0% found this document useful (0 votes)
237 views6 pages

PracticeExam 2016

This document is the practice examination for COMP90007 Internet Technologies taken in Semester 1, 2016 at the University of Melbourne. The exam is 3 hours long with 20 multiple choice questions worth 3 marks each. Students are instructed to answer all questions in the provided script book and clearly number their answers. Guidance is given on appropriate answer length. The exam paper is not to be removed from the exam room or lodged in the library. Sample exam questions are provided covering topics such as traceroute, OSI vs TCP/IP models, network characteristics, error detection/correction, and routing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
237 views6 pages

PracticeExam 2016

This document is the practice examination for COMP90007 Internet Technologies taken in Semester 1, 2016 at the University of Melbourne. The exam is 3 hours long with 20 multiple choice questions worth 3 marks each. Students are instructed to answer all questions in the provided script book and clearly number their answers. Guidance is given on appropriate answer length. The exam paper is not to be removed from the exam room or lodged in the library. Sample exam questions are provided covering topics such as traceroute, OSI vs TCP/IP models, network characteristics, error detection/correction, and routing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

COMP90007 Internet Technologies Semester 1, 2016

THE UNIVERSITY OF MELBOURNE


DEPARTMENT OF COMPUTING AND INFORMATION SYSTEMS

Practice Examination – Semester 1, 2016

COMP90007: Internet Technologies

Exam Duration: 3 hours Total marks for this Exam: 60


Reading Time: 15 minutes
This exam has 2 pages.

Authorised materials:
The following items are authorized: writing materials (e.g. pens, pencils)
and non-electronic dictionaries are allowed.
Calculators and all other books are not allowed.

Instructions to Invigilators:
Supply students with standard script book.

The exam paper must remain in the exam room and be returned to
the subject coordinator.

Instructions to Students:

 This paper contains 20 questions each worth 3 marks. Attempt all


questions.
 Answer questions in the script book(s) provided. Do not write your
answers on this paper.
 Clearly number your answers.
 Bullet points are acceptable in answering descriptive questions.
 As a guide, two or three sentences should be sufficient to answer
each question. Marks may be deducted for overly long answers or
irrelevant information.
 Any unreadable answers will be considered wrong.

This paper may NOT be reproduced nor lodged with Baillieu Library.

Page 1 of 6
COMP90007 Internet Technologies Semester 1, 2016

Q1. The following data is the output of traceroute on a computer in the EDS
laboratory.

traceroute to cis.unimelb.edu.au (128.250.37.164), 64 hops max, 52 byte


packets
1 10.9.152.1 3.304 ms 3.304 ms 3.304 ms
2 172.18.68.81 1.146 ms 1.099 ms 1.076 ms
3 172.18.68.83 1.133 ms 1.144 ms 1.115 ms
4 172.18.68.33 2.175 ms 1.931 ms 2.149 ms
5 172.18.66.133 9.724 ms 1.688 ms 1.989 ms
6 128.250.37.130 1.246 ms 1.205 ms 1.381 ms
7 128.250.37.164 1.988 ms 2.035 ms 1.848 ms

a. What is the IP address of the router connected to the destination?

b. Explain how Traceroute uses ICMP (Internet Control Message Protocol)


in its operation.

Q2. Briefly explain the relative advantages and disadvantages of the OSI
Reference Model versus the TCP/IP Reference Model. [3 marks]

Q3. Consider a client program that needs to run the following operations on a
remote file server:

a. List the contents of a directory


b. Open a file
c. Read a text file
d. Display the attributes of a file.

For each of the above operations, indicate whether they are more likely to
be delay sensitive or bandwidth sensitive. Justify your answer? [3 marks]

Q4. The bandwidth and latency are the main characteristics of the networks
affecting the performance of applications on networks. Define bandwidth
and latency as discussed in lectures. Give an example of a network that
exhibits high bandwidth but also high latency. Then give an example of a
network that has both low bandwidth and low latency. [3 marks]

Q5. How can you increase the bit rate of a 1200 baud line from 1200 bit/s to
3600 bit/s? [3 marks]

Page 2 of 6
COMP90007 Internet Technologies Semester 1, 2016

Q6. Consider a telephone signal that is bandwidth limited to 4 kHz. (a) At what
rate should you sample the signal so that you can completely reconstruct
the signal? (b) If each sample of the signal is to be encoded at 256 levels,
how many bits/symbol are required for each sample? (c) What is the
minimum bit rate required to transmit this signal? [3 marks]

Q7. a. The following binary data fragment occurs in the middle of a data stream
for which the bit-stuffing algorithm described in the lectures is to be applied:

0001111101111111111001

Show the output binary data stream after the bit-stuffing algorithm has been
applied. (Note that you do not need to add any flag bytes)

b. The following data fragment occurs in the middle of a data stream for
which the byte-stuffing algorithm described in the lectures is to be applied:

A B ESC D FLAG FLAG ESC C

Show the output data stream after the byte-stuffing algorithm has been
applied.
c. What is the maximum overhead in the byte-stuffing algorithm in general?
[3 marks]

Q8. Briefly explain the difference in operation and philosophy of two approaches
to error handling on the data link layer; error-correcting and error-detecting.
[3 marks]

Q9. Data link protocols almost always put the CRC in a trailer rather than in a
header. Why? [3 marks]

Q10. If a LAN is under high load, would it be more efficient to use a contention
protocol or a collision free protocol in the MAC Sub-layer? Briefly explain
your answer. [3 marks]

Q11. Explain the operational benefits of Switched Ethernet in terms of handling


increased traffic loads and avoiding collisions. [3 marks]

Page 3 of 6
COMP90007 Internet Technologies Semester 1, 2016
Q12. A router has built the following routing table. The router can directly deliver
packets over Interface 0 and Interface 1 or it can forward to routers R2, R3
and R4.

Subnet Number Subnet Mask Next Hop

148.96.39.0 255.255.255.0 Interface 0


148.96.39.128 255.255.255.128 interface 1
148.96.40.0 255.255.255.128 R2
196.4.153.0 255.255.255.192 R3
Default R4

Describe what the router does if a packet addressed to each of the


following destinations is received.

(a) 148.96.40.12
(b) 148.96.39.193
(e) 196.4.153.90 [3 marks]

Q13. A router has built the following CIDR entries in its routing table. The router
can directly deliver packets over Interface 0 or it can forward to routers R2
and R3.

Address / mask Next Hop

128.16.64.0 / 21 Interface 0
128.16.80.0 / 21 R2
128.16.72.0 / 21 R2
128.16.88.0 / 21 R2
Default R3

Can you simplify the routing table by aggregating addresses having the
same outgoing lines? Briefly explain your answer. If you can simplify, give
the simplified routing table. [3 marks]

Q14. Explain the purpose of subnetting and Classless Inter-Domain Routing


(CIDR) for logically partitioning the IP Address space. [3 marks]

Q15. The following round-trip times (RTT) were measured by connecting from a
host in Melbourne to one residing in the Netherlands.

Trial RTT (ms)


1 0
2 1000
3 2000
Page 4 of 6
COMP90007 Internet Technologies Semester 1, 2016

a. Determine the jitter in milliseconds. The jitter is defined as the square


root of the variance of a normal distribution as shown below:

where is the mean of the samples.

b. Explain how the value of jitter obtained above can be detrimental to


certain network applications running on the host.
c. How can this problem be alleviated and what are the corresponding
trade-offs involved? [3 marks]

Q16. Give three types of policy choices at the Transport layer that can affect
network congestion. In each case, briefly explain why the policy choice
affects network congestion. [3 marks]

Q17. A common approach to removing jitter in streaming audio is to buffer


incoming packets at the receiver. Briefly explain the main problem with
using this approach for video conferencing. [3 marks]

Q18. Briefly explain the architecture of the email system by describing key
components and services. What are the basic steps of SMTP protocol? [3
marks]

Q19. Give 3 reasons for the emergence of Voice-over-IP telephony as an


alternative to the PSTN. [3 marks]

Q20. a. Is a DNS server a client, a server, or both? Briefly justify your answer.
b. Give three important properties of a message digest. [3 marks]

End of exam

Page 5 of 6
COMP90007 Internet Technologies Semester 1, 2016
Additional Practice Questions

Q1. The following data is the output of traceroute on a computer in the EDS
laboratory.
traceroute to cis.unimelb.edu.au (128.250.37.164), 64 hops max, 52 byte packets

1 10.0.0.254 33.100 ms 33.100 ms 33.100 ms


2 58.96.2.205 27.800 ms 27.800 ms 27.800 ms
3 58.96.2.129 28.000 ms 28.000 ms 28.000 ms
4 218.100.78.33 28.299 ms 28.469 ms 28.332 ms
5 202.158.200.9 29.626 ms 28.871 ms 29.841 ms
6 202.158.210.26 31.320 ms 28.722 ms 29.135 ms
7 202.158.200.250 29.668 ms 29.096 ms 28.660 ms
8***
9***
10 * * *
11 128.250.37.130 957.521 ms 33.475 ms 29.891 ms
12 128.250.37.164 29.940 ms 29.260 ms 30.020 ms

a. Describe two techniques that can be used in traceroute to speed up


determining the number of hops to a host. Assume that all other information
aside from the final hop count is irrelevant in the traceroute output for this
particular application.
b. Why is the eighth, ninth and tenth hops shown as stars?
c. What is the round trip delay between the source and the router with IP address
58.96.2.129?
[3 marks]
Q2. With respect to routing packets in the Network Layer, explain the difference
between a connectionless and connection-oriented service? [3 marks]

Q3. An encrypted file needs to be accessed in non-sequential order. Which


cipher mode is best suited to encrypting this file, and briefly explain why. [3
marks]

Q4. Give three requirements that are needed to ensure reliable connection
establishment in the transport layer. [3 marks]

Q5. Briefly summarize the relative strengths and weaknesses of using UDP to
implement remote procedure calls (RPC). [3 marks]

Page 6 of 6

You might also like