Vous êtes sur la page 1sur 5

Assignment 02: Semester 2

Assignment 02: Semester 2



Computer Networks
COS2626

Semester 2

School of Computing


IMPORTANT INFORMATION:
This tutorial letter contains Assignment 02 for
Semester 2


2
Assignment 02: Semester 2

Assignment 02 Semester 2
Due Date 12
th
September 2014
Unique Assignment number 856272
Study Material Chapters 8 to 11, 14
Submission Procedure Postal box submission or electronically via myUNISA
Number of Questions 7
Number of Marks 60
Assignment weight 60%

Question 1 [14]

The following questions are based on wireless networking.

1.1 Define the term wireless spectrum. [1]
1.2 Describe the CHARACTERISTICS wireless transmissions have in common with
wired transmissions.
[2]
1.3 Describe the DIFFERENCE between wireless and wired transmissions. [1]
1.4 Explain why wireless networks are not laid out using the same topologies as wired
networks.
[1]
1.5 Which WLAN (Wireless Local Area Network) architecture is depicted in the
following diagram?
[1]



1.6 Explain the ADVANTAGE of having WLANs support the same protocols (for
example, TCP/IP) and operating systems (for example, UNIX, Linux, or Windows)
as wired LANs.
[1]
1.7 Describe the use of CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance) to access a shared medium.

Note the significance of using ACK packets to verify every transmission.
[7]

Assignment 02: Semester 2

3

Question 2 [9]

Match each statement with the correct term below. Write only the number of statement and
the corresponding term, e.g. 2.1-a

2.1 Displays TCP (Transmission Control Protocol) /IP (Internet Protocol) statistics and
details about TCP/IP components and connections on a host.
2.2 Allows an administrator to query the DNS database from any computer on the network
and find the host name of a device by specifying its IP address, or vice versa.
2.3 Useful only on networks that run Windows-based operating systems and NetBIOS.
2.4 Allows an administrator to query a DNS (Domain Name Server) database and find the
host name associated with a specific IP address or vice versa.
2.5 The TCP/IP administration utility for use with Windows operating systems.
2.6 Allows you to view a hosts routing table.
2.7 Used if an administrator already know a hosts name and wants to learn its IP address.
2.8 The TCP/IP configuration and management utility used on UNIX and Linux systems.
2.9 Uses ICMP (Internet Control Message protocol) ECHO requests to trace the path from
one networked node to another, identifying all intermediate hops between the two nodes.

a. ipconfig utility
b. ifconfig utility
c. netstat utility
d. nbstat utility
e. host utility
f. dig utility
g. nslookup utility
h. route utility
i. traceroute utility

Question 3 [3]

Study the following diagram depicting the elements of virtualization. Identify components A,
B and C respectively.



4


Question 4 [4]

Study the following diagram depicting a VPN (Virtual Private Network) connection and answer
the questions that follow.




4.1 Define a VPN. [1]
4.2 What are TWO important considerations when designing a VPN? [2]
4.3 What does the letter 'A' in the diagram represent? [1]

Question 5 [5]

Name and discuss FIVE factors that cloud computing is distinguished by.

Question 6 [11]

The following questions are based on security policies.

6.1 Define a security policy. [3]
6.2 Name THREE typical goals for security policies. [3]
6.3 Name FOUR possible subheadings for the policy outline. [4]
6.4 A security policy should define what confidential means to the organization. Define
term confidential.
[1]

Assignment 02: Semester 2

5

Question 7 [14]

The following questions are based on data backup.

7.1 Define the term backup [1]
7.2 Define the term optical media and provide examples. [4]
7.3 Name THREE DISADVANTAGES of optical media. [3]
7.4 Describe how tape backup might be implemented on both small and large
networks.
[2]
7.5 Describe how to perform network backups if an organization does not have a WAN
or a high-end storage solution.
[3]
7.6 Describe the Grandfather-Father-Son backup rotation scheme. [1]

Vous aimerez peut-être aussi