Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Network Management 351 final exam, Exams of Computer Networks

Network Management 351 final exam

Typology: Exams

2024/2025

Available from 07/01/2025

Grace_Alesy
Grace_Alesy 🇺🇸

17 documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Short Answers:
Q1) Briefly explain the network management areas defined by ISO standard.
1. Performance management: Quantify, measure, report, analyze, and control
performance (e.g. utilization, throughput)
2. Fault Management: Log, detect, and respond to fault conditions (e.g. link failure)
3. Configuration Management: Track which device are in the networks + hardware and
software of these devices.
4. Accounting Management: Specify, log, and control access to network resources (e.g.
quota, user-based charging, allocation of resource-access privileges)
5. Security management: control access to network resources according to well defined
policies (e.g. use of firewall)
Q2) Give three advantages of HTTP streaming over UDP streaming. You should be as clear as
possible.
1. Larger playout delays smooth TCP delivery rate.
2. HTTP/TCP passes more easily through firewall.
3. HTTP uses TCP since it employs congestion error control.
Q3) Protocols define format, order of messages sent and received among network entities,
and action taken on message transmission and receipt.
Q4) Which of the following is not a method for implementing circuit switching? Packet
switching and division multiplex.
Q5) List and explain 2 functionalities of supper nodes.
1 join skype network by contacting the super node using tcp
2. The clients obtains the ip address of the callee from the super node
Q6) List 3 approaches VoIP
1. Simple FEC: it works by creating a redundant chunk by exclusive OR-ing n original
chunks for every group of n chunks this way it can reconstruct original n chunks if at
most one lost chunk from n+1 chunks with playout delay
2. Piggyback lower quality stream: it sends lower resolution audio stream as
redundant information. In this way the receiver can conceal non-consecutive loss.
3. Interleaving to conceal lost: audio chunk divided into smaller units then a packet
contains small units from different chunks if a packet is lost still the receiver will have
most of every original chunk
Q7)PIM dense and sparse
PIM Sparse Mode (PIM-SM) explicitly builds unidirectional shared trees rooted at
a rendezvous point (RP) per group, and optionally creates shortest-path trees per
source. PIM-SM generally scales fairly well for wide-area usage.
PIM Dense Mode (PIM-DM) uses dense multicast routing. It implicitly builds shortest-
path trees by flooding multicast traffic domain wide, and then pruning back branches
of the tree where no receivers are present. PIM-DM is straightforward to implement
but generally has poor scaling properties. The first multicast routing
protocol, DVMRP used dense-mode multicast routing.[3] See the PIM Internet
Standard RFC 3973.
pf3
pf4
pf5

Partial preview of the text

Download Network Management 351 final exam and more Exams Computer Networks in PDF only on Docsity!

Short Answers: Q1) Briefly explain the network management areas defined by ISO standard.

  1. Performance management: Quantify, measure, report, analyze, and control performance (e.g. utilization, throughput)
  2. Fault Management: Log, detect, and respond to fault conditions (e.g. link failure)
  3. Configuration Management: Track which device are in the networks + hardware and software of these devices.
  4. Accounting Management: Specify, log, and control access to network resources (e.g. quota, user-based charging, allocation of resource-access privileges)
  5. Security management: control access to network resources according to well defined policies (e.g. use of firewall) Q 2 ) Give three advantages of HTTP streaming over UDP streaming. You should be as clear as possible.
  6. Larger playout delays smooth TCP delivery rate.
  7. HTTP/TCP passes more easily through firewall.
  8. HTTP uses TCP since it employs congestion error control. Q 3 ) Protocols define format , order of messages sent and received among network entities , and action taken on message transmission and receipt. Q 4 ) Which of the following is not a method for implementing circuit switching? Packet switching and division multiplex. Q 5 ) List and explain 2 functionalities of supper nodes. 1 join skype network by contacting the super node using tcp
  9. The clients obtains the ip address of the callee from the super node Q 6 ) List 3 approaches VoIP
  10. Simple FEC: it works by creating a redundant chunk by exclusive OR-ing n original chunks for every group of n chunks this way it can reconstruct original n chunks if at most one lost chunk from n+1 chunks with playout delay
  11. Piggyback lower quality stream: it sends lower resolution audio stream as redundant information. In this way the receiver can conceal non-consecutive loss.
  12. Interleaving to conceal lost: audio chunk divided into smaller units then a packet contains small units from different chunks if a packet is lost still the receiver will have most of every original chunk Q 7 )PIM dense and sparse PIM Sparse Mode (PIM-SM) explicitly builds unidirectional shared trees rooted at a rendezvous point (RP) per group, and optionally creates shortest-path trees per source. PIM-SM generally scales fairly well for wide-area usage. PIM Dense Mode (PIM-DM) uses dense multicast routing. It implicitly builds shortest- path trees by flooding multicast traffic domain wide, and then pruning back branches of the tree where no receivers are present. PIM-DM is straightforward to implement but generally has poor scaling properties. The first multicast routing protocol, DVMRP used dense-mode multicast routing.[3] See the PIM Internet Standard RFC 3973.

Q8) List three approaches/alternatives for recovery from packet loss in VoIP and explain how does each of them work.

  1. Simple FEC: It works by creating a redundant chunk by exclusive OR-ing n original chunks for every group of n chunks this way it can reconstruct original n chunks if at most on e lost chunk from n+1 chunks with playout delay.
  2. Piggyback lower quality stream: it sends lower resolution audio stream as redundant information. In this way the receiver can conceal non-consecutive loss.
  3. Interleaving to conceal lost: audio chunk divided into smaller units then a packet contains small units from different chunks if a packet is lost still the receiver will have most of every original chunk. Q9) From structure point of view, internet has three key parts: network edge, access network, and network core. Which part does each of the components and concepts belong? Computer: Network edge Router: Network core Digital subscribe line DSL: access network Switches: access network Printers: Network edge Wireless LANs: access network Circuit switching: Network access Routing: access network Switching: access network Base station: access network. Multiple Questions: Q1 0 ) Wireless networks have four elements that are listed below. Which of these are not elements of Ad-Hoc networks? Base station-Network Q 11 ) Which of the following is not a benefit of VLANs? Efficient use of routers. Q 12 ) Which of the following is not true about Real Time Protocol (RTP)? RTP packets include enough information to allow the routers to recognize that these are multimedia packets that should be treated differently. Q13)

Q 17 ) E F

Q 18 )

Q1 9 )

Packet Generation Time Time to play packet Time the packet is receiver at the destenation How to handle the packet? Choose one of the following: Store/Play/Drop/Change play time/Request retransmission T=0ms 10 T=10ms Play T=10ms 20 T=18ms Store T=15ms 25 T=18ms Store T=25 ms 35 T=40ms Drop T=30ms 40 T=40ms Play Q 20 ) Which of the following is not a criteria used by BGP to select the best route? ASs with the same interior routing protocol.

Q2 1 ) Which of the following is not a method for recovery from packet loss VoIP? First error checking FEC Q2 2 ) MIB objects are named according to a _________. Hierarchal tree structure. Q2 3 ) Which of the following is an approach that can be used for both broadcast and multicast? N-Way-Unicast Q 24 ) Q25) Q26) Q27) An approach used by the routers in the internet to send packets towards the closest gateway router (when the packet is to be sent outside of the AS). Hot Potato Q28) Q29) Which of the following is not a type of VLANs? Application-based VLAN