1102/159.334 CP
ALB
Internal
- Page 1 of 7 -
MASSEY UNIVERSITY
ALBANY CAMPUS
EXAMINATION FOR
159.334 Computer Networks
Semester Two - 2011
Time allowed: THREE (3) hours
Attempt ALL 6 (six) questions.
All questions are of equal value.
This examination contributes 60% to the final assessment.
Calculators permitted – no restrictions.
1102/159.334 CP
ALB
Internal
- Page 2 of 7 -
Question 1:
a) Name four socket functions (C functions) used to create client/server applications.
[4 marks]
b) Name the five layers in a typical TCP/IP computer network.
[2 marks]
c) What are the services provided by TCP?
[2 marks]
d) The source and destination port numbers are included in the packet header. Which
layer needs to be able to read these port numbers?
[2 marks]
1102/159.334 CP
ALB
Internal
- Page 3 of 7 -
Question 2: (The Application Layer)
a) If an FTP client is in active mode, what are the two FTP commands (protocol
commands) issued by the client when the user issues:
ftp> ls
[2 marks]
b) If an FTP client is in passive mode, what are the two FTP commands (protocol
commands) issued by the client when the user issues:
ftp> get
[2 marks]
c) The command netstat is used by a system administrator. Explain the difference
between LISTEN and ESTABLISHED states.
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 localhost:1234 *:* LISTEN
tcp 0 0 localhost:43000 it046500:20 ESTABLISHED
[2 marks]
d) How many simultaneous connections does HTTP needs in order to download a single
file?
How many simultaneous connections does FTP needs in order to download a single file?
[2 marks]
e) Briefly explain what is a DNS (Domain Name Service) iterated query. Explain why this
method is important to keep the scalability of the DNS.
[2 marks]
1102/159.334 CP
ALB
Internal
- Page 4 of 7 -
Question 3: (The Transport Layer)
a) A distributed system uses UDP to transfer files between nodes. You are asked to design
a simple reliable protocol to replace it. What are the essential elements that you need to
include in such a protocol? Your solution should focus on possible lost and damaged
packets, not performance.
[4 marks]
b) Explain the difference between Go-Back-N and Selective Repeat. Given a choice, which
one is better for the performance of the network?
[3 marks]
c) Explain the difference between “Congestion Control” and “Flow Control” from the view
point of a transport protocol.
[3 marks]
Question 4. (Network Layer)
a) What are the two important functions provided by the network layer protocols?
Emphasize the importance of the difference between the two functions.
[3 marks]
b) The network administrator checks an Ethernet card configuration using the command
ipconfig. He extracts the values for the IP address and for the Mask:
IP address 192.123.
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxscuttsginette
IFSM 310 Software and Hardware Infrastructure Concepts
Computer and Number Systems
1.
(10 pt)
You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least four features that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.
2.
(2.5 pt each)
In order to receive credit for these problems, you must show all of the steps you took to arrive at your answers.
(c) Convert the following decimal number to binary:
21842
(d) Convert the following binary number to decimal:
11000111011.101
(c) Convert the following hexadecimal number to decimal:
CA97
(d) Convert the following binary number to hexadecimal:
1110011111011010100
CPU and Memory
3.
(10 pt)
ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomite sequence, what is the corresponding binary message being sent by the Sophomites?
(HINT: Decode the sequence reading from left to right then write the corresponding binary sequence, leaving a space between each binary sequence.)
4.
(10 pt)
Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.
Input / Output
5. Answer the follow questions about interrupts.
a.
(5 pt)
Describe in detail the steps that occur when a system receives an interrupt.
b.
(5 pt)
Describe how these steps differ in the case when a system receives multiple interrupts
Computer Systems
6. Answer the following questions about clusters.
a.
(5 pt)
Describe how you might use a cluster to provide fault-tolerant computing
b.
(5 pt)
Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.
Networks
7. Answer the following questions about communication protocols.
a.
(5 pt)
Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.
b.
(5 pt)
If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why
.
8. In the context of network security,
a.
(3 pt)
exp.
We are confident in the abilities of our 200-310 Exam we want you to feel confident as well dumps available for Designing for Cisco Internetwork Solutions visit@ https://www.troytec.com/200-310-exams.html
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxscuttsginette
IFSM 310 Software and Hardware Infrastructure Concepts
Computer and Number Systems
1.
(10 pt)
You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least four features that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.
2.
(2.5 pt each)
In order to receive credit for these problems, you must show all of the steps you took to arrive at your answers.
(c) Convert the following decimal number to binary:
21842
(d) Convert the following binary number to decimal:
11000111011.101
(c) Convert the following hexadecimal number to decimal:
CA97
(d) Convert the following binary number to hexadecimal:
1110011111011010100
CPU and Memory
3.
(10 pt)
ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomite sequence, what is the corresponding binary message being sent by the Sophomites?
(HINT: Decode the sequence reading from left to right then write the corresponding binary sequence, leaving a space between each binary sequence.)
4.
(10 pt)
Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.
Input / Output
5. Answer the follow questions about interrupts.
a.
(5 pt)
Describe in detail the steps that occur when a system receives an interrupt.
b.
(5 pt)
Describe how these steps differ in the case when a system receives multiple interrupts
Computer Systems
6. Answer the following questions about clusters.
a.
(5 pt)
Describe how you might use a cluster to provide fault-tolerant computing
b.
(5 pt)
Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.
Networks
7. Answer the following questions about communication protocols.
a.
(5 pt)
Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.
b.
(5 pt)
If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why
.
8. In the context of network security,
a.
(3 pt)
exp.
We are confident in the abilities of our 200-310 Exam we want you to feel confident as well dumps available for Designing for Cisco Internetwork Solutions visit@ https://www.troytec.com/200-310-exams.html
ccna workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNA workbook when it comes Cisco certification which is why we offered free CCNA workbook.
And first-class of all, a threat to hone your competencies. It’s adequate if you experience in over your head. We all did sooner or later, this subsequent step is about pushing thru that worry and on the point of address something as hard because the 200-301. In case you get caught, reach out. In case you see others caught, assist them.
How is this newsletter going to help you? Apart from providing you with a brief glimpse of the test’s topics and shape, we are able to additionally assist you discover efficient education substances. Cisco’s internet site is a extraordinary starting point, but you shouldn’t restriction your self to it. Despite the fact that you would possibly have by no means heard approximately them, you have to attempt exam dumps as they may grow to be your secret tool to get a passing rating in 2 hundred-301 assessment. But now, let’s start with the exam details.
Do not permit yourself face your ccna two hundred-301 exam without proper guidance to remorse later when you fail in cisco licensed community associate real exam because many people had been there. Let assist you to your cisco two hundred-301 ccna real examination preparation. To help you put together on your cisco certified network partner (ccna) 200-301 exam.
1. (TCO 6) An address that identifies an application at the trans.docxdorishigh
1. (TCO 6) An address that identifies an application at the transport layer is: (Points : 5)
ARP
IP
MAC
Port Address
Question 2. 2. (TCO 6) The Pv4 address range 169.254.0.0/16 is reserved for: (Points : 5)
Link-Local addresses
Loopback addresses
Broadcast addresses
Addresses for self-identification
Question 3. 3. (TCO 6) The first four bits of the IPv4 addresses reserved for research are: (Points : 5)
0000
1000
1110
1111
Question 4. 4. (TCO 6) To determine how many digits are used for the network identifier in an IPv4 address, you must look at the: (Points : 5)
subnet mask
binary mask
MAC mask
TCP/IP mask
Question 5. 5. (TCO 6) Which one of the following IPv4 addresses cannot be used as the destination address in an IPv4 packet? (Points : 5)
12.0.0.0/8
12.0.0.1/8
12.5.5.5/8
12.255.255.254/8
Question 6. 6. (TCO 6) Number of addresses in the IPv4 address block 193.17.8.128/25 is: (Points : 5)
25
256
128
none of the above
Question 7. 7. (TCO 6) The subnet mask for the address block 163.248.248.0/21 is: (Points : 5)
255.0.0.0
255.255.0.0
255.255.248.0
255.255.255.21
Question 8. 8. (TCO 6) Which one of the following subnets does the IPv4 address 154.180.0.58 255.255.255.248 belong to? (Points : 5)
154.180.0.0/29
154.180.0.32/29
154.180.0.48/29
154.180.0.56/29
Question 9. 9. (TCO 6) One of the nodes in a broadcast domain is assigned the IPv4 address 152.165.113.126/21. Which one of the following IPv4 addresses cannot be assigned to any of the other nodes in the same broadcast domain? (Points : 5)
152.165.115.254/21
192.168.118.160/21
192.168.111.253/21
192.168.117.158/21
Question 10. 10. (TCO 6) What is the maximum number of subnets with 255.255.255.248 mask in a class C network? (Points : 5)
5
8
32
64
Question 11. 11. (TCO 6) The protocol used to map IP addresses to their physical addresses is: (Points : 5)
IP Addressing
ARP
RARP
CIDR
Question 12. 12. (TCO 6) The IP header has a minimum length of: (Points : 5)
5 bytes
15 bytes
20 bytes
none of the above
Question 13. 13. (TCO 6) The TTL keeps track of ____________ to decide whether a datagram is discarded. (Points : 5)
Time
Message size
Fragments
Number of routers passed through
Question 14. 14. (TCO 7) All of the following apply to ICMP EXCEPT: (Points : 5)
It is a Layer 3 protocol
It is a routable protocol
It compensates for IP’s connectionless messaging drawback
It is independent of the IP header
Question 15. 15. (TCO 7) All of the following are ICMP error-reporting messages EXCEPT: (Points : 5)
Protocol mismatch error
...
Your company name
Your name
Instruction Page
1. On the cover page
a. Replace ‘Your Company Name’ with your company name, city and state
b. Replace ‘Date’ with the date of the plan
c. Consider inserting graphics:
i. Company logo
ii. Insert a picture or graphic of your product or service
iii. Photo of your facilities
iv. Photo of your location
2. Replace ‘ENTER YOUR COMPANY NAME HERE’ with your company name on the page with the Statement of Confidentiality & Non-Disclosure
3. Open the document header and enter your company name and your name
4. Update the table of contents as you build your business plan.
Delete this page before submitting your business plan.
Business Plan
Your Company Name Here
City, State
Date
Statement of Confidentiality & Non-Disclosure
THIS BUSINESS PLAN CONTAINS PROPRIETARY AND CONFIDENTIAL INFORMATION.
All data submitted to the receiver is provided in reliance upon its consent not to use or disclose any information contained herein except in the context of its business dealings with ENTER YOUR COMPANY NAME HERE (Company). The recipient of this document agrees to inform its present and future employees and partners who view or have access to the document's content of its confidential nature.
The recipient agrees to instruct each employee that they must not disclose any information concerning this document to others except to the extent such matters are generally known to, and are available for use by, the public. The recipient also agrees not duplicate or distribute or permit others to duplicate or distribute any material contained herein without the Company's express written consent.
The Company retains all title, ownership and intellectual property rights to the material and trademarks contained herein, including all supporting documentation, files, marketing material, and multimedia.
Disclaimer Notice
THIS BUSINESS PLAN IS FOR INFORMATIONAL PURPOSES ONLY AND DOES NOT CONSTITUTE AN OFFER TO SELL OR THE SOLICITATION OF AN OFFER TO BUY ANY SECURITIES.
The Company reserves the right, in its sole discretion, to reject any and all proposals made by or on behalf of any recipient, to accept any such proposals, to negotiate with one or more recipients at any time, and to enter into a definitive agreement without prior notice to other recipients. The company also reserves the right to terminate, at any time, further participation in the investigation and proposal process by, or discussions or negotiations with, any recipient without reason.
BY ACCEPTANCE OF THIS DOCUMENT, THE RECIPIENT AGREES TO BE BOUND BY THE AFOREMENTIONED STATEMENT.
Table of Contents
Introduction and Overview 6
Executive Summary 6
Objectives 6
Mission 6
Keys to Success 6
Company Summary 6
Company Ownership 6
Start-up 6
What We Sell 7
Summary 7
Our products 7
Our services 7
Market Analysis and Sales Forecast 8
Market and Sales Forecast Summary 8
Total Market 8
Target Market Summar.
Your Company NameYour Company NameBudget Proposalfor[ent.docxhyacinthshackley2629
Your Company Name
Your Company Name
Budget Proposal
for
[enter years here]
BUSN278
[Term]
Professor[name]
DeVry University
Table of Contents
Section
Title
Subsection
Title
Page Number1.0Executive Summary
2.0Sales Forecast
2.1Sales Forecast
2.2Methods and Assumptions
3.0Capital Expenditure Budget
4.0Investment Analysis
4.1Cash Flows
4.2NPV Analysis
4.3Rate of Return Calculations
4.4Payback Period Calculations
5.0Pro Forma Financial Statements
5.1Pro Forma Income Statement
5.2Pro Forma Balance Sheet
5.3Pro Forma Cash Budget
6.0Works Cited
7.0Appendices
7.1Appendix 1: [description]
7.2Appendix 2:
[description]
(Please put page numbers in the last column of the table of contents above, because they apply to your finished assignment. Do this after your project is complete. Remove this text and all text that is in italics in this template when finished with your project.)
(Also, please submit your Excel spreadsheet that shows your supporting calculations.)
1.0 Executive Summary
The first paragraph of this executive summary should give a brief description of the business to which this budget applies. Very briefly describe the products and services of this company, the geography or demographics of the customers it serves, and why people purchase the main product of this business. Much or all of this information will be found in the business profile provided to you. Please use your own words, and please do not simply copy and paste the explanation in the course materials. Make assumptions if necessary.
Also, provide a second paragraph that describes how the budget supports the company’s strategy.
Finally, provide a third paragraph in which you summarize the key points from your budget, including the planning horizon; the amount of up-front investment; the NPV, payback, and IRR of the project; and key figures from your income statement, cash budget, and balance sheet.
Remember, this is not a thesis or introduction of what you will talk about—it contains the major, specific content of each section. The second and third paragraphs should be written after you have completed all other sections of this template.
As you complete sections of this template, please remove all italicized text in all sections of this template and replace it with your own text or you will lose points!
2.0 Sales Forecast
Briefly introduce the sales forecast section.
2.1 Sales Forecast
Here you should include a simple table showing the years and the total sales for each year, along with a brief explanation of why sales are expected to rise, fall, change, or stay the same in certain years. Provide a brief explanation of the sales forecast, indicating why you expect sales to rise or fall during the planning horizon. Your explanation should be consistent with the trends and changes in sales found in your table.
Year 1
Year 2
Year 3
Year 4
Year 5
Sales
2.2 Methods and Assumptions
Here you should describe how you arrived at your sales forecast in sect.
More Related Content
Similar to 1102159.334 CP ALB Internal - Page 1 of 7 - .docx
ccna workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNA workbook when it comes Cisco certification which is why we offered free CCNA workbook.
And first-class of all, a threat to hone your competencies. It’s adequate if you experience in over your head. We all did sooner or later, this subsequent step is about pushing thru that worry and on the point of address something as hard because the 200-301. In case you get caught, reach out. In case you see others caught, assist them.
How is this newsletter going to help you? Apart from providing you with a brief glimpse of the test’s topics and shape, we are able to additionally assist you discover efficient education substances. Cisco’s internet site is a extraordinary starting point, but you shouldn’t restriction your self to it. Despite the fact that you would possibly have by no means heard approximately them, you have to attempt exam dumps as they may grow to be your secret tool to get a passing rating in 2 hundred-301 assessment. But now, let’s start with the exam details.
Do not permit yourself face your ccna two hundred-301 exam without proper guidance to remorse later when you fail in cisco licensed community associate real exam because many people had been there. Let assist you to your cisco two hundred-301 ccna real examination preparation. To help you put together on your cisco certified network partner (ccna) 200-301 exam.
1. (TCO 6) An address that identifies an application at the trans.docxdorishigh
1. (TCO 6) An address that identifies an application at the transport layer is: (Points : 5)
ARP
IP
MAC
Port Address
Question 2. 2. (TCO 6) The Pv4 address range 169.254.0.0/16 is reserved for: (Points : 5)
Link-Local addresses
Loopback addresses
Broadcast addresses
Addresses for self-identification
Question 3. 3. (TCO 6) The first four bits of the IPv4 addresses reserved for research are: (Points : 5)
0000
1000
1110
1111
Question 4. 4. (TCO 6) To determine how many digits are used for the network identifier in an IPv4 address, you must look at the: (Points : 5)
subnet mask
binary mask
MAC mask
TCP/IP mask
Question 5. 5. (TCO 6) Which one of the following IPv4 addresses cannot be used as the destination address in an IPv4 packet? (Points : 5)
12.0.0.0/8
12.0.0.1/8
12.5.5.5/8
12.255.255.254/8
Question 6. 6. (TCO 6) Number of addresses in the IPv4 address block 193.17.8.128/25 is: (Points : 5)
25
256
128
none of the above
Question 7. 7. (TCO 6) The subnet mask for the address block 163.248.248.0/21 is: (Points : 5)
255.0.0.0
255.255.0.0
255.255.248.0
255.255.255.21
Question 8. 8. (TCO 6) Which one of the following subnets does the IPv4 address 154.180.0.58 255.255.255.248 belong to? (Points : 5)
154.180.0.0/29
154.180.0.32/29
154.180.0.48/29
154.180.0.56/29
Question 9. 9. (TCO 6) One of the nodes in a broadcast domain is assigned the IPv4 address 152.165.113.126/21. Which one of the following IPv4 addresses cannot be assigned to any of the other nodes in the same broadcast domain? (Points : 5)
152.165.115.254/21
192.168.118.160/21
192.168.111.253/21
192.168.117.158/21
Question 10. 10. (TCO 6) What is the maximum number of subnets with 255.255.255.248 mask in a class C network? (Points : 5)
5
8
32
64
Question 11. 11. (TCO 6) The protocol used to map IP addresses to their physical addresses is: (Points : 5)
IP Addressing
ARP
RARP
CIDR
Question 12. 12. (TCO 6) The IP header has a minimum length of: (Points : 5)
5 bytes
15 bytes
20 bytes
none of the above
Question 13. 13. (TCO 6) The TTL keeps track of ____________ to decide whether a datagram is discarded. (Points : 5)
Time
Message size
Fragments
Number of routers passed through
Question 14. 14. (TCO 7) All of the following apply to ICMP EXCEPT: (Points : 5)
It is a Layer 3 protocol
It is a routable protocol
It compensates for IP’s connectionless messaging drawback
It is independent of the IP header
Question 15. 15. (TCO 7) All of the following are ICMP error-reporting messages EXCEPT: (Points : 5)
Protocol mismatch error
...
Your company name
Your name
Instruction Page
1. On the cover page
a. Replace ‘Your Company Name’ with your company name, city and state
b. Replace ‘Date’ with the date of the plan
c. Consider inserting graphics:
i. Company logo
ii. Insert a picture or graphic of your product or service
iii. Photo of your facilities
iv. Photo of your location
2. Replace ‘ENTER YOUR COMPANY NAME HERE’ with your company name on the page with the Statement of Confidentiality & Non-Disclosure
3. Open the document header and enter your company name and your name
4. Update the table of contents as you build your business plan.
Delete this page before submitting your business plan.
Business Plan
Your Company Name Here
City, State
Date
Statement of Confidentiality & Non-Disclosure
THIS BUSINESS PLAN CONTAINS PROPRIETARY AND CONFIDENTIAL INFORMATION.
All data submitted to the receiver is provided in reliance upon its consent not to use or disclose any information contained herein except in the context of its business dealings with ENTER YOUR COMPANY NAME HERE (Company). The recipient of this document agrees to inform its present and future employees and partners who view or have access to the document's content of its confidential nature.
The recipient agrees to instruct each employee that they must not disclose any information concerning this document to others except to the extent such matters are generally known to, and are available for use by, the public. The recipient also agrees not duplicate or distribute or permit others to duplicate or distribute any material contained herein without the Company's express written consent.
The Company retains all title, ownership and intellectual property rights to the material and trademarks contained herein, including all supporting documentation, files, marketing material, and multimedia.
Disclaimer Notice
THIS BUSINESS PLAN IS FOR INFORMATIONAL PURPOSES ONLY AND DOES NOT CONSTITUTE AN OFFER TO SELL OR THE SOLICITATION OF AN OFFER TO BUY ANY SECURITIES.
The Company reserves the right, in its sole discretion, to reject any and all proposals made by or on behalf of any recipient, to accept any such proposals, to negotiate with one or more recipients at any time, and to enter into a definitive agreement without prior notice to other recipients. The company also reserves the right to terminate, at any time, further participation in the investigation and proposal process by, or discussions or negotiations with, any recipient without reason.
BY ACCEPTANCE OF THIS DOCUMENT, THE RECIPIENT AGREES TO BE BOUND BY THE AFOREMENTIONED STATEMENT.
Table of Contents
Introduction and Overview 6
Executive Summary 6
Objectives 6
Mission 6
Keys to Success 6
Company Summary 6
Company Ownership 6
Start-up 6
What We Sell 7
Summary 7
Our products 7
Our services 7
Market Analysis and Sales Forecast 8
Market and Sales Forecast Summary 8
Total Market 8
Target Market Summar.
Your Company NameYour Company NameBudget Proposalfor[ent.docxhyacinthshackley2629
Your Company Name
Your Company Name
Budget Proposal
for
[enter years here]
BUSN278
[Term]
Professor[name]
DeVry University
Table of Contents
Section
Title
Subsection
Title
Page Number1.0Executive Summary
2.0Sales Forecast
2.1Sales Forecast
2.2Methods and Assumptions
3.0Capital Expenditure Budget
4.0Investment Analysis
4.1Cash Flows
4.2NPV Analysis
4.3Rate of Return Calculations
4.4Payback Period Calculations
5.0Pro Forma Financial Statements
5.1Pro Forma Income Statement
5.2Pro Forma Balance Sheet
5.3Pro Forma Cash Budget
6.0Works Cited
7.0Appendices
7.1Appendix 1: [description]
7.2Appendix 2:
[description]
(Please put page numbers in the last column of the table of contents above, because they apply to your finished assignment. Do this after your project is complete. Remove this text and all text that is in italics in this template when finished with your project.)
(Also, please submit your Excel spreadsheet that shows your supporting calculations.)
1.0 Executive Summary
The first paragraph of this executive summary should give a brief description of the business to which this budget applies. Very briefly describe the products and services of this company, the geography or demographics of the customers it serves, and why people purchase the main product of this business. Much or all of this information will be found in the business profile provided to you. Please use your own words, and please do not simply copy and paste the explanation in the course materials. Make assumptions if necessary.
Also, provide a second paragraph that describes how the budget supports the company’s strategy.
Finally, provide a third paragraph in which you summarize the key points from your budget, including the planning horizon; the amount of up-front investment; the NPV, payback, and IRR of the project; and key figures from your income statement, cash budget, and balance sheet.
Remember, this is not a thesis or introduction of what you will talk about—it contains the major, specific content of each section. The second and third paragraphs should be written after you have completed all other sections of this template.
As you complete sections of this template, please remove all italicized text in all sections of this template and replace it with your own text or you will lose points!
2.0 Sales Forecast
Briefly introduce the sales forecast section.
2.1 Sales Forecast
Here you should include a simple table showing the years and the total sales for each year, along with a brief explanation of why sales are expected to rise, fall, change, or stay the same in certain years. Provide a brief explanation of the sales forecast, indicating why you expect sales to rise or fall during the planning horizon. Your explanation should be consistent with the trends and changes in sales found in your table.
Year 1
Year 2
Year 3
Year 4
Year 5
Sales
2.2 Methods and Assumptions
Here you should describe how you arrived at your sales forecast in sect.
Your company recently reviewed the results of a penetration test.docxhyacinthshackley2629
Your company recently reviewed the results of a penetration test on your network. Several vulnerabilities were identified, and the IT security management team has recommended mitigation. The manager has asked you to construct a plan of action and milestones (POA&M) given that the following vulnerabilities and mitigations were identified:
The penetration test showed that not all systems had malware protection software in place. The mitigation was to write a malware defense process to include all employees and retest the system after the process was implemented.
The penetration test indicated that the data server that houses employee payroll records had an admin password of “admin.” The mitigation was to perform extensive hardening of the data server.
The penetration test also identified many laptop computers that employees brought to work and connected to the internal network,some of which were easily compromised. The mitigation was to write a bring your own device (BYOD) policy for all employees and train the employees how to use their devices at work.
Complete
the 1- to 2-page
Plan of Action and Milestones Template
. (Must use this template!)
.
Your company wants to explore moving much of their data and info.docxhyacinthshackley2629
Your company wants to explore moving much of their data and information technology infrastructure to the cloud. The company is a small online retailer and requires a database and a web storefront. Currently, only IT is over budget on database maintenance. The initial analysis points to significant cost savings by moving to a cloud environment.
Research
the differences between Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS).
Discuss
the differences between IaaS, SaaS, and PaaS. Give an example of the appropriate use of each of the cloud models (Iaas, SaaS, and PaaS).
.
Your company plans to establish MNE manufacturing operations in Sout.docxhyacinthshackley2629
Your company plans to establish MNE manufacturing operations in South Korea. You have been asked to conduct a cultural audit focusing on leadership behaviors of South Korea. The results of your report will be used for internal training for plant managers due to be reassigned to work with South Korean managers in a few months. You are aware of a high-collectivism culture with a Confucian code of ethical behavior in South Korea. What kinds of South Korean leadership behaviors would you expect to include in your report? Describe these in terms of interaction between the U.S. and Korean managers as well as interaction between Korean leader-followers.
By
Saturday, June 21, 2014
respond to the discussion question assigned by the faculty. Submit your response to the appropriate
Discussion Area
. Use the same
Discussion Area
to comment on your classmates' submissions and continue the discussion until
Wednesday, June 25, 2014
.
Comment on how your classmates would address differing views.
.
Your company just purchased a Dell server MD1420 DAS to use to store.docxhyacinthshackley2629
Your company just purchased a Dell server MD1420 DAS to use to store databases. the databases will contain all employee records and personal identified information (PII). You know that databases like this are often targets. The Chief Information Officer has asked you draft a diagram for the server and 3 connected workstations. The diagram must use proper UML icons.
- Research:
network topology to protect database server (Google Term and click images)
-
Create a diagram using proper UML
icon, the protects the server and the 3 workstations.
-
Include where Internet access will be located
, firewall and other details.
- The
body (Min 1 page)
- Provide a summary after the diagram how and why you topology should protect the database.
.
your company is moving to a new HRpayroll system that is sponsored .docxhyacinthshackley2629
your company is moving to a new HR/payroll system that is sponsored by a firm called Workday.com. You have been asked to oversee the stakeholder management aspects of this project. Identify some of the key stakeholders at your company and describe how you plan to keep them engaged during your year-long project. Be sure to include the appropriate methods since not all of your stakeholders are located at the HQ office in Herndon, VA.
.
Your company is considering the implementation of a technology s.docxhyacinthshackley2629
Your company is considering the implementation of a technology solution to address a business problem. As a member of the IT team for a manufacturing company, you were asked to select a product to address the identified needs, informing the stakeholders about its fit to the identified needs, and providing implementation details. Several past process changes have been unsuccessful at implementation and user acceptance. You will create two artifacts that communicate product information tailored to meet the needs of each of the following stakeholder groups:
• Audience 1: executive leadership of the organization, such as the CIO, CFO, etc.
• Audience 2: cross-functional team, including members from IT who will be implementing the product
.
Your company is a security service contractor that consults with bus.docxhyacinthshackley2629
Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization.
Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced:
A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database
An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI
An unauthorized access to client accounts through cracking of weak passwords via the company’s website login
Health Coverage Associates would like you to
develop
a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur.
Write
a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide
Accurate information on the HIPAA requirements for securing PHI
FISMA and HIPAA requirements for a security plan
Scope of the work you will perform to meet the Health Coverage Associates’ requests
Compile
a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.
Write
a 1- to 2-page concise outline of the contents of the security management plan. Include
Policies Health Coverage Associates will need to manage, protect, and provide access to PHI
The recommended risk management framework Health Coverage Associates should adopt
Key elements Health Coverage Associates should include in its plan of actions and milestones
Cite
all sources using APA guidelines.
.
Your company has just sent you to a Project Management Conference on.docxhyacinthshackley2629
Your company has just sent you to a Project Management Conference on the latest trends in project scope management. When you return to work, you will have to provide a report at the staff meeting on what you learned.
In your initial post
, share some of the trends that you heard at the conference. Conduct research and use sources to support your findings. Be sure to acknowledge any sources you use.
.
Your company has designed an information system for a library. The .docxhyacinthshackley2629
Your company has designed an information system for a library. The project included a new network (wired and wireless), a data entry application, a Web site, database and documentation.
Design a generic test plan that describes the testing for an imaginary system, make sure to address unit, integration and system testing.
Create a one-page questionnaire to distribute to users in a post-implementation evaluation of a recent information system project. Include at least 10 questions that cover the important information you want to obtain.
.
Your company has had embedded HR generalists in business units for t.docxhyacinthshackley2629
Your company has had embedded HR generalists in business units for the past several years. Over that time, it has become more costly and more difficult to maintain standards, and is a frustration for business units to have that budget “hit.” The leadership has decided to move to a more centralized model of delivering HR services and has asked you to evaluate that proposition and begin establishing a project team to initiate the needed changes. The project team is selected, and you must now provide general direction.
.
Your company You are a new Supply Chain Analyst with the ACME.docxhyacinthshackley2629
Your company: You are a new Supply Chain Analyst with the ACME Corporation. We design specialty electronics that are components in larger finished goods such as major appliances, automobiles and industrial equipment. Manufacturing is outsourced to low-cost suppliers due to the significant labor contribution and closeness to electronic component suppliers.
Your product: ACME Corp. designs a leading-edge family of devices branded as “Voice Assistants.” These are add-on boxes that many OEMs are using as plug-and-play devices in a wide variety of Internet-of-Things products. They are also sold directly to consumers as after-market items, but only for IoT devices that were built with our proprietary data-port.
Figure 1: Product line of ACME Corp Voice Assistant IoT Add-on Boxes
Your task: Your Chief Supply Chain Officer (CSCO) is requesting a review of supplier-to-customer processes as related to recent growth in our company and increasing demand for faster responsiveness to customers. One alternative is to decentralize our inventory into regional Distribution Centers; however, our ERP system is currently limited in the data available to make some of these decisions – and the output reports are very antiquated. Starting off the process, the CSCO directed that your Analysis Team use population data to pro-rate our national sales data as a starting point. For this analysis, you are asked to focus only on the flagship product, Voice Assistant IoT Add-on Box, 4GB, SKU #123-456789. The challenge is now yours to complete some computations and interpret the results!
Your data: A detailed report from your ERP system along with secondary data from the U.S. Census Bureau (reference: https://www.census.gov/programs-surveys/popest/data/data-sets.html) is provided. (Note: Sales to Alaska, Hawaii and Puerto Rico are handled by a 3PL provider and therefore are NOT part of this analysis.) The consolidated EXCEL® file has incorporated several tasks already performed by the Analysis Team --- sort, cleanse, inventory optimization, etc. Other tasks remain for your team.
Detailed Requirements: Prepare a formal report summarizing your results and providing recommendations that are supported by facts. The required layout follows:
A. Supply Chain Management:
a. Identify a single key supplier and a single key customer for your product, including a brief description of their product.
b. Identify the proper type of business relationship that your company should have with the supplier and customer from Part A, above, then briefly describe the data that you would share with them.
c. When implementing Supply Chain Management with your #1 key supplier for the first time, create a timeline that lists each of the six SCOR processes in the order that you recommend implementation; include process leader (by job title), primary contact at supplier/customer (by job title), and duration to implement.
d. Briefly describe each of the four enablers of supply chain .
Your company has asked that you create a survey to collect data .docxhyacinthshackley2629
Your company has asked that you create a survey to collect data on customer satisfaction related to their health care experience at your hospital.
Assignment Details (4-5 pages)
Please Add Title to page
Page 1:
A brief summary of the health care issue/topic (wait time, medication errors, etc.)
Number and access of source to sample and population
Limitations of the survey (parameters)
Time line for completion of survey
Page 2: Survey Questions
Survey questions: Limit the questions to 10
Page 3: Compilation of Data
Time line for assessment and evaluation of data
Challenges faced during this process
Page 4: Results and Conclusions
Results of study
Conclusions and potential value of the findings
Reference page
Deliverable Length
4–5 pages
Title and reference pages
.
"Your Communications Plan"
Description
A.
What is your challenge or opportunity?
The topic I would like to present is pitching an Project idea for some investor to invest in my Women’s Resources center.(Voices Of Women)
B.
.
Why is this professionally important to you?
Goal
A.
What goal or outcome do you want to achieve with this communication?
I.
Is it clear, concise, and actionable?
Audience
A.
Who is you target audience?
What are the professional positions of the audience?
I.
What demographic characteristics will the audience comprise?
II.
What is your relationship to the audience?
III.
What background knowledge and expertise does the audience have?
IV.
What does the audience know, feel about, and expect concerning this communication?
V.
What preconceptions or biases do you possess that might prevent you from building rapport with your audience?
B.
What information is available about your audience?
A.
b.
c.
I.
What research/sources will you use to obtain information about the audience?
II.
What conclusions have you been able to draw about the audience?
C.
What tone will you
"Your Communications Plan"
Description
A.
What is your challenge or opportunity?
The topic I would like to present is pitching an Project idea for some investor to invest in my Women’s Resources center.(Voices Of Women)
B.
.
Why is this professionally important to you?
Goal
A.
What goal or outcome do you want to achieve with this communication?
I.
Is it clear, concise, and actionable?
Audience
A.
Who is you target audience?
What are the professional positions of the audience?
I.
What demographic characteristics will the audience comprise?
II.
What is your relationship to the audience?
III.
What background knowledge and expertise does the audience have?
IV.
What does the audience know, feel about, and expect concerning this communication?
V.
What preconceptions or biases do you possess that might prevent you from building rapport with your audience?
B.
What information is available about your audience?
A.
b.
c.
I.
What research/sources will you use to obtain information about the audience?
II.
What conclusions have you been able to draw about the audience?
C.
What tone will you use to convey your message?
I.
Is the setting casual or formal?
II.
Is the communication personal or impersonal?
Key Message
A.
What is the primary message you must convey to your audience?use to convey your message?
I.
Is the setting casual or formal?
II.
Is the communication personal or impersonal?
Key Message
A.
What is the primary message you must convey to your audience?
.
Your community includes people from diverse backgrounds. Answer .docxhyacinthshackley2629
Your community includes people from diverse backgrounds. Answer the following questions related to how culture affects nutrition.
1. How does your culture shape decisions that you make about nutrition? (Culture includes history, values, politics, economics, communication styles, beliefs, and practices.)
2. Describe at least 1 different cultures present at your community. How do these cultures impact food choices?
3. Describe how you interact with someone from another culture related to diet. Provide specific examples.
4. Assume that you are preparing a Thanks Giving dinner for a group of your classmates that represent a variety of cultures. Describe how you will prepare the menu and set the table. Include how you will address food safety at the picnic.
Explore ways to address the problem of food insecurity in your community.
1. What programs are available to meet the nutrition needs of individuals in the area?
2. What types of options exist in the area to purchase food?
3. What role do you believe society should take to ensure that individuals have access to adequate healthy food?
4. What do you see as your role in the community related to proper nutrition?
.
Your Communications Plan Please respond to the following.docxhyacinthshackley2629
"Your Communications Plan"
Please respond to the following:
Provide a brief overview of your Strategic Communications Plan. Include a short description for each of the following
in bullet point format
:
- The purpose of the communication
- Your goal
- Audience
- Key Message
- Supporting Points
- Channel Selection
- Action Request
Note:
Remember, feedback is a powerful and essential tool. Thoughtful, useful feedback is specific. It combines suggestions for improvement with the recognition of good ideas. When you offer feedback, you should contribute new ideas and new perspectives to help your peers learn and move forward.
.
Your Communication InvestigationFor your mission after reading y.docxhyacinthshackley2629
Your Communication Investigation
For your mission after reading your assignment, you are to take yourself and a notebook into your environment and observe human interaction for 15 minutes noting two persons and their interpersonal exchange(s) but don't join the conversation. This can be a place of your choosing but describe it in some (not complete) detail. Note significant features of the communication environment. Using terms from our textbook write down your observations.
Identify the elements from our Transactional model
Briefly describe the transactional nature of the communication of the persons you are observing. Do you see attempts at ‘communicare’ of "making something common"? What is it that you saw that led you to this conclusion? Sender? Receiver? Message?
Report back to us
Describe the communication behavior you observed in a brief but specific report. What got your attention? Why? What elements of the transactional communication model did you see as you were observing their behavior? What about your 'decoding' of the scene? Do you think you had any personal 'noise' or bias that may have affected how you saw or interpreted the scene?
Post your report to the Discussion Board and then read all of the posts
Post your replies to two classmates and using your skills in perception take a position of empathy
.
Explain how you perceive the scene your classmate reports and take a perspective demonstrating empathy as defined in our textbook in chapter 2 (page 52) putting yourself in the place of either or both persons your classmate observed. What you can learn from the description of the scene reported by your classmate and you considering Empathy, Perception, and observed Communication. More through reports and replies will receive higher scores.
.
Your Communications PlanFirst step Choose a topic. Revi.docxhyacinthshackley2629
"Your Communications Plan"
First step: Choose a topic. Review the Communication Challenge Topics and choose one that is relevant and interesting to you. Make sure to review the examples and anecdotes that follow each topic in this document. You can also find this information under the Course Info tab.
Second step: Review the Strategic Communication Plan example. Your plan should mirror this example in format and length. You can also find this example under the Course Info tab.
Third step: In this discussion, please respond to the following:
Part 1: What is your topic?
Part 2: Provide a rough draft of your Strategic Communications Plan for peer review and instructor feedback. Your draft should include enough detail that we can provide strong constructive feedback and input.
COM510 ASSIGNMENT COMMUNICATION CHALLENGE TOPICS
In the world of business, we can create opportunities through strategic communication. Throughout our professional careers, there are key events that raise the stakes of our communications approach.
WHAT YOU’LL DO
1) Review the Communication Challenge Topics and their accompanying case study examples.
2) Select 1 topic that is professionally relevant for you.
3) Use for your COM510 assignments (the topic you have selected, not the case study example).
Note: If there is another challenge or current opportunity in your professional life that is more relevant for you, you may choose a topic that is not on this list. Keep in mind that the communication challenge you select must in- clude both written and verbal communication elements to meet the needs of this course. (Your professor must approve your selection before you proceed.)
1
Examples of each scenario are provided to demonstrate what thoughtful, professional communication would look like in each of these situations. These are only examples and should not be used for completing the assignment. You can create and establish all necessary assumptions. The scenario is yours to explain.
COMMUNICATION CHALLENGE TOPICS
Choose one of the following topics for your assignments.
• Internal Promotion Opportunity
• New Job Opportunity Interview
• Running a Meeting
• Coaching Your Direct Employees
• Pitching a Project Idea
INTERNAL PROMOTION
Seeking a promotion from within your company is one opportunity in which strategic communication could mean the difference be- tween success and failure. If you choose this scenario, you’ll need to create both a written and a verbal (audio or video) communica- tion. These elements should explain why you are the right person for the internal promotion while addressing potential questions you might need to answer as part of the process.
Things to Consider
• Have you checked the listings on your company’s job board lately?
• Is there a new position you would like to secure?
• Have you taken on more responsibility at work?
• Have your outcomes been positive?
• Do your job title and job description match what you do? .
Your coffee franchise cleared for business in both countries (Mexico.docxhyacinthshackley2629
Your coffee franchise cleared for business in both countries (Mexico, and China). You now have to develop your global franchise team and start construction of your restaurants. . You invite all of the players to the headquarters in the United States for a big meeting to explain the project and get to know one another since they represent the global division of your company.
You are concerned with the following two issues. Substantively address each in a two-part paper, applying Beyond the Book, MUSE, Intellipath and library resources to support your reasoning
Part 1: Effective communication with participants
What are the implications of the cultural variables for your communication with the team representative from each country in the face to face meeting?
Address Hall’s high and low context regarding verbal and non-verbal communication. The United States is a low context culture, while each country is high context.
Tip: Write at least one substantive paragraph for each country
Video on Hall's high and Low Context Communication
Part 2: Effective communication among participants
What are examples of barriers and biases in cross-cultural business communications that may impact the effectiveness of communication among the meeting participants and in potential negotiations?
What are some of the issues you should be concerned about regarding verbal and nonverbal communication for this group to avoid misinterpretations and barriers to communication?
Please submit your assignment.
.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Overview on Edible Vaccine: Pros & Cons with Mechanism
1102159.334 CP ALB Internal - Page 1 of 7 - .docx
1. 1102/159.334 CP
ALB
Internal
- Page 1 of 7 -
MASSEY UNIVERSITY
ALBANY CAMPUS
EXAMINATION FOR
159.334 Computer Networks
Semester Two - 2011
Time allowed: THREE (3) hours
Attempt ALL 6 (six) questions.
All questions are of equal value.
This examination contributes 60% to the final assessment.
Calculators permitted – no restrictions.
2. 1102/159.334 CP
ALB
Internal
- Page 2 of 7 -
Question 1:
a) Name four socket functions (C functions) used to create
client/server applications.
[4 marks]
b) Name the five layers in a typical TCP/IP computer network.
[2 marks]
c) What are the services provided by TCP?
[2 marks]
d) The source and destination port numbers are included in the
packet header. Which
layer needs to be able to read these port numbers?
[2 marks]
3. 1102/159.334 CP
ALB
Internal
- Page 3 of 7 -
Question 2: (The Application Layer)
a) If an FTP client is in active mode, what are the two FTP
commands (protocol
commands) issued by the client when the user issues:
ftp> ls
[2 marks]
b) If an FTP client is in passive mode, what are the two FTP
commands (protocol
commands) issued by the client when the user issues:
ftp> get
[2 marks]
c) The command netstat is used by a system administrator.
Explain the difference
between LISTEN and ESTABLISHED states.
Proto Recv-Q Send-Q Local Address Foreign Address State
4. tcp 0 0 localhost:1234 *:* LISTEN
tcp 0 0 localhost:43000 it046500:20 ESTABLISHED
[2 marks]
d) How many simultaneous connections does HTTP needs in
order to download a single
file?
How many simultaneous connections does FTP needs in order to
download a single file?
[2 marks]
e) Briefly explain what is a DNS (Domain Name Service)
iterated query. Explain why this
method is important to keep the scalability of the DNS.
[2 marks]
1102/159.334 CP
ALB
Internal
- Page 4 of 7 -
Question 3: (The Transport Layer)
5. a) A distributed system uses UDP to transfer files between
nodes. You are asked to design
a simple reliable protocol to replace it. What are the essential
elements that you need to
include in such a protocol? Your solution should focus on
possible lost and damaged
packets, not performance.
[4 marks]
b) Explain the difference between Go-Back-N and Selective
Repeat. Given a choice, which
one is better for the performance of the network?
[3 marks]
c) Explain the difference between “Congestion Control” and
“Flow Control” from the view
point of a transport protocol.
[3 marks]
Question 4. (Network Layer)
a) What are the two important functions provided by the
network layer protocols?
Emphasize the importance of the difference between the two
functions.
6. [3 marks]
b) The network administrator checks an Ethernet card
configuration using the command
ipconfig. He extracts the values for the IP address and for the
Mask:
IP address 192.123.246.12
Mask 255.255.255.128
Write two examples of IP addresses that this machine can
access:
1) one IP address that is accessible directly (no routing) by this
machine.
2) one IP address that is only accessible via the gateway
(router).
[2 marks]
Q4 continued on next page...
1102/159.334 CP
ALB
Internal
- Page 5 of 7 -
7. Q4 continued...
c)
Figure 1
There are four routers connected via certain links (Figure 1).
Suppose that the following table
is used for the initialisation of D’s routing table:
D VIA
Destination
A B C
A 3 ∞ ∞
B ∞ 70 ∞
C ∞ ∞ 2
And the minimum cost is an array of 4 integers in the order A,
B, C, D:
A advertises its minimum costs as: 0, 12, 7, 3
B advertises its minimum costs as: 12, 0, ∞, 70
C advertises its minimum costs as: 7, ∞, 0, 2
Show the first update on D’s table if node D simultaneously
receives packets with the
8. minimum cost information from the routers A, B and D.
[3 marks]
d) There are possibly hundreds of millions of IP addresses in
the Internet. Explain why the
routing tables in TCP/IP routers do not need to contain lots of
entries, and are usually
rather small.
[2 marks]
1102/159.334 CP
ALB
Internal
- Page 6 of 7 -
Question 5. (Data-link and Physical Layers)
a) What is the purpose of CRC (Cyclic Redundancy Check)?
[2 marks]
b) Compute the CRC value for the character “1110 0001”
considering:
- the algorithm uses a standard polynomial method with 16 bits
9. - the generator is 0x8005
- no reverse bytes, no reverse results
Write the final result of the CRC in hexadecimal.
[3 marks]
c) Collisions are a challenging problem for data link protocols.
Explain the main differences
between data-link layer protocols for wired networks and
protocols for wireless networks.
[3 marks]
d) Explain brifly how the ARP protocol keeps a table with the
IP addresses and
correspondent MAC (hardware) addresses.
[2 marks]
1102/159.334 CP
ALB
Internal
- Page 7 of 7 -
Question 6. (Network Security)
10. a) MD5 is a well known method for message digests. Message
digests find a fixed-length
number (say, 128 bits) that correlates to a certain file.
Give two reasons why CRC is not a suitable method to be used
as a message digest, even
though CRC also finds a fixed-length number that correlated to
a file.
[2 marks]
b) Considering the RSA algorithm, find suitable e and d for the
following pair of prime
numbers, explaining how you chose them:
p = 5 q = 11
n = ?
z = ?
e = ? d = ?
[3 marks]
c) Discuss the difference between asymetric encryption and
symmetric encryption.
Complete the table stating advantages and disadvantages of
these two encryption methods
11. (copy it to the answer book).
Advantages Disadvantages
asymmetric
symmetric
[2 marks]
d) Explain briefly what is a “packet sniffing” attack. Discuss
and compare the implications
of such atacks for wired networks and wireless networks.
[3 marks]
+ + + + + + + +