PracticeExam 2016
PracticeExam 2016
Authorised materials:
The following items are authorized: writing materials (e.g. pens, pencils)
and non-electronic dictionaries are allowed.
Calculators and all other books are not allowed.
Instructions to Invigilators:
Supply students with standard script book.
The exam paper must remain in the exam room and be returned to
the subject coordinator.
Instructions to Students:
This paper may NOT be reproduced nor lodged with Baillieu Library.
Page 1 of 6
COMP90007 Internet Technologies Semester 1, 2016
Q1. The following data is the output of traceroute on a computer in the EDS
laboratory.
Q2. Briefly explain the relative advantages and disadvantages of the OSI
Reference Model versus the TCP/IP Reference Model. [3 marks]
Q3. Consider a client program that needs to run the following operations on a
remote file server:
For each of the above operations, indicate whether they are more likely to
be delay sensitive or bandwidth sensitive. Justify your answer? [3 marks]
Q4. The bandwidth and latency are the main characteristics of the networks
affecting the performance of applications on networks. Define bandwidth
and latency as discussed in lectures. Give an example of a network that
exhibits high bandwidth but also high latency. Then give an example of a
network that has both low bandwidth and low latency. [3 marks]
Q5. How can you increase the bit rate of a 1200 baud line from 1200 bit/s to
3600 bit/s? [3 marks]
Page 2 of 6
COMP90007 Internet Technologies Semester 1, 2016
Q6. Consider a telephone signal that is bandwidth limited to 4 kHz. (a) At what
rate should you sample the signal so that you can completely reconstruct
the signal? (b) If each sample of the signal is to be encoded at 256 levels,
how many bits/symbol are required for each sample? (c) What is the
minimum bit rate required to transmit this signal? [3 marks]
Q7. a. The following binary data fragment occurs in the middle of a data stream
for which the bit-stuffing algorithm described in the lectures is to be applied:
0001111101111111111001
Show the output binary data stream after the bit-stuffing algorithm has been
applied. (Note that you do not need to add any flag bytes)
b. The following data fragment occurs in the middle of a data stream for
which the byte-stuffing algorithm described in the lectures is to be applied:
Show the output data stream after the byte-stuffing algorithm has been
applied.
c. What is the maximum overhead in the byte-stuffing algorithm in general?
[3 marks]
Q8. Briefly explain the difference in operation and philosophy of two approaches
to error handling on the data link layer; error-correcting and error-detecting.
[3 marks]
Q9. Data link protocols almost always put the CRC in a trailer rather than in a
header. Why? [3 marks]
Q10. If a LAN is under high load, would it be more efficient to use a contention
protocol or a collision free protocol in the MAC Sub-layer? Briefly explain
your answer. [3 marks]
Page 3 of 6
COMP90007 Internet Technologies Semester 1, 2016
Q12. A router has built the following routing table. The router can directly deliver
packets over Interface 0 and Interface 1 or it can forward to routers R2, R3
and R4.
(a) 148.96.40.12
(b) 148.96.39.193
(e) 196.4.153.90 [3 marks]
Q13. A router has built the following CIDR entries in its routing table. The router
can directly deliver packets over Interface 0 or it can forward to routers R2
and R3.
128.16.64.0 / 21 Interface 0
128.16.80.0 / 21 R2
128.16.72.0 / 21 R2
128.16.88.0 / 21 R2
Default R3
Can you simplify the routing table by aggregating addresses having the
same outgoing lines? Briefly explain your answer. If you can simplify, give
the simplified routing table. [3 marks]
Q15. The following round-trip times (RTT) were measured by connecting from a
host in Melbourne to one residing in the Netherlands.
Q16. Give three types of policy choices at the Transport layer that can affect
network congestion. In each case, briefly explain why the policy choice
affects network congestion. [3 marks]
Q18. Briefly explain the architecture of the email system by describing key
components and services. What are the basic steps of SMTP protocol? [3
marks]
Q20. a. Is a DNS server a client, a server, or both? Briefly justify your answer.
b. Give three important properties of a message digest. [3 marks]
End of exam
Page 5 of 6
COMP90007 Internet Technologies Semester 1, 2016
Additional Practice Questions
Q1. The following data is the output of traceroute on a computer in the EDS
laboratory.
traceroute to cis.unimelb.edu.au (128.250.37.164), 64 hops max, 52 byte packets
Q4. Give three requirements that are needed to ensure reliable connection
establishment in the transport layer. [3 marks]
Q5. Briefly summarize the relative strengths and weaknesses of using UDP to
implement remote procedure calls (RPC). [3 marks]
Page 6 of 6