp"i {ti.,rr''r rh"1
Page X of 2
Q4.
Qs.
Explain the concept of grooming. Using an example and/or a diagram explain why
grooming can cause issues when done automatically or carelessly. (lS morks)
What ii meant by a Media Gateway and the use of it? Describe the gateway architecture
explaining the functionalities of each plane. (70 narks)
a. Briefly describe the similarities and dissimilarities of IBGP and eBGp. (S morks)
b. Explain the terms Multilinking and Multihoming. Give example scenarios where you can
use either Multilinking or Multihoming or a combination of both. (70 morks)
c. Discuss briefly how load sharing can be achieved using specific lp addressing in BGp.
Give suitable examples and diagrams where necessary. (70 marks)
1,,
Page 2 of 2
'it *
guss&?i
National School of Business Managernent
PGD in Computer Networks - Batch 3
2nd Semester Examinatlon
Network Operations
PGDCNl2O8
ry
Time:03Hrs
29 November 2015
I nstru ctio n s for co nd id ate s;
7. Answer ony Four {4) questions only.
2' use diagroms and include exomples when exploining your answers whenever possible.
1,.
a_
b.
what is a network operating system, how does it differs from a desktop operating
system? Explain using examples and indicating 5 features of a Network operatingiystem.
(5 marks)
A process is a program in execution in a computer,s memory. Analyze the steps of theprocess execution Life cycle, indicating the process states in a diagram. (10 marks)
Multitasking enhances the speed of process execution. compare and contrast the two
types of multitasking using a diagram. (10 marks)
{Total- 25 marks}
what is Network Binding? Explain using components used to do binding. you may use a
diagram to explain binding. (10 marks)
Port is a common concept in computer Networking. Recognize port characteristics and
the reasons for using ports. (5 marks)
what is a socket in computer Networking? A socket goes through several states in its life
span. Evaluate socket life cycle using its sates. Draw-qdiagram siowing the
interconnections of various states of the socket life cycle. ( 10 marks)
(Total- 25 marks)
2.
c.
a' ldentify the main components of a cPU. show the interconnection between the
components, RAM and ROM using a diagram. (7 marks)
Modern computer Processors architecture is based on lnstruction set Architecture (lsA).
what is the lnstruction set of a processor? Examine its functionality giving ., Llr, i ilr,",it perform.
(10 marks)
what are crsc and Rrsc computer architectures? compare and contrast the twoarchitectures indicating the key differences and the role of the compiler and how itaffects the programmer. Give exampres for Rrsc and crsc processors. (g marks)
(Total- 25 marks)
b.
3.
b.
4.SupercomputersandMainframecomputerareexamplesofcentralizedsystemsbutnotusedfor
general purpose computing' They are used for special purposes only'
a.Explain5characteristicsofSuperComputersand5characteristicsofMainframe
Computers.Compareandcontrastthekeydifferencesbetweenthetwoarchitectures.(10 marks)
b.WhatisThinClientComputing?RecognizeThinClient3.tierArchitectureusingadiagram
indicatingthe3-tierscrearry.
i K€uu''tttac rlrrrr v're"-- -'-
(5marks)
c.RedundantArrayoflnexpensive/lndependent.Disks,RAlDtechnologyisawayofachieving
fault tolerance at hardwrr" r"r"r. iualuate Raid Levels 0' 1- & 5 explaining the features'
minimum disk requirements unfin *t,rt types of systems we can
""t?:[i- [t#lt*]'
5.PlanningascalablenetworkisnotaneasytaskaSmostofthenetworksgrowbiggerwiththe
time as the requirements change'
a. Describe 4 reasons why we need to create larger networks. Mentions 4; ways to stretch or
expand network capabilities'
:sv rv v' ---- ' " ( B marks )
b.Recognize3deviceswhichwecanusetoexpandorconnectdifferentnetworks.You
shouldmentionthebasictun.tion,ritvofeachdeviceverybriefly.(gmarks)
c.WANsareoftenconstructedbylinkingLANs.Connectionsareestablishedusing
communicationlinestromrspso'.t"t"-.o*providers.Evaluate3typesofcommunication
linesyoucanusetoconnecttwoLANs.Theanswershouldincludefeatures,advantages(8 marks)
Briefly Explain 5 benefits of using virtualization in modern computing (5 marks)6.
a.
b.
C.
Recognize the two types of Hypervisors available' You mav use a diagra*'" o[TTn5"
answer.
whatisoversubscriptioninVirtualization?EvaluateYouranswerusingasuitable
component (such as *t'"'VlCpU)which can be oversubscribed' ( 5 marks)
CompareandcontrastFullVirtualization(HardwareAssistedVirtualization)vsPara-
Virtualization indicating the kev requirements needed in each environmll'-
!i'#lt[s,'
d.
*r.***End of the paper*****
PageZ ol 2
.$
SAaqh * .,;i
rubSdg"racJuS#.jr
National School of Business Management
Postgraduate Diploma in Computer Networks _ Batch 03
2nd Semester Examination
Network Security
PGDCN 1309
Answer any five (05) questions.
Time:03Hrs
26 July 2015
Question 1
(a) Describe the three elements depicted by the clA triangle pertaining to network security, with
examples. (g Marks)
(b) Describe the term AAA, in relation to controlling access to computing resources of an
organization. (6 Marks)
(c) Explain how two-factor authentication enables an organization to enforce better security.
(5 Marks)
(Total20 Marks)
Question 2
(a) Explain the following principres in imprementing rr security in an organization
(i) Least privilege principle
(ii) Defense in-depth principle
(12 Marks)
(b) Explain two practical difficulties that may arise,
medium business.
Question 3
(a) Describe the term buffer overflow and how attackers utilize buffer overflow to attack systems
(10 Marks)
(b) Explain two key vulnerabilities present in the sMTp protocor and describe measures that can
be taken by mail server administrators to prevent the exploitation of these vulnerabilities
Question 4
(10 Marks)
(Total20 Marks)
Explain the security risks in the following modern tendencies in organizations and explain how these
risks can be overcome.
(a) Cloud computing
(b) Big data
(c) BYOD (Bring your own device)
(d) lnternet of things
(5 Marks each)
(Total20 Marks)
t"{",t 1'i{*i'{,! {' Si:ll i${}L
t )' {.'
i1: r :- . l| ri l, a;' ltJ'tl
in implementing the above principles in a small or
(8 Marks)
(Total20 Marks)
::
,r
)fZ
Page 1 of 2
euestion 5 . . !1, ^^ ^v-6nla (5 Marks)
(a) What is Social Engineering? Explain with an example'
(b) Explain two key ,i"p, tt.,,t can be taken to prevent your company,s employees being
subjected to social engineering attacks' ,.
(5 Marks)
(c) Describe h"*;;; follJwing TCP/IP attacks are carried out
(i) Xmas Tree Attack
(ii) TeardroP Attack
(5 Marks each)
(Total20 Marks)
"'",:1":;,ain the process of carrying out penetration a penerrarion test in an organittt'o1ro
Marks)
(b)Whataretheprerequisitesandtoolsrequiredtocarryoutapenetrationtest(5Marks)
(c) Once a penetration test is completed' what should be done by the
(i) penetration tester and (5 marks)
(ii) Owner of the organization (Total 20 Marks)
{.***,FEnd of the paper**x**
Page 2 of 2
-&
ffisffissiNational School of Business Management
Postgraduate fliploma in computer Netwo.tir - llatch CIz & 03
s)
(s)
'ks)
2nd SemesteiExarnination
Disaster Recovery and High availabi nrques
Answer AII Questions
Time:03Hrs
Date: 24 May 2015
Question 0I
In the IT subsystem, disaster recovery is not the same as high availability
i' compare and contrast the use of High Availability Systems and Disaster Recovery
Solutions in business and IT operations. (5 Marks)
Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be
considered when designing, manufacturing, purchasing or using a computer product or
component.
ii' Distinguish key characteristics between Reliability, Availability, and Serviceability
with reference to High Availability and Disaster Recovery planning in modern day
business otganizations. Support your answer with appropriate examples. (5 Marks)
iii' Explain RTo and RPo in your own words and describe the imponun." of correctly
identifying them for each business function/ process/ system. (05 Marks)
iv' when it comes to High Availability why do we take two approaches on Hardware and
Software (e.g. Operating Systems level) separately? (10 Mark$
Question 02
As the IT manager, you need to evaluate technology options for reliably hosting a business
critical ERP Solution, which is interfaced to external custome., trr.orgr, an e-commerce
platform.
The top management has indicated that the ERP must be available 99.99% and maximum
tolerable downtime as 2 hours and maxirnum tolerable data loss as 30 minutes. As the ITManager, you need to strike a balance between the Total cost of ownership and complexity ofoperation.
Briefly explain your solution of choice, indicating the following.
i. System Landscape
ii. Solution Diagram
iii. Preferred Technologies
,,e2of2
Page I of2
(25 Marks)
,, {rt"5
x: e,i'a-r r '
Question 03 u--
Business Continuity and.Disaste'.1:::l*y mu't t key priority and owned and sponsored by
;h.,;;;*agement of the organization' . - t1^^+i-,,*r, ,nrr T)isaster R
i Identifv four (04) driver' to1.P:::X.:,?IIHlLfli' 3..T:tiJrfi;:;'T'
1n an
lffix:'flr,T11, fll-:ffiil;id;;;"*:1.s/description
for each (0 5 Marks)
Elaborate o, pro#il "il;; ,o
,grJ.t",t
iontinuity in your organization/
Environment and o';;l;t "
p'#'i^d #;f ; $ive) with reasons for their ranking'
State your risk scorrig me*roaotogy as well' (10 Marks)
r organizalion' Provi
you are the team rJ;f;ffi;;#'R".";;;y et*ning in vo* organization' Provide a
narrativeastohowyouwouidcarryoutthe"BusinesslmpactAnalysis'(10Marks)
Question 04
ITServiceManagementmainlyfocusedondaytodayoperationsandhandlingofincidentsin
the organization'
i. what is the relevant of IT Services Management to High Availability and Disaster
RecoverY aPProach? (05 Marks)
ii. Brietlv ai'""' ttte impottan'"J
"t:"::-?ll:":
*unugement (Configuration Items
Database - CIDB) with other IT service management areas such as incident
managemerrt,problemmanagemerrt,changernanagementandreleasemanagement
and the relevance with Highlivailauility and Disastet Recovery' (08 Marks)
iii. What are the kev consid"'"tt"" i*"
lt'?l]]*ltd
when designing a data center with
High A;;i;iritv *a Disaster Recovery solutions for a business organization
operatingaclossmultiple*"*,*n'",u",9,.theworld?Youranswermustinclude
locationredundancy,suppottinfrastructuresuchaselectricityandairconditioning,
and PhYsical securitY' (12 Marks)
-End of Examination PaPer-
a'a
4,.
:::
PageZ of2

More Related Content

What's hot

Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application PerformanceShumon Huque
 
6 Switch Fabric
6 Switch Fabric6 Switch Fabric
6 Switch FabricFNian
 
the transport layer
the transport layerthe transport layer
the transport layertumetr1
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)Harish Chand
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing marwan aldulaimy
 
Enabling the transition from CSP to DSP with B/OSS transformation
Enabling the transition from CSP to DSP with B/OSS transformationEnabling the transition from CSP to DSP with B/OSS transformation
Enabling the transition from CSP to DSP with B/OSS transformationJames Crawshaw
 
Pakistan telecommunication company limited assignment
Pakistan telecommunication company limited assignmentPakistan telecommunication company limited assignment
Pakistan telecommunication company limited assignmentAli Shah
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LANRaj vardhan
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP ModelAbir Junayed
 
Implementation of Knowledge management
Implementation of Knowledge managementImplementation of Knowledge management
Implementation of Knowledge managementfalak nawaz
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer networkAnil Pokhrel
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
Standard organisations in data communication and networking
Standard organisations in data communication and networking Standard organisations in data communication and networking
Standard organisations in data communication and networking Maheshwari Das
 

What's hot (20)

Home Rf
Home RfHome Rf
Home Rf
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
6 Switch Fabric
6 Switch Fabric6 Switch Fabric
6 Switch Fabric
 
the transport layer
the transport layerthe transport layer
the transport layer
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
Expert systems
Expert systemsExpert systems
Expert systems
 
Enabling the transition from CSP to DSP with B/OSS transformation
Enabling the transition from CSP to DSP with B/OSS transformationEnabling the transition from CSP to DSP with B/OSS transformation
Enabling the transition from CSP to DSP with B/OSS transformation
 
Pakistan telecommunication company limited assignment
Pakistan telecommunication company limited assignmentPakistan telecommunication company limited assignment
Pakistan telecommunication company limited assignment
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Expert system (mis)
Expert system (mis)Expert system (mis)
Expert system (mis)
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
 
Network software
Network softwareNetwork software
Network software
 
Implementation of Knowledge management
Implementation of Knowledge managementImplementation of Knowledge management
Implementation of Knowledge management
 
Osi model
Osi modelOsi model
Osi model
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Standard organisations in data communication and networking
Standard organisations in data communication and networking Standard organisations in data communication and networking
Standard organisations in data communication and networking
 

Viewers also liked

Viewers also liked (9)

Actividad01
Actividad01Actividad01
Actividad01
 
HADRFINAL13112016
HADRFINAL13112016HADRFINAL13112016
HADRFINAL13112016
 
Lo básico del voleibol
Lo básico del voleibolLo básico del voleibol
Lo básico del voleibol
 
e12tim33
e12tim33e12tim33
e12tim33
 
Cuadro de mando integral, 2da ed. - Robert S. Kaplan & David P. Norton
Cuadro de mando integral, 2da ed. - Robert S. Kaplan & David P. NortonCuadro de mando integral, 2da ed. - Robert S. Kaplan & David P. Norton
Cuadro de mando integral, 2da ed. - Robert S. Kaplan & David P. Norton
 
Proceso para la elaboración de pieza cerámica
Proceso para la elaboración de pieza cerámicaProceso para la elaboración de pieza cerámica
Proceso para la elaboración de pieza cerámica
 
bagaimana otak berfikir
bagaimana otak berfikirbagaimana otak berfikir
bagaimana otak berfikir
 
BAGAIMANA OTAK BERFIKIR
BAGAIMANA OTAK BERFIKIRBAGAIMANA OTAK BERFIKIR
BAGAIMANA OTAK BERFIKIR
 
Bagaimana otak berfikir aina
Bagaimana otak berfikir ainaBagaimana otak berfikir aina
Bagaimana otak berfikir aina
 

Similar to All nsbm exam papers

Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Yasir Bashir
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questionsvaidheeswari
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPVLSICS Design
 
ccna is the best certification in the industry
ccna is the best certification in the industryccna is the best certification in the industry
ccna is the best certification in the industryArifAhmad647254
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]Avijit Nath
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)ateeq85905
 
A ULTRA-LOW POWER ROUTER DESIGN FOR NETWORK ON CHIP
A ULTRA-LOW POWER ROUTER DESIGN FOR NETWORK ON CHIPA ULTRA-LOW POWER ROUTER DESIGN FOR NETWORK ON CHIP
A ULTRA-LOW POWER ROUTER DESIGN FOR NETWORK ON CHIPijaceeejournal
 
Simulating the triba noc architecture
Simulating the triba noc architectureSimulating the triba noc architecture
Simulating the triba noc architectureijmnct
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Dân Chơi
 

Similar to All nsbm exam papers (20)

Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
 
1st Semester M Tech Computer Science and Engg (Dec-2013) Question Papers
1st Semester M Tech Computer Science and Engg  (Dec-2013) Question Papers 1st Semester M Tech Computer Science and Engg  (Dec-2013) Question Papers
1st Semester M Tech Computer Science and Engg (Dec-2013) Question Papers
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
 
Module 3 INTERNET OF THINGS
Module 3 INTERNET OF THINGSModule 3 INTERNET OF THINGS
Module 3 INTERNET OF THINGS
 
ccna is the best certification in the industry
ccna is the best certification in the industryccna is the best certification in the industry
ccna is the best certification in the industry
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
A ULTRA-LOW POWER ROUTER DESIGN FOR NETWORK ON CHIP
A ULTRA-LOW POWER ROUTER DESIGN FOR NETWORK ON CHIPA ULTRA-LOW POWER ROUTER DESIGN FOR NETWORK ON CHIP
A ULTRA-LOW POWER ROUTER DESIGN FOR NETWORK ON CHIP
 
Simulating the triba noc architecture
Simulating the triba noc architectureSimulating the triba noc architecture
Simulating the triba noc architecture
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers
 
Ip Subnet Design
Ip Subnet DesignIp Subnet Design
Ip Subnet Design
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

All nsbm exam papers

  • 1. t 1i ?:. ,' ..1 't- ,! l'tSemester of the Examination Network Models & tP Module Code PGDCN 1102 This question paper contains six (6) questions. Answer any four (4) q All questions carry equal mark. (or1 (1) Explain the role of a reference model and why it resembles a layered approach (5 Marks) (2) Explain the structure of the oSl model in terms of function and pDU,s in each layer (74 Marks) (3) Draw the structure of a data frame and explain its function (6 Morks) (oz1 (1) ldentify one main feature and one device in each of the 3 layers in the Cisco hierarchical model and explain why the distribution layer is considered the SMART layer compared to the access and core layers (S Marl<s) (2) Discuss three main benefits of using a hierarchical network model approach in network design (G marks) (3) ln a hierarchical model what is the difference between the logical layout and the physical layout? (5 Marks) (4) Discuss the traffic flows that have to be considered in hierarchical network design and explain the importance of such an analysis. fi Marks) (5) what is meant by "tJser communities' andlyses" in network design? (2 Morks) (ol1 (1) Find the subnet address, broadcast address, CtDR (/) notation, the following (S Marks) a. lP address - 193.i.65.33.41 Mask - 255.255.255.224 b. lP address - 10.236.73.21 Mask * 255.255.0.0 and address range of Page 1 of 3
  • 2. (a4) (2) Assume that you have been given a class C block to create subnets. Depending on the number of bits used for the subnet, fill in the following table (74 Marks) No. of bit used for the subnet Subnet mask CIDR No. of subnets No. of hosts per subnet (3) Which of the following can be a beginning address of a subnet block that contains L6 possible lP addresses (3 Marks) a.205.L6.37.32 b. 190.L6.42.44 c. 17.17.33.80 d. 1-23.45.24.t60 Briefly Explain the difference between concepts of subnet and supernet with the help of suitable diagrams (6 Mqrks) A supernet has a first address of 205.L6.32.0 and a supernet mask of 255.255.248.0. How many blocks are in this supernet considering a default mask of 124 and what is the range of possible addresses? (4 Marks) An lSp is granted a block of addresses starting with 203.115.0.0/16. The ISP needs to distribute these addresses to three groups of customers as follows (Note: No need to provide provisions for future growth) : a. The first group has 64 customers; each needs 252 addresses' b. The second group has 128 customers; each needs 124 addresses. c. The third group has 128 customers; each needs 60 addresses. (1) (2) (3) Design the subnet blocks as Per the last subnet for each group, subnet each group (75 Morks) given requirement. Clearly indicate the first and mask, and the number of addresses allocate for
  • 3. (as) A transportation company is given the lP block 1.50.0.12.0/24 and has the following requirements: a. Marketing department with 50 computers b. Finance departments with 14 computers c. Adrninistration department has 30 computers d. 2 logistics departments are extended from two point to point links e. Each logistic department has B computers (1) Design the subnets from the given block using variable length subnet masking techniques (VLSM) for the departments and the point-to-point links indicating clearly the subnet address, mask, and the address range for each subnet (27 Marks) (2) Draw a conceptual design indicating the subnets connected via three routers and switch distribution layer of the design in carried out above(4 Marks) (oe1 Write comprehensive discussions on any3 of the following topics. lnclude clear definition of concepts, applications, advantages and disadvantages for each ' discussion (25 Morks) (1) ls a 32 bit address space sufficient for lnternet Protocol (tp) in future? (2) Network Address Translation (NAT) (3) Route summarization (4) DMZ in an enterprise network (5) lPva Header (6) Distance vector Vs Link state routing f*."-* Page 3 of 3
  • 4. . :t #sfitrftd.rNational School of Business Management Postgraduate Diploma in Computer Network_Batch 03 1.t Semester Examination Computer Network Design PGDCN 1101 Answer Q4 and other Two (02) euestions. Time:03Hrs 03 January 2015 Q1 (a) List down three main types of Computer Network design (b) what are the 6 main phases of network design ,, pur ih" top-down network design approach?(c) "Focus on Layer 7 dnd obovefirst', (i) Explain the above statement on computer network designing approaches in your own words. (ii) Compare the above statement with the methodology presented in Top Down Design approach. (d) Many network design tools and methodologies that have been used resemble the ,,connect-the- dots" game. Explain the drawback of this methodology. {e) write down short notes on one (01) of following topics with regard to Network Design i) 80 /20 rule ' ii) Management View iii) Technical View Q2 Networks are usually classified using three properties namely Topology, protocol & Architecture.(a) List down Four (04) main benefits of computer Networking . r -'-ot ' q nr urrr (3)(b) Name 4 variations of computer network toporogies with a schematic diagrams. (5) ,., [jilj;,]r:T:j,:rrtocat,,? Describe with yourown words and provide three examptes for (s) ,', nrrf"H::Lr ,0, characreristics for each of peer-to peer and ctient server network (s) (e) write a short note on one (01) of the followings. Your note should address basic features, (7)advantages / disadvantages and Real life applications. i) client server Technology ii) Thin-client Architecture iii) Thick Client Architecture q3 (a) what are the three rayers of cisco's hierarchical network design? (b) IPA(drE6s irz-rso o (3) (s) (s) (s) (7) (c) (d) Design a network addressing scheme that will supply the minimum number of subnets, and allow enough extra subnets and hosts for 100%groMh in both areas. Answer the questions producing your workings. i) Minimum number of subnets required ii) Total Number of subnets required with 100% groMh iii) Number of Host Addresses in largest subnet iv) Total number of Host Addresses required in largest subnet with 100% growth v) List down lP address ranges for the newly designed subnets. Name four (4) tools that can be used to characterize a Network? why do static and default routing still play a role in many modern network designs? (3) (12) (s) (s) lPA.ldrE6s 172.16.0.0 t*ffir,'ffttooLt .-,*.u *1rT*^on*uo't
  • 5. $ 1 1a i t; ii 11 (Q4) Carefully read the following paragraph and answer the questions with your own assumptions. Sahana Hospital is located in Colombo, with approximately 500 staff members supporting up to 1000 patients. The hospital is interested in updating its network (which currently uses equipment from various vendors). The Hospital has 15 buildings in total on the campus, plus 5 small remote clinics. There are two main hospital buildings and an auxiliary building. The two main. buildings have seven floors each, with four wiring closets per floor. The auxiliary building-the Children's Place-is connected to the two main buildings; the switches from these three buildings are connected with fiber connections in a ring. The Children's Place has three floors, with Msin 8u*rtlng #1 three wiring closets per floor. The other 12 campus buildings are smaller office and suppofc facilities, with j.0 to 40 people per building, located on one or two floors. The hospital is aggressively expanding its clinic around the County. Hospital's plan to enlarge the main campus network is also under way. The hospital is doing fairly well financially. lt wants to selectively deploy cutting-edge technology for better patient care and high productivity, Management is tired of network downtime and slowness affecting patient care. Network manageability is important because Sahana has a tradition of working with limited support staffs with high productivity. The current network uses inexpensive Srnallar Brrildingg switches from several vendors, purchased over time. They comply with various standards, depending on when they were purchased. The switches are not SNMP-manageable,,although a small amount of information is available frorn each switch via the web or command-line interfacb. Within each of the three main buildings is a main switch. One floor switch from each floor connects to the main switch. The small outlying buildings have one or two 24-port switches. One of these connects back to one of the main building switches via fiber. lf there is a second switch, it connects via the first switch. Currently, the staff VLAN spans the entire campus. No Layer 3 switching is present. The address space is 172.16.0.0 /16. Addresses are coded sequentially into PCs as they are deployed. Staff members havetried to deploy DHCP but is not completed yet. The applications that the organization is currently running include standard office applications, plus some specialized medical tools running over lP. Radiology, Oncology, and other departments do medical imaging. As these departments acquire new tools, they are adding real-time motion to the highly detailed medical images, requiring large amounts of bandwidth. All the new servers are capable of using Gigabit or Gigabit EtherChannel connectivity Many servers are currently located in various closets. Many lack uninterrupted power supplies or proper environrnental controls. A staff member has to roll a tape backup cart to each server closet to back up each server. There are about 40 centrally located servers in one raised floor "server room," and 30 other servers distributed around the campus near their users. The server room takes up part of the first floor of Main Building 1, along with the cafeteria and other non-networked areas. .'T'ffi-'m H6mda filniatr Mat$ Slrildingre clrildren's PHc€ Sr'|e[ar guilsirrss Srna{er Sutldicgis -::
  • 6. 3 n s a e a The WAN uses 56-kbps links to three of the remote clinics and dialup connectivity to the other two. The one router uses static routing that was configured by a previous network designer. The staff members have frequently complained about slow response times. There appears to be severe congestion of the LAN, especially at peak hours" a. List down at least five business goals of Sahana Hospital trying to achieve upgrading their network. (5) ldentify at least 5 major user groups of the Hospital Network and create a table with columns User group, Major Network application they use, Location. , (s) The proposed network should achieve technical goals in the categories of Scalability, Availability, Network performance, Security, Manageability, Usability, Adaptability and Affordability. (1s) i) Out of these technical goals list down three most important technical goals as per the case study. ii) Suggests technical solutions to Sahana Hospital to address each ofthe above selected technical goals. your answer should include current status of the goal, Technical lmplementations you propose and effect on the business goals from the proposed technical implementations' iii) "The hospital is doing fairly well financially'' discuss as a network designer what technical goal you can trade off with and how it help to achieve better results for other important technical goals, * *,1.**END:1. **** IS o e S s, el :r L fS i' lg ." Page 3 of 3
  • 7. rr J^' ,rfsBrlfi National Schoo! of Business Management Post Graduate Diploma in Computer Networks-Batch 3 l't Semester Exa mination Routing and Switching (PGDCN 1103) Time:3 hrs 21 December 2OL4 I n st r u cti o ns to co n d i d otes : o Question Q7 is compulsory. o Answer 3 questions from Q2 to Q5. t Electronic Colculotors are ollowed. Following Q1 is compulsorv. Ql.Clearly indicate the configurations of the following network together with t. il. ilt. The redistributions of routes between each routing protocols. OSPF Virtual Link from Area Zto Area 0 Configurations of all the routers to be included, and finally you should be able to ping from Router0 to Router6. Assume you are using Cisco equipment. (40 marks) _@lF---- I N*,wE:l'iAu.s{,lttot}L I q:l-, I ntlsi I'l tisl; lt'i,c l"'{ AG [rir''x ttl!T
  • 8. .T Answer three (3) Questions from the followinq questions e2 to e5. Q2. l. Briefly explain Routing rnformation Base (RrB) and Forward interaction with the aid of a diagram. ll. Briefly explain the following tbchniques to avoid routing loops lnformation Base (FlB) (10 marks) o Split Horizon o Poison reverse o Holddown o Triggered Updates o Aging of routes from the routing table Q3.With regards to the Spanning Tree protocol (STp) l. Briefly explain the followings: (10 marks) (10 marks) a) port Fast b) Rootguard c) Loop guard d) BPDU guard ll. Describe the rules of the spanning Tree Protocol in a single LAN segment with a single VLAN -,. (10 marks) Q4. With regards to the VLAN Trunk protocol(Wp) l. what are the VLAN Trunk Protocol (VTP) modes of operations? Briefly explain them. (10 marks) ll. What is wP Pruning? Why it is necessary for a LAN segment with several VLANs (10 marks) Q5.what are the criteria used by routing protocols to select a best route for a given destination? Briefly explain 3 of them. (20 marks) ,** ** *EN D*****
  • 9. -3-- fuseai'}' National School of Business Managernent Post Graduate Diplorna in Computer Networks_Batch 03 2nd Semester Examination Network planning lmplementing and Administration (PGDCN 1103) r) Answer All Questions. Time:3 hrs 22 November 2015 Question 1 a' what are the best practices on designing a corporate computer network & critically evaluateon network security by taking the layered rnodel b' $lXH f:T:il::J'0"'gr it't" 'na explain rive benerits or imprementing structflI':||lr; (2 Marks)a' when implement a wireless network what are the best practices that you can appry. stateand explain advantages of a centralized management sybtem to manage and controrwireless access points. (L0 Marks) Question 2 Question 3 a' when implementing computer networks, you often have to work with solution vendors(note: sorution vendors, not equipment vendors). Name three pitfails that you may facewhen working with sorution vendors. Exprain how they .rn-n" avoided. (10 Marks)b' ln significantly large projects, you may have to procure the services of a consurtant to ::xu,n::;:trv anarvze the sorution. state and exprain three advantases of hiring a (Total- 20 Marks) (10 Marks) (Total- 20 Marks) 'a r.i : g .:! :a:. ' .t! t i: . ::: 't: i:: : 7t:, '' ':' j:. : ?4. .,. a' A service Level Agreement (sLA)-is a contractual agreement between a customer and avendor for maintenance of a specific entity in .n org.iirution. state and explain five benefitsan organization achieves by having an SLA with a u"ndor. b' A modern tendency is for organizations to obtain managed services, *n.rtor';jXtJ",organization undertakes the complete ownership and maintenance of equipment instaged bythem' List and describe five benefits of the managed services model. (10 Marks) euestion 4 (Total_ 20 Marks) a' :fi:i:rT" term Business continuitv Planning. How does it differ from Disaster Recovery b' How does cloud computing help an organization to achieve business .on,,n.jl,#'llo',r,.three drawbacks of using a cloud computing service for an organization. (5 Marks)c' Analyze Data center best practices for an oiganization ..n .ppty and follow. (g Marks) euestion S (Total_ 20 Marks) a' fl::t:i:" benefits of cloud computing giving exampres in each croud computing service b' A large organization mav use a Network operations centre (Noc) to monitor :lXH[:"routine activities in a network' Under what circumstances would an organization decide toimplement a Noc? Evaluate three benefits of having a Noc in an organizr;;.' (10 Marks) (Total_ 20 Marks) t*x*jNEnd of the paper***** /,.l'iij,':;,',,'.."}iiii}i,
  • 10. Answer A11 Questions National School of Business Management Postgraduate Diploma in Computer Networks-Batch Semester 1 Voice and TelePhonY Technologies (PGDCN12o5) Time: 03Hrs tB January 2015 1. (A) ExPlain in PBX. brief 4 (fo1r) criteria which must be evaluated before niigrating from iegacy PBX to an IP Q Marks) (6 Marks) (5 Marks) (B) A CISCO irnplementation of a VoIP network had certain parameters set in IOS as shown beiow. (a) 6G.T2gvoicepacket ot20bytes isgeneratedeveryl0rns. Buteachfra,meconsistsof two(2) such packets of a total of 80 bytes (after adding payload) There is an initiai "lookahead" delay of Sm's for each packet' There is a possible queuing clelay of 4m; in the 128kbps trunk' Network cielay of 1ms it a private trtink line is used, and 8rns if public frame relay network is used for WAN connectivitY. (e) 50nr,s at the de-jitter buffer' Answer parts (i)-(iv) taking this data into account' (i) Caiculate the serialization delay. Q Marks) (ii) Calculate tlte "fixed" delay encouutered by a VoIP call' (3'5 Ma'rks) (iii)Calcuiatethe..variable,,delayencounteredbyaVolPcall.(3.5Marks) (iv) It is notecl that the ,,header size" of each frame is twice that of the "payload", which has resulted in higher serialization delay. What is the remedy that you can take for this issue? Are there any negative side-effects in the mechanism that you propose? (5 Marks) (c) A volp cail which terminated at a PSTN client (B-party is PSTN side) was noticed to have ettrernelu ,oor quatity. The trace file extractecl from the call, wherr analyzed revealed that it was ronted through u CSfrA rretwork. Expiain in brief possible reason(s) for the poor quaiity' (5 IUIarks) 2 (A) (i) trxplain in brief 4 (four) disadvantages with regard to deploying an IP based phone system over a . traditional pBX system for a business organization with-an existing PBX solution. (5 Marks) (ii) Explain in brief the use of: (a) trXO (foreign exchange card) (b) PoE modules for layer-3 srvitches (wiih a suitable diagram) (iii) What are the ma.ior diffetences between H'323 and SIP? (B) A G729 cod.ec produces encoderl bits at the rate of 8l{bps. The payload is 20 bytes and when c'RTP is used the compressed lp/uDp/Rrp header sizeis2 bytes. Multilink Point-to-Point Protocol (MP) aclcls a 6 byte heacler in front of IP header. Calculate the ba'ndwidth per cail' (9 Marks) 3. (a) Draw a ciiagram showing the equipment used for Digital Subscriber Loop (D,9I) connectivitv for a VoIP gateway. Label the equipments clearly and explain their functionality in brief. (5 Marks) (b) Show with the tise of diagram, if necessary how D,Str obtains higher data rate transmission using higher orcler rnoclulation schemes as opposed to legacy 56k dial up rnodems. (5 Marks) (c) Explain the effect of, i. Distance ii. CopPer wire thickness (b) (.) (d) on ADSL performance (data rate)' (cl) Explain in brief the clifference between I{DSL arfi ADSL (use diagrams if necessary). F1,4.I t { } i.,1 rr. {, -!{'i irJcL ,t ';, ! ;' (5 Marks) (5 Marks)
  • 11. (e) For a particular ADSL modem at custoraer preniises, the following status information was letrieved. ADSL Firmware Version: 4.01 .00.00 - 1.01.00.00 - 1.01.00.00.A.rurex A - 01.06.06 - O.49 Modulation Multi-mode Annex Mode ANNEX-A Max Tx Power -38 dBm/Hz Item Doi^rnstream UPstream Unit SNR Margln 30 Line Attenuation 20 6dB 27 dB Data Rate 1536 256 kbPs Calculate the minirnum received signal.level (Rrrntn) for 1536l,bps connectivity {5 Marks) 4. Best-in-class design states that "no more than 75% of your bandwidth should be used for voice traffic, so as to not to starve data traffrc". A compressed voice caLl takes 3l.2kfus of bandwidth. (a) For an El line of bandwidth 2.048Mbps what is the maximum number of simultaneous calls that ca1 be carried, if there is to be no blocking? (l Marks) (b) If a grade of service (Go.9) of 1% is required, how muclt traffic (in Erlangs) cau be carried over with this link? Note: (Jse the graph shown i,n the Append.ir. Marle the releuant trffic in the chart. (6 Marks) (c) How much traffic carl an EI-PRI link can carry with l% GoS? (6 tularhs) (d) If you are given the option of selecting between a leg-ac1 PBX with EI'PRI connectivity and the above Ip pBX with El trunk connectivity, for 1% GoS, which one should you choose ? Give reasons. Note that EI-PRI is more expensiue than 0,n El di,gital trunk. ( I Marks) (e) Explain i1 brief a1 advantage and disadvantage in taking the "average traffic interrsity" for traffic calcllations rather than "busy hour traffic intensity". ( 5 Marks) end oJ paper. Appendix l;1s 2n 60 q0 Numberotchennols 2 $ . 5 I 7Bs10t, 16& 30 1650 m! 0., I , ' :' -, { :' ,,' !'lTiirl ili-i--il lilll Li Ii;,i ;l:!iiilJ iii/riij: i //i/i/ i,i i,ri i,l",r'iiiiliiiiiilij, s i , ! iiliiii!;liijj; E i ':' i lliili1 l;;ri iiri b i ,' ; t iiitit i|li jii, p ./, t, E .o / /t,/tl ir iijjlrll illi lrIi;l: i i rlb 0.01 t 6t;(ul,.o l! o t1' Lb, li iijj !i jijliiiirii iiiliilillii! I ;!i I i : ! lll il;liiirllilI i I ri I i ! I j, j I i,ri i i , illi rillj r; i itii ii | . ii l;ili iriri i iii i i I!iiili iir,i iiiiiii -,,,i l' . ! ! ,i.i.i l-i,i Iti i,[i,0.1 1.0 10.0 100.0 Ttaffic inlensity IErlI Erlang-B Formula, Tbaffic curves with respect to nurnber of channels and blocking probability end of append,ir, 2 A EI : o
  • 12. F t. t.49 + '.; },SEE{' Time:03Hrs Date: 2nd Aug 2015 National School of Business Management Post Graduate Diploma in Computer Networks- Batch 03 znd semester Examination Service Provider Networks PGDCN 1207 kr) AS Answer onlY Four (04) Questions Electronic Catculators are allowed br) bs) )ve :al) frs) itlr i,s) Ac tt, ) Ql.. Q2. Q3. b. a. Enterprise networks are generally modeled in three layers. List and explain functionality of each layer. (10 marks) ln the focus of service provider models, discuss briefly the meaning of provider edge. (5 marks) Explain scalability issues in the Modern lnternet. Discuss the key issues and solutions proposed to avert them with future modifications targeting these issues. (10 morks) What is meant by SLA? Explain how availabiliti is bound to the SLA. (5 marks) List down at least three parameters, which can be used to measure QoS and briefly explain each of them. fiO marks) c. Assume that you are the Systems manager of a mid scale lT company in Sri Lanka and want to obtain a leased line for your co-operate needs. Discuss the items that you would consider including in to the SLA, with reasoning in order to achieve your organization goals. (10 marks) Compare the ITU Telecommunications Management Network (TMN) and IETF POLICY a. b. framework. what is meant by Routing Policy specification Language (RPSL)? (5 marks) (5 marks)b. c. Explain Advertising/Export Policies and Acceptance/lmport Policies. Explain how the preference among routing information sources is achieved. (70 morks) d. Highlight the importance of security policies while discussing the purpose and objectives of them. (5 marks) :i{"1ti}ix. ,.., ./'. !: r'.f l: lnl'I' gp"i {ti.,rr''r rh"1 Page X of 2
  • 13. Q4. Qs. Explain the concept of grooming. Using an example and/or a diagram explain why grooming can cause issues when done automatically or carelessly. (lS morks) What ii meant by a Media Gateway and the use of it? Describe the gateway architecture explaining the functionalities of each plane. (70 narks) a. Briefly describe the similarities and dissimilarities of IBGP and eBGp. (S morks) b. Explain the terms Multilinking and Multihoming. Give example scenarios where you can use either Multilinking or Multihoming or a combination of both. (70 morks) c. Discuss briefly how load sharing can be achieved using specific lp addressing in BGp. Give suitable examples and diagrams where necessary. (70 marks) 1,, Page 2 of 2
  • 14. 'it * guss&?i National School of Business Managernent PGD in Computer Networks - Batch 3 2nd Semester Examinatlon Network Operations PGDCNl2O8 ry Time:03Hrs 29 November 2015 I nstru ctio n s for co nd id ate s; 7. Answer ony Four {4) questions only. 2' use diagroms and include exomples when exploining your answers whenever possible. 1,. a_ b. what is a network operating system, how does it differs from a desktop operating system? Explain using examples and indicating 5 features of a Network operatingiystem. (5 marks) A process is a program in execution in a computer,s memory. Analyze the steps of theprocess execution Life cycle, indicating the process states in a diagram. (10 marks) Multitasking enhances the speed of process execution. compare and contrast the two types of multitasking using a diagram. (10 marks) {Total- 25 marks} what is Network Binding? Explain using components used to do binding. you may use a diagram to explain binding. (10 marks) Port is a common concept in computer Networking. Recognize port characteristics and the reasons for using ports. (5 marks) what is a socket in computer Networking? A socket goes through several states in its life span. Evaluate socket life cycle using its sates. Draw-qdiagram siowing the interconnections of various states of the socket life cycle. ( 10 marks) (Total- 25 marks) 2. c. a' ldentify the main components of a cPU. show the interconnection between the components, RAM and ROM using a diagram. (7 marks) Modern computer Processors architecture is based on lnstruction set Architecture (lsA). what is the lnstruction set of a processor? Examine its functionality giving ., Llr, i ilr,",it perform. (10 marks) what are crsc and Rrsc computer architectures? compare and contrast the twoarchitectures indicating the key differences and the role of the compiler and how itaffects the programmer. Give exampres for Rrsc and crsc processors. (g marks) (Total- 25 marks) b. 3. b.
  • 15. 4.SupercomputersandMainframecomputerareexamplesofcentralizedsystemsbutnotusedfor general purpose computing' They are used for special purposes only' a.Explain5characteristicsofSuperComputersand5characteristicsofMainframe Computers.Compareandcontrastthekeydifferencesbetweenthetwoarchitectures.(10 marks) b.WhatisThinClientComputing?RecognizeThinClient3.tierArchitectureusingadiagram indicatingthe3-tierscrearry. i K€uu''tttac rlrrrr v're"-- -'- (5marks) c.RedundantArrayoflnexpensive/lndependent.Disks,RAlDtechnologyisawayofachieving fault tolerance at hardwrr" r"r"r. iualuate Raid Levels 0' 1- & 5 explaining the features' minimum disk requirements unfin *t,rt types of systems we can ""t?:[i- [t#lt*]' 5.PlanningascalablenetworkisnotaneasytaskaSmostofthenetworksgrowbiggerwiththe time as the requirements change' a. Describe 4 reasons why we need to create larger networks. Mentions 4; ways to stretch or expand network capabilities' :sv rv v' ---- ' " ( B marks ) b.Recognize3deviceswhichwecanusetoexpandorconnectdifferentnetworks.You shouldmentionthebasictun.tion,ritvofeachdeviceverybriefly.(gmarks) c.WANsareoftenconstructedbylinkingLANs.Connectionsareestablishedusing communicationlinestromrspso'.t"t"-.o*providers.Evaluate3typesofcommunication linesyoucanusetoconnecttwoLANs.Theanswershouldincludefeatures,advantages(8 marks) Briefly Explain 5 benefits of using virtualization in modern computing (5 marks)6. a. b. C. Recognize the two types of Hypervisors available' You mav use a diagra*'" o[TTn5" answer. whatisoversubscriptioninVirtualization?EvaluateYouranswerusingasuitable component (such as *t'"'VlCpU)which can be oversubscribed' ( 5 marks) CompareandcontrastFullVirtualization(HardwareAssistedVirtualization)vsPara- Virtualization indicating the kev requirements needed in each environmll'- !i'#lt[s,' d. *r.***End of the paper***** PageZ ol 2
  • 16. .$ SAaqh * .,;i rubSdg"racJuS#.jr National School of Business Management Postgraduate Diploma in Computer Networks _ Batch 03 2nd Semester Examination Network Security PGDCN 1309 Answer any five (05) questions. Time:03Hrs 26 July 2015 Question 1 (a) Describe the three elements depicted by the clA triangle pertaining to network security, with examples. (g Marks) (b) Describe the term AAA, in relation to controlling access to computing resources of an organization. (6 Marks) (c) Explain how two-factor authentication enables an organization to enforce better security. (5 Marks) (Total20 Marks) Question 2 (a) Explain the following principres in imprementing rr security in an organization (i) Least privilege principle (ii) Defense in-depth principle (12 Marks) (b) Explain two practical difficulties that may arise, medium business. Question 3 (a) Describe the term buffer overflow and how attackers utilize buffer overflow to attack systems (10 Marks) (b) Explain two key vulnerabilities present in the sMTp protocor and describe measures that can be taken by mail server administrators to prevent the exploitation of these vulnerabilities Question 4 (10 Marks) (Total20 Marks) Explain the security risks in the following modern tendencies in organizations and explain how these risks can be overcome. (a) Cloud computing (b) Big data (c) BYOD (Bring your own device) (d) lnternet of things (5 Marks each) (Total20 Marks) t"{",t 1'i{*i'{,! {' Si:ll i${}L t )' {.' i1: r :- . l| ri l, a;' ltJ'tl in implementing the above principles in a small or (8 Marks) (Total20 Marks) :: ,r )fZ Page 1 of 2
  • 17. euestion 5 . . !1, ^^ ^v-6nla (5 Marks) (a) What is Social Engineering? Explain with an example' (b) Explain two key ,i"p, tt.,,t can be taken to prevent your company,s employees being subjected to social engineering attacks' ,. (5 Marks) (c) Describe h"*;;; follJwing TCP/IP attacks are carried out (i) Xmas Tree Attack (ii) TeardroP Attack (5 Marks each) (Total20 Marks) "'",:1":;,ain the process of carrying out penetration a penerrarion test in an organittt'o1ro Marks) (b)Whataretheprerequisitesandtoolsrequiredtocarryoutapenetrationtest(5Marks) (c) Once a penetration test is completed' what should be done by the (i) penetration tester and (5 marks) (ii) Owner of the organization (Total 20 Marks) {.***,FEnd of the paper**x** Page 2 of 2
  • 18. -& ffisffissiNational School of Business Management Postgraduate fliploma in computer Netwo.tir - llatch CIz & 03 s) (s) 'ks) 2nd SemesteiExarnination Disaster Recovery and High availabi nrques Answer AII Questions Time:03Hrs Date: 24 May 2015 Question 0I In the IT subsystem, disaster recovery is not the same as high availability i' compare and contrast the use of High Availability Systems and Disaster Recovery Solutions in business and IT operations. (5 Marks) Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component. ii' Distinguish key characteristics between Reliability, Availability, and Serviceability with reference to High Availability and Disaster Recovery planning in modern day business otganizations. Support your answer with appropriate examples. (5 Marks) iii' Explain RTo and RPo in your own words and describe the imponun." of correctly identifying them for each business function/ process/ system. (05 Marks) iv' when it comes to High Availability why do we take two approaches on Hardware and Software (e.g. Operating Systems level) separately? (10 Mark$ Question 02 As the IT manager, you need to evaluate technology options for reliably hosting a business critical ERP Solution, which is interfaced to external custome., trr.orgr, an e-commerce platform. The top management has indicated that the ERP must be available 99.99% and maximum tolerable downtime as 2 hours and maxirnum tolerable data loss as 30 minutes. As the ITManager, you need to strike a balance between the Total cost of ownership and complexity ofoperation. Briefly explain your solution of choice, indicating the following. i. System Landscape ii. Solution Diagram iii. Preferred Technologies ,,e2of2 Page I of2 (25 Marks)
  • 19. ,, {rt"5 x: e,i'a-r r ' Question 03 u-- Business Continuity and.Disaste'.1:::l*y mu't t key priority and owned and sponsored by ;h.,;;;*agement of the organization' . - t1^^+i-,,*r, ,nrr T)isaster R i Identifv four (04) driver' to1.P:::X.:,?IIHlLfli' 3..T:tiJrfi;:;'T' 1n an lffix:'flr,T11, fll-:ffiil;id;;;"*:1.s/description for each (0 5 Marks) Elaborate o, pro#il "il;; ,o ,grJ.t",t iontinuity in your organization/ Environment and o';;l;t " p'#'i^d #;f ; $ive) with reasons for their ranking' State your risk scorrig me*roaotogy as well' (10 Marks) r organizalion' Provi you are the team rJ;f;ffi;;#'R".";;;y et*ning in vo* organization' Provide a narrativeastohowyouwouidcarryoutthe"BusinesslmpactAnalysis'(10Marks) Question 04 ITServiceManagementmainlyfocusedondaytodayoperationsandhandlingofincidentsin the organization' i. what is the relevant of IT Services Management to High Availability and Disaster RecoverY aPProach? (05 Marks) ii. Brietlv ai'""' ttte impottan'"J "t:"::-?ll:": *unugement (Configuration Items Database - CIDB) with other IT service management areas such as incident managemerrt,problemmanagemerrt,changernanagementandreleasemanagement and the relevance with Highlivailauility and Disastet Recovery' (08 Marks) iii. What are the kev consid"'"tt"" i*" lt'?l]]*ltd when designing a data center with High A;;i;iritv *a Disaster Recovery solutions for a business organization operatingaclossmultiple*"*,*n'",u",9,.theworld?Youranswermustinclude locationredundancy,suppottinfrastructuresuchaselectricityandairconditioning, and PhYsical securitY' (12 Marks) -End of Examination PaPer- a'a 4,. ::: PageZ of2